0000140)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000180)=""/183) 17:31:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) [ 779.873665] audit: type=1326 audit(1529688710.872:1275): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18384 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getpgid(0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/50, 0x32) 17:31:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:31:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f00000001c0)='/proc/\x00\x00\x00\x00\x00\x00\x00\x00ipv4/vs.snat_reroute\x00', 0x0) get_thread_area(&(0x7f0000000000)) 17:31:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f00000000c0)) readahead(0xffffffffffffffff, 0x0, 0x0) 17:31:51 executing program 6: pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f00000001c0)='/proc/\x00\x00\x00\x00\x00\x00\x00\x00ipv4/vs.snat_reroute\x00', 0x0) get_thread_area(&(0x7f0000000000)) 17:31:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getpgid(0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/50, 0x32) 17:31:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f00000000c0)) readahead(0xffffffffffffffff, 0x0, 0x0) 17:31:51 executing program 6: pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:31:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) [ 780.362667] audit: type=1326 audit(1529688711.361:1276): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18428 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getpgid(0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/50, 0x32) 17:31:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f00000000c0)) readahead(0xffffffffffffffff, 0x0, 0x0) 17:31:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f00000001c0)='/proc/\x00\x00\x00\x00\x00\x00\x00\x00ipv4/vs.snat_reroute\x00', 0x0) get_thread_area(&(0x7f0000000000)) 17:31:51 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:51 executing program 7: ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000c80)) 17:31:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f00000001c0)='/proc/\x00\x00\x00\x00\x00\x00\x00\x00ipv4/vs.snat_reroute\x00', 0x0) get_thread_area(&(0x7f0000000000)) 17:31:51 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getpgid(0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/50, 0x32) 17:31:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f00000000c0)) readahead(0xffffffffffffffff, 0x0, 0x0) 17:31:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:31:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:52 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getpgid(0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/50, 0x32) 17:31:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f00000001c0)='/proc/\x00\x00\x00\x00\x00\x00\x00\x00ipv4/vs.snat_reroute\x00', 0x0) get_thread_area(&(0x7f0000000000)) 17:31:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f00000000c0)) readahead(0xffffffffffffffff, 0x0, 0x0) 17:31:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) [ 781.282506] audit: type=1326 audit(1529688712.281:1277): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18484 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getpgid(0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/50, 0x32) [ 781.357650] audit: type=1326 audit(1529688712.355:1278): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18498 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f00000000c0)) readahead(0xffffffffffffffff, 0x0, 0x0) 17:31:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) getpgid(0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/50, 0x32) 17:31:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) 17:31:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f00000000c0)) readahead(0xffffffffffffffff, 0x0, 0x0) 17:31:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) getpgid(0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/50, 0x32) 17:31:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:53 executing program 1: socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f00000001c0)='/proc/\x00\x00\x00\x00\x00\x00\x00\x00ipv4/vs.snat_reroute\x00', 0x0) get_thread_area(&(0x7f0000000000)) [ 782.278970] audit: type=1326 audit(1529688713.277:1279): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18537 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) getpgid(0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/50, 0x32) 17:31:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 782.368974] audit: type=1326 audit(1529688713.335:1280): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18543 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f00000000c0)) readahead(0xffffffffffffffff, 0x0, 0x0) 17:31:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:53 executing program 1: socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) [ 782.550477] audit: type=1326 audit(1529688713.548:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18561 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) getpgid(0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/50, 0x32) 17:31:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f00000001c0)='/proc/\x00\x00\x00\x00\x00\x00\x00\x00ipv4/vs.snat_reroute\x00', 0x0) get_thread_area(&(0x7f0000000000)) 17:31:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:54 executing program 4: stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:54 executing program 1: socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:54 executing program 5: mkdir(&(0x7f0000001b40)='./file0\x00', 0x0) chdir(&(0x7f0000000000)='./file0\x00') 17:31:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:31:54 executing program 4: stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f00000000c0)) readahead(0xffffffffffffffff, 0x0, 0x0) 17:31:54 executing program 4: stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:31:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) getpgid(0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/50, 0x32) 17:31:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:55 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:55 executing program 7: socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:31:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:55 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:55 executing program 7: socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:31:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f00000000c0)) readahead(0xffffffffffffffff, 0x0, 0x0) 17:31:55 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:55 executing program 7: socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 784.580145] kauditd_printk_skb: 5 callbacks suppressed [ 784.580166] audit: type=1326 audit(1529688715.578:1287): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18678 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:31:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) getpgid(0xffffffffffffffff) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/50, 0x32) [ 784.706247] audit: type=1326 audit(1529688715.675:1288): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18686 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) [ 784.854258] audit: type=1326 audit(1529688715.852:1289): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18700 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:31:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:55 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:31:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioprio_get$uid(0x0, 0x0) 17:31:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) [ 785.533133] audit: type=1326 audit(1529688716.530:1290): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18740 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:56 executing program 5: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:31:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:31:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:56 executing program 0: setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x90) 17:31:56 executing program 5: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:31:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:31:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:31:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getitimer(0x0, &(0x7f00000000c0)) 17:31:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:57 executing program 5: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:31:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:31:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) [ 786.513383] audit: type=1326 audit(1529688717.507:1291): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18801 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:57 executing program 2: pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:57 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:31:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getitimer(0x0, &(0x7f00000000c0)) 17:31:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:31:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:31:57 executing program 2: pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getitimer(0x0, &(0x7f00000000c0)) 17:31:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:58 executing program 2: pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:31:58 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) [ 787.150775] audit: type=1326 audit(1529688718.149:1292): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18860 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:31:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) getitimer(0x0, &(0x7f00000000c0)) 17:31:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:31:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:31:58 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) [ 787.565721] audit: type=1326 audit(1529688718.564:1293): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18887 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:31:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:31:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:31:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:31:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:31:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) [ 788.249200] audit: type=1326 audit(1529688719.247:1294): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18931 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000140), 0x14) 17:31:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:31:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:31:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:59 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:31:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:31:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) [ 788.611288] audit: type=1326 audit(1529688719.609:1295): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18959 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:31:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:31:59 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:31:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:31:59 executing program 6: accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)) 17:32:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:32:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:32:00 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:32:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) [ 789.184474] audit: type=1326 audit(1529688720.183:1296): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18984 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:32:00 executing program 6: accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:32:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:32:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:32:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:32:00 executing program 6: accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:32:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setresgid(0x0, 0x0, 0x0) 17:32:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:32:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:32:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:32:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:32:01 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setresgid(0x0, 0x0, 0x0) 17:32:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) [ 790.196581] kauditd_printk_skb: 1 callbacks suppressed [ 790.196604] audit: type=1326 audit(1529688721.195:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19039 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:32:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:32:01 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:32:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setresgid(0x0, 0x0, 0x0) [ 790.446815] audit: type=1326 audit(1529688721.445:1299): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19067 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:32:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:32:01 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) [ 790.801671] audit: type=1326 audit(1529688721.800:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19090 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 17:32:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:32:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 791.157095] audit: type=1326 audit(1529688722.155:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19112 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:32:02 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:32:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:32:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:02 executing program 0: socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) [ 791.429923] audit: type=1326 audit(1529688722.428:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19127 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:32:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) [ 791.736132] audit: type=1326 audit(1529688722.734:1303): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19150 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:32:03 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:03 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:32:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000080)) 17:32:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:03 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:03 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:32:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:32:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) [ 792.351601] audit: type=1326 audit(1529688723.350:1304): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19173 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:03 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:03 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) [ 792.412108] audit: type=1326 audit(1529688723.397:1305): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19184 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 792.526689] audit: type=1326 audit(1529688723.525:1306): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19191 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) 17:32:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) [ 792.739471] audit: type=1326 audit(1529688723.735:1307): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19207 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:32:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:32:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:04 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:04 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:04 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:32:04 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:32:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000180)=""/27) 17:32:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:32:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept(0xffffffffffffffff, &(0x7f00000000c0)=@in, &(0x7f0000000040)=0x80) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) 17:32:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:32:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="ab527fd3fe3d4fd475b11222cc0a14f463490ad4f4715e0d85a925fac2f2fbfcb322b5f5e82e92748a53acfd77fc7978555bfc3ad3180cf7a05b4d8b942f7964f24d64d8e709915178fe8354088c1f736bf09bdaaf16bf05241bd2cd4513334ada94569815a8030233f1b58febc28546cbf267eabb672c9a15d9f96df95f6041b2f3418b748b3c6ca368e24b33148283e2e04027cc6b99afaebc429c4881ddfbd712e43e6b1a754693e2397e9126b3097eb2141b9c0e12d4a6689aaa114c3c6c60c4381860a0c61f2f868c480a5e67e016c3c0ad0d57cd691e12195915cf6eb223398181ffeb8f87ca48662af384cf53d5cfce5cee41d84ac589e0f0395a57e0") 17:32:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:32:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:06 executing program 7: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="ab527fd3fe3d4fd475b11222cc0a14f463490ad4f4715e0d85a925fac2f2fbfcb322b5f5e82e92748a53acfd77fc7978555bfc3ad3180cf7a05b4d8b942f7964f24d64d8e709915178fe8354088c1f736bf09bdaaf16bf05241bd2cd4513334ada94569815a8030233f1b58febc28546cbf267eabb672c9a15d9f96df95f6041b2f3418b748b3c6ca368e24b33148283e2e04027cc6b99afaebc429c4881ddfbd712e43e6b1a754693e2397e9126b3097eb2141b9c0e12d4a6689aaa114c3c6c60c4381860a0c61f2f868c480a5e67e016c3c0ad0d57cd691e12195915cf6eb223398181ffeb8f87ca48662af384cf53d5cfce5cee41d84ac589e0f0395a57e0") 17:32:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) [ 795.239345] kauditd_printk_skb: 4 callbacks suppressed [ 795.239366] audit: type=1326 audit(1529688726.238:1312): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19330 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:06 executing program 7: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) [ 795.540779] audit: type=1326 audit(1529688726.539:1313): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19354 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:06 executing program 7: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="ab527fd3fe3d4fd475b11222cc0a14f463490ad4f4715e0d85a925fac2f2fbfcb322b5f5e82e92748a53acfd77fc7978555bfc3ad3180cf7a05b4d8b942f7964f24d64d8e709915178fe8354088c1f736bf09bdaaf16bf05241bd2cd4513334ada94569815a8030233f1b58febc28546cbf267eabb672c9a15d9f96df95f6041b2f3418b748b3c6ca368e24b33148283e2e04027cc6b99afaebc429c4881ddfbd712e43e6b1a754693e2397e9126b3097eb2141b9c0e12d4a6689aaa114c3c6c60c4381860a0c61f2f868c480a5e67e016c3c0ad0d57cd691e12195915cf6eb223398181ffeb8f87ca48662af384cf53d5cfce5cee41d84ac589e0f0395a57e0") 17:32:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) [ 796.239434] audit: type=1326 audit(1529688727.238:1314): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19402 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:07 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) [ 796.507378] audit: type=1326 audit(1529688727.506:1315): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19422 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:07 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) setresgid(0x0, 0x0, 0x0) 17:32:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:08 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) [ 797.183597] audit: type=1326 audit(1529688728.182:1316): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19447 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f0000000400)={'team_slave_1\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 17:32:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) [ 797.491317] audit: type=1326 audit(1529688728.490:1317): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19477 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:09 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") [ 798.128920] audit: type=1326 audit(1529688729.127:1318): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19495 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:09 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, @dev}, &(0x7f0000000380)=0x1c) 17:32:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:09 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="ab527fd3fe3d4fd475b11222cc0a14f463490ad4f4715e0d85a925fac2f2fbfcb322b5f5e82e92748a53acfd77fc7978555bfc3ad3180cf7a05b4d8b942f7964f24d64d8e709915178fe8354088c1f736bf09bdaaf16bf05241bd2cd4513334ada94569815a8030233f1b58febc28546cbf267eabb672c9a15d9f96df95f6041b2f3418b748b3c6ca368e24b33148283e2e04027cc6b99afaebc429c4881ddfbd712e43e6b1a754693e2397e9126b3097eb2141b9c0e12d4a6689aaa114c3c6c60c4381860a0c61f2f868c480a5e67e016c3c0ad0d57cd691e12195915cf6eb223398181ffeb8f87ca48662af384cf53d5cfce5cee41d84ac589e0f0395a57e0") 17:32:09 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:10 executing program 0: setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000479000), 0x0) 17:32:10 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:10 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) [ 799.077640] audit: type=1326 audit(1529688730.076:1319): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19553 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) [ 799.142435] audit: type=1326 audit(1529688730.099:1320): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19561 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:10 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000180)) 17:32:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="ab527fd3fe3d4fd475b11222cc0a14f463490ad4f4715e0d85a925fac2f2fbfcb322b5f5e82e92748a53acfd77fc7978555bfc3ad3180cf7a05b4d8b942f7964f24d64d8e709915178fe8354088c1f736bf09bdaaf16bf05241bd2cd4513334ada94569815a8030233f1b58febc28546cbf267eabb672c9a15d9f96df95f6041b2f3418b748b3c6ca368e24b33148283e2e04027cc6b99afaebc429c4881ddfbd712e43e6b1a754693e2397e9126b3097eb2141b9c0e12d4a6689aaa114c3c6c60c4381860a0c61f2f868c480a5e67e016c3c0ad0d57cd691e12195915cf6eb223398181ffeb8f87ca48662af384cf53d5cfce5cee41d84ac589e0f0395a57e0") [ 800.054298] audit: type=1326 audit(1529688731.048:1321): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19615 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:11 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) [ 800.247130] kauditd_printk_skb: 2 callbacks suppressed [ 800.247152] audit: type=1326 audit(1529688731.243:1324): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19628 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:11 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000100), &(0x7f0000000140)=0x8) 17:32:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 17:32:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000240)="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") 17:32:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) [ 801.091545] audit: type=1326 audit(1529688732.090:1325): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19669 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) [ 801.201231] audit: type=1326 audit(1529688732.199:1326): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19674 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:12 executing program 1: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x0) 17:32:12 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f0000006b40), 0x0, 0x0) 17:32:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) [ 801.341879] audit: type=1326 audit(1529688732.340:1327): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19687 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000040)) [ 801.521862] audit: type=1326 audit(1529688732.520:1328): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19704 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:12 executing program 0: listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:13 executing program 0: listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), 0x14) 17:32:13 executing program 1: ppoll(&(0x7f0000000000), 0x0, &(0x7f0000000040), &(0x7f0000000080), 0x8) 17:32:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) [ 802.168437] audit: type=1326 audit(1529688733.167:1329): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19740 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000000c0), 0x8) 17:32:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="0001705f66411f657300") getdents(r0, &(0x7f0000000100)=""/139, 0x8b) 17:32:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) [ 802.333650] audit: type=1326 audit(1529688733.332:1330): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19754 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:13 executing program 0: listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:13 executing program 1: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) [ 802.515152] audit: type=1326 audit(1529688733.513:1331): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19764 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:13 executing program 1: ptrace$getregs(0x2, 0x0, 0x0, &(0x7f0000000000)=""/38) [ 802.581340] audit: type=1326 audit(1529688733.576:1332): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19772 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:13 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:14 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:14 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:32:14 executing program 2: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000015000/0xaa6000)=nil, 0xaa6000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000015ff8)={0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000abaff9)={0x3, 0xfff}, 0x10) 17:32:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) [ 803.578027] audit: type=1326 audit(1529688734.576:1333): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19824 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 17:32:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:15 executing program 7: dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:15 executing program 7: dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:16 executing program 7: dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:16 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) [ 805.690137] kauditd_printk_skb: 2 callbacks suppressed [ 805.690160] audit: type=1326 audit(1529688736.688:1336): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19940 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:16 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:17 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:17 executing program 1: keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:17 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:17 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) [ 806.669753] audit: type=1326 audit(1529688737.668:1337): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20016 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:17 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:17 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000200)=""/98, 0x62) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000100)={'ipvs\x00'}, &(0x7f0000000140)=0x1e) 17:32:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:18 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:18 executing program 3: pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:18 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) [ 807.648639] audit: type=1326 audit(1529688738.647:1338): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20065 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:18 executing program 3: pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:18 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:18 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:18 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:19 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:19 executing program 3: pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:19 executing program 6: accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clock_gettime(0x0, &(0x7f0000000000)) 17:32:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:19 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:19 executing program 6: accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clock_gettime(0x0, &(0x7f0000000000)) [ 808.889341] audit: type=1326 audit(1529688739.888:1339): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20131 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:19 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:19 executing program 6: accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) [ 809.118606] audit: type=1326 audit(1529688740.117:1340): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20150 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clock_gettime(0x0, &(0x7f0000000000)) 17:32:20 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) [ 809.822736] audit: type=1326 audit(1529688740.821:1341): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20192 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 809.880406] audit: type=1326 audit(1529688740.864:1342): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20200 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) [ 810.087808] audit: type=1326 audit(1529688741.086:1343): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20213 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) 17:32:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) [ 810.249925] audit: type=1326 audit(1529688741.248:1344): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20226 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)) 17:32:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) [ 810.816863] audit: type=1326 audit(1529688741.815:1345): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20242 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) [ 810.866181] audit: type=1326 audit(1529688741.855:1346): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20244 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) 17:32:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) [ 811.118016] audit: type=1326 audit(1529688742.116:1347): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20267 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) [ 811.202189] audit: type=1326 audit(1529688742.196:1348): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20275 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) [ 811.280554] audit: type=1326 audit(1529688742.278:1349): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20278 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) ptrace$setregset(0x4205, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)}) 17:32:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) [ 811.781173] audit: type=1326 audit(1529688742.779:1350): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20290 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) [ 811.847574] audit: type=1326 audit(1529688742.814:1351): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20297 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 811.914125] audit: type=1326 audit(1529688742.910:1352): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20302 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 17:32:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:23 executing program 0: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=""/127, &(0x7f0000000080)=0x7f) [ 812.214858] audit: type=1326 audit(1529688743.213:1353): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20321 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000200)) [ 812.305746] audit: type=1326 audit(1529688743.304:1354): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20328 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:23 executing program 0: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:23 executing program 0: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:23 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x0) 17:32:24 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "a2a2b3d0ef1f916c8e53589151e1ae2f0f400c75a2e0b91b8ed81cb584b56c86"}) 17:32:24 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000040)={'ah\x00'}, &(0x7f00000000c0)=0x1e) 17:32:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:24 executing program 4: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:25 executing program 4: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000003c0)={'broute\x00'}, &(0x7f0000000440)=0x78) 17:32:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:25 executing program 4: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 17:32:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:25 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:25 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:26 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:26 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:26 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:26 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:26 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:26 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:26 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:26 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:27 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) uname(&(0x7f00000001c0)=""/65) 17:32:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) [ 816.615599] kauditd_printk_skb: 6 callbacks suppressed [ 816.615624] audit: type=1326 audit(1529688747.614:1361): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20610 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:27 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) uname(&(0x7f00000001c0)=""/65) 17:32:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:27 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) uname(&(0x7f00000001c0)=""/65) 17:32:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) 17:32:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:28 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:28 executing program 6: getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:28 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) [ 817.539113] audit: type=1326 audit(1529688748.537:1362): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20653 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:28 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:28 executing program 6: getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:28 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) [ 817.760759] audit: type=1326 audit(1529688748.759:1363): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20675 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:29 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:29 executing program 6: getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) 17:32:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:29 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100), 0x10) 17:32:29 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) [ 818.779000] audit: type=1326 audit(1529688749.777:1364): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20731 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) [ 818.865922] audit: type=1326 audit(1529688749.841:1365): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20740 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:30 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:30 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 17:32:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) add_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffff8) eventfd(0x0) 17:32:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) [ 819.769259] audit: type=1326 audit(1529688750.767:1366): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20788 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) [ 819.846279] audit: type=1326 audit(1529688750.802:1367): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20787 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 819.866295] audit: type=1326 audit(1529688750.828:1368): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20802 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000280)={{0x0, @loopback=0x7f000001, 0x0, 0x0, 'sed\x00'}, {@dev={0xac, 0x14, 0x14}}}, 0x44) 17:32:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) unlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:32:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) [ 820.794370] audit: type=1326 audit(1529688751.793:1369): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20844 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) [ 820.862921] audit: type=1326 audit(1529688751.816:1370): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20846 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000140)) 17:32:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sched_rr_get_interval(0x0, &(0x7f0000000100)) [ 821.727300] kauditd_printk_skb: 2 callbacks suppressed [ 821.727320] audit: type=1326 audit(1529688752.725:1373): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20897 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) timer_gettime(0x0, &(0x7f00000000c0)) [ 821.798603] audit: type=1326 audit(1529688752.752:1374): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20896 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 821.818643] audit: type=1326 audit(1529688752.780:1375): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20905 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000300)={'filter\x00', 0x7, 0x4, 0x580, 0x0, 0x0, 0x358, 0x498, 0x498, 0x498, 0x4, &(0x7f0000000200), {[{{@uncond, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x0, 0x0, 'system_u:object_r:klogd_var_run_t:s0\x00'}}}, {{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast2=0xe0000002, 0x0, 0x0, @empty, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_bond\x00', 'dummy0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@random="df7913fecf98", @mac=@dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, @remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr}}}, {{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr, 0x0, 0x0, @mac=@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bridge_slave_1\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @mac=@random="c559c2bfde4b", @multicast2=0xe0000002, @rand_addr}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x5d0) 17:32:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) [ 822.050502] audit: type=1326 audit(1529688753.049:1376): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20918 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) [ 822.218173] audit: type=1326 audit(1529688753.216:1377): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20929 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:33 executing program 0: timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:33 executing program 0: timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:33 executing program 7: [ 822.716998] audit: type=1326 audit(1529688753.715:1378): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20952 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:33 executing program 7: [ 822.770294] audit: type=1326 audit(1529688753.736:1379): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20953 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000240)={@mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @dev={0xfe, 0x80}}) 17:32:33 executing program 0: timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:33 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) [ 822.992797] audit: type=1326 audit(1529688753.990:1380): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20975 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCSREP(0xffffffffffffffff, 0x40084503, &(0x7f0000000200)) 17:32:34 executing program 7: 17:32:34 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:34 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) [ 823.149110] audit: type=1326 audit(1529688754.147:1381): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20983 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) uname(&(0x7f00000001c0)=""/65) 17:32:34 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:34 executing program 7: 17:32:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80}, @empty, @dev={0xfe, 0x80}}) 17:32:34 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:34 executing program 7: [ 823.671915] audit: type=1326 audit(1529688754.670:1382): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21005 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:34 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:34 executing program 7: 17:32:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockname$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000300)=0x14) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f0000000200)) 17:32:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:35 executing program 2: 17:32:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:35 executing program 5: 17:32:35 executing program 2: 17:32:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:35 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:35 executing program 3: 17:32:35 executing program 2: 17:32:35 executing program 5: 17:32:35 executing program 6: 17:32:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:35 executing program 5: 17:32:35 executing program 2: 17:32:35 executing program 3: 17:32:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:35 executing program 6: 17:32:35 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:36 executing program 5: 17:32:36 executing program 2: 17:32:36 executing program 3: 17:32:36 executing program 6: 17:32:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:36 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:36 executing program 2: 17:32:36 executing program 3: 17:32:36 executing program 5: 17:32:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:36 executing program 6: 17:32:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:36 executing program 2: 17:32:36 executing program 3: 17:32:36 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:36 executing program 5: 17:32:36 executing program 6: 17:32:36 executing program 2: 17:32:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:36 executing program 3: 17:32:36 executing program 5: 17:32:36 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:36 executing program 2: 17:32:36 executing program 6: 17:32:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:37 executing program 3: 17:32:37 executing program 5: 17:32:37 executing program 2: 17:32:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:37 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:37 executing program 6: 17:32:37 executing program 3: 17:32:37 executing program 2: 17:32:37 executing program 5: 17:32:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:37 executing program 6: 17:32:37 executing program 7: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:37 executing program 5: 17:32:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:37 executing program 2: 17:32:37 executing program 6: 17:32:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:37 executing program 3: 17:32:37 executing program 7: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:37 executing program 5: 17:32:37 executing program 6: 17:32:37 executing program 3: 17:32:37 executing program 5: [ 826.930745] kauditd_printk_skb: 2 callbacks suppressed [ 826.930769] audit: type=1326 audit(1529688757.925:1385): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21213 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:38 executing program 2: 17:32:38 executing program 7: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:38 executing program 3: [ 827.090516] audit: type=1326 audit(1529688757.982:1386): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21219 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:38 executing program 5: 17:32:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) timer_create(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000080)) timer_gettime(0x0, &(0x7f00000000c0)) 17:32:38 executing program 6: 17:32:38 executing program 2: 17:32:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:38 executing program 3: 17:32:38 executing program 5: 17:32:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) [ 827.833467] audit: type=1326 audit(1529688758.832:1387): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21247 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 827.895718] audit: type=1326 audit(1529688758.894:1388): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21250 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:38 executing program 3: 17:32:38 executing program 2: 17:32:39 executing program 6: 17:32:39 executing program 5: 17:32:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:39 executing program 5: 17:32:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)}, &(0x7f00000000c0)) 17:32:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) [ 828.862841] audit: type=1326 audit(1529688759.861:1389): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21296 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) [ 829.025133] audit: type=1326 audit(1529688760.010:1390): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21312 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) inotify_init() 17:32:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000000c0)=""/121) 17:32:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) inotify_init() 17:32:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000000c0)=""/121) 17:32:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) [ 830.162696] audit: type=1326 audit(1529688761.161:1391): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21380 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) inotify_init() 17:32:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f00000000c0)=""/121) 17:32:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) [ 830.491426] audit: type=1326 audit(1529688761.489:1392): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21405 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000140)={0x10}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=@updpolicy={0xb8, 0x19, 0x0, 0x0, 0x0, {{@in6=@dev={0xfe, 0x80}, @in=@multicast2=0xe0000002}}}, 0xb8}, 0x1}, 0x0) 17:32:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:42 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x0, @loopback=0x7f000001}}) 17:32:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) [ 831.072279] audit: type=1326 audit(1529688762.070:1393): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21419 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:42 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x0, @loopback=0x7f000001}}) 17:32:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:42 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:42 executing program 6: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) [ 831.521155] audit: type=1326 audit(1529688762.519:1394): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21455 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:42 executing program 0: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:42 executing program 3: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:42 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x0, @loopback=0x7f000001}}) 17:32:42 executing program 6: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:42 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:43 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000000)={'bpq0\x00', {0x2, 0x0, @loopback=0x7f000001}}) 17:32:43 executing program 0: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:43 executing program 3: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) 17:32:43 executing program 6: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:43 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:43 executing program 3: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:43 executing program 0: memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) recvmmsg(0xffffffffffffff9c, &(0x7f0000005d80), 0x0, 0x0, 0x0) 17:32:43 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 832.570641] audit: type=1326 audit(1529688763.568:1395): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21525 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:43 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:44 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:44 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:44 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:44 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:45 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:45 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 834.488335] audit: type=1326 audit(1529688765.486:1396): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21663 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:45 executing program 1: socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:46 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:46 executing program 4: pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) [ 835.469220] audit: type=1326 audit(1529688766.467:1397): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21734 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:46 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:46 executing program 4: pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) [ 835.682895] audit: type=1326 audit(1529688766.681:1398): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21746 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:46 executing program 4: pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 835.771108] audit: type=1326 audit(1529688766.751:1399): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21753 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) inotify_init() 17:32:47 executing program 7: shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:47 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:47 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 836.393570] audit: type=1326 audit(1529688767.392:1400): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21769 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:47 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 836.462899] audit: type=1326 audit(1529688767.435:1401): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21773 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:47 executing program 7: shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:47 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:47 executing program 7: shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) [ 836.732028] audit: type=1326 audit(1529688767.730:1402): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21799 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 836.819458] audit: type=1326 audit(1529688767.817:1403): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21810 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) [ 837.393128] audit: type=1326 audit(1529688768.391:1404): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21827 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) 17:32:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 837.745611] kauditd_printk_skb: 1 callbacks suppressed [ 837.745634] audit: type=1326 audit(1529688768.743:1406): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21857 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 17:32:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 837.894215] audit: type=1326 audit(1529688768.892:1407): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21865 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 837.960235] audit: type=1326 audit(1529688768.954:1408): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21869 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, {0xa}}, 0x5c) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)) 17:32:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) [ 838.374555] audit: type=1326 audit(1529688769.373:1409): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21880 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) [ 838.432014] audit: type=1326 audit(1529688769.399:1410): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21885 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) fsync(0xffffffffffffffff) 17:32:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) [ 838.821187] audit: type=1326 audit(1529688769.818:1411): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21910 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 838.965556] audit: type=1326 audit(1529688769.964:1412): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21923 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000040)) 17:32:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) [ 839.365493] audit: type=1326 audit(1529688770.364:1413): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21939 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) [ 839.648941] audit: type=1326 audit(1529688770.647:1414): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21960 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:50 executing program 2: syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) [ 839.825257] audit: type=1326 audit(1529688770.823:1415): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21971 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:32:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:51 executing program 2: syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:51 executing program 2: syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:32:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:51 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:52 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:52 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:52 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_INFO(0x0, 0xe, &(0x7f00000000c0)=""/170) 17:32:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:52 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:52 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) 17:32:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) fsync(0xffffffffffffffff) 17:32:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:52 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:52 executing program 0: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:53 executing program 0: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:53 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000200)}) 17:32:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:53 executing program 0: sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:53 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:53 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:54 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) [ 843.022551] kauditd_printk_skb: 4 callbacks suppressed [ 843.022576] audit: type=1326 audit(1529688774.013:1420): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22169 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) [ 844.011236] audit: type=1326 audit(1529688775.009:1421): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22240 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:55 executing program 1: open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) [ 844.164999] audit: type=1326 audit(1529688775.163:1422): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22249 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$evdev(&(0x7f0000004e40)='/dev/input/event#\x00', 0x0, 0x0) prctl$setmm(0x23, 0x0, &(0x7f0000ffa000/0x3000)=nil) 17:32:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:55 executing program 6: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:55 executing program 1: open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:56 executing program 1: open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) [ 844.972591] audit: type=1326 audit(1529688775.970:1423): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22282 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:56 executing program 6: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:56 executing program 7: socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:56 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) [ 845.202086] audit: type=1326 audit(1529688776.200:1424): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22295 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) [ 845.293304] audit: type=1326 audit(1529688776.244:1425): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22300 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:56 executing program 6: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:56 executing program 7: socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:56 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:56 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) [ 845.906754] audit: type=1326 audit(1529688776.905:1426): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22324 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:57 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000002c0)={'filter\x00', 0x7, 0x4, 0x478, 0x278, 0x0, 0x138, 0x390, 0x390, 0x390, 0x4, &(0x7f0000000040), {[{{@uncond, 0xf0, 0x138}, @unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x0, 'syz1\x00'}}}, {{@arp={@loopback=0x7f000001, @loopback=0x7f000001, 0x0, 0x0, @mac=@link_local={0x1, 0x80, 0xc2}, {}, @empty, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bpq0\x00', 'veth1_to_bridge\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, @mac=@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'ip6_vti0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00'}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4c8) 17:32:57 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:57 executing program 7: socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:57 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:32:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) [ 846.201449] audit: type=1326 audit(1529688777.183:1427): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22347 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:57 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) [ 846.331334] audit: type=1326 audit(1529688777.329:1428): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22363 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:57 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:57 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:32:57 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) [ 846.882791] audit: type=1326 audit(1529688777.880:1429): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22385 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:57 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:58 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:32:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) sendmsg$IPVS_CMD_SET_INFO(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[]}, 0x1}, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x7530}, 0x10) 17:32:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:58 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:58 executing program 5: r0 = socket(0x10, 0x2, 0x0) getpeername(r0, &(0x7f0000000380)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffc88) 17:32:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140)=""/40, &(0x7f00000001c0)=0x28) 17:32:58 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:58 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) socket$nl_route(0x10, 0x3, 0x0) 17:32:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:58 executing program 5: ioctl$sock_inet6_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000b40)={@remote={0xfe, 0x80, [], 0xbb}, @mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}}) 17:32:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 17:32:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000000), 0x4) 17:32:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:59 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) socket$nl_route(0x10, 0x3, 0x0) 17:32:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000000c0)) 17:32:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:32:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:32:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:59 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) socket$nl_route(0x10, 0x3, 0x0) 17:32:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000000c0)) 17:32:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 848.759771] kauditd_printk_skb: 2 callbacks suppressed [ 848.759795] audit: type=1326 audit(1529688779.758:1432): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22480 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:32:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:32:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:32:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:32:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000000c0)) 17:32:59 executing program 2: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:33:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:33:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:33:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:33:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:33:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f00000000c0)) 17:33:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:00 executing program 2: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:33:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:33:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 849.716572] audit: type=1326 audit(1529688780.715:1433): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22538 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:00 executing program 2: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) [ 849.799212] audit: type=1326 audit(1529688780.748:1434): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22542 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 849.819183] audit: type=1326 audit(1529688780.765:1435): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22550 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) memfd_create(&(0x7f0000000000)='veth0_to_bridge\x00', 0x0) socket$packet(0x11, 0x0, 0x300) 17:33:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:00 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:33:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 850.056716] audit: type=1326 audit(1529688781.055:1436): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22566 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000180)) 17:33:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 17:33:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) open(&(0x7f0000004600)='./file0\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000003080)) 17:33:01 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000180)) 17:33:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) [ 850.647981] audit: type=1326 audit(1529688781.646:1437): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22585 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 850.744176] audit: type=1326 audit(1529688781.742:1438): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22592 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:01 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 850.805592] audit: type=1326 audit(1529688781.770:1439): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22598 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) ioctl$RNDZAPENTCNT(0xffffffffffffffff, 0x5204, &(0x7f0000000180)) 17:33:02 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:33:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 851.100174] audit: type=1326 audit(1529688782.098:1440): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22618 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) [ 851.580674] audit: type=1326 audit(1529688782.579:1441): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22638 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000000)={0x0, {{0xa}}}, 0x88) 17:33:02 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:02 executing program 3: pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:02 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:02 executing program 3: pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:02 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:02 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xd}}, 0x14}, 0x1}, 0x0) 17:33:03 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:03 executing program 3: pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:03 executing program 5: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:03 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:33:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:03 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:04 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:05 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) [ 854.086777] kauditd_printk_skb: 3 callbacks suppressed [ 854.086800] audit: type=1326 audit(1529688785.085:1445): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22797 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:05 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:05 executing program 1: open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:05 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 17:33:05 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:05 executing program 1: open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) tgkill(0x0, 0x0, 0x0) 17:33:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 855.044901] audit: type=1326 audit(1529688786.043:1446): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22832 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:06 executing program 1: open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:06 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) tgkill(0x0, 0x0, 0x0) [ 855.112492] audit: type=1326 audit(1529688786.070:1447): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22837 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) tgkill(0x0, 0x0, 0x0) 17:33:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:06 executing program 7: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 17:33:07 executing program 7: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:07 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:07 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:07 executing program 6: setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) [ 856.146449] audit: type=1326 audit(1529688787.145:1448): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22896 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:07 executing program 4: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) [ 856.255910] audit: type=1326 audit(1529688787.231:1449): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22904 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:07 executing program 7: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:07 executing program 6: setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:07 executing program 4: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:08 executing program 6: setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) sendto$packet(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 857.045027] audit: type=1326 audit(1529688788.043:1450): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22954 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:08 executing program 4: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:08 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:08 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) [ 857.192428] audit: type=1326 audit(1529688788.190:1451): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22969 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:08 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:08 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:08 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:09 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) [ 858.160841] audit: type=1326 audit(1529688789.159:1452): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23020 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:10 executing program 2: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000140)={'filter\x00', 0x2, [{}, {}]}, 0x48) [ 859.114192] audit: type=1326 audit(1529688790.112:1453): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23061 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) [ 859.175819] audit: type=1326 audit(1529688790.139:1454): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23060 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:10 executing program 2: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) [ 859.334733] audit: type=1326 audit(1529688790.333:1455): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23082 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) nanosleep(&(0x7f0000000080), 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x0, 0x0) 17:33:10 executing program 2: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:11 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) [ 860.108635] audit: type=1326 audit(1529688791.107:1456): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23120 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:11 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) [ 860.221726] audit: type=1326 audit(1529688791.140:1457): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23121 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:11 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) [ 860.328187] audit: type=1326 audit(1529688791.324:1458): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23135 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000000040)) 17:33:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000280)) 17:33:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) [ 861.033229] audit: type=1326 audit(1529688792.031:1459): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23163 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) [ 861.137252] audit: type=1326 audit(1529688792.104:1460): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23170 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 861.157198] audit: type=1326 audit(1529688792.127:1461): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23171 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setitimer(0x0, &(0x7f0000009940)={{}, {0x0, 0x2710}}, &(0x7f0000009980)) 17:33:12 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:12 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) [ 861.325244] audit: type=1326 audit(1529688792.189:1462): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23172 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:12 executing program 3: creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:13 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) fstat(0xffffffffffffffff, &(0x7f00000001c0)) 17:33:13 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000000)=@nl=@proc={0x10}, 0x80, &(0x7f0000000700)}, 0x48080) 17:33:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:13 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{0x77359400}, {0x0, 0x7530}}, 0x0) 17:33:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:13 executing program 7: setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000001b80), 0x4) 17:33:13 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:13 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000300)='vegas\x00', 0x6) tgkill(0x0, 0x0, 0x0) 17:33:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000001740)=""/98, 0x62) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000001700)) 17:33:14 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 17:33:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:14 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:14 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$getflags(0xffffffffffffffff, 0x0) 17:33:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:15 executing program 0: socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) [ 864.470228] kauditd_printk_skb: 7 callbacks suppressed [ 864.470254] audit: type=1326 audit(1529688795.468:1470): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23367 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:15 executing program 7: signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) [ 864.608430] audit: type=1326 audit(1529688795.607:1471): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23379 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:15 executing program 0: socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:15 executing program 7: signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:15 executing program 0: socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:16 executing program 7: signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) [ 865.624199] audit: type=1326 audit(1529688796.622:1472): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23444 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) [ 865.742374] audit: type=1326 audit(1529688796.739:1473): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23451 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 17:33:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) [ 866.618728] audit: type=1326 audit(1529688797.617:1474): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23508 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) [ 866.819785] audit: type=1326 audit(1529688797.818:1475): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23515 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xffffffffffffffff) getsockname$packet(0xffffffffffffff9c, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000480)=0x14) 17:33:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @dev={0xac, 0x14, 0x14}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 'bpq0\x00'}) 17:33:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:18 executing program 3: setsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}}, {{@in6=@mcast1={0xff, 0x1, [], 0x1}}, 0x0, @in=@multicast1=0xe0000001}}, 0xe8) 17:33:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) [ 867.902414] audit: type=1326 audit(1529688798.900:1476): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23582 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) [ 868.010833] audit: type=1326 audit(1529688799.009:1477): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23592 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:19 executing program 2: socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:19 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:19 executing program 6: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:19 executing program 2: socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:19 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:19 executing program 6: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:20 executing program 2: socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) [ 869.090667] audit: type=1326 audit(1529688800.089:1478): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23657 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:20 executing program 4: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:20 executing program 6: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) [ 869.214296] audit: type=1326 audit(1529688800.192:1479): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23670 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:20 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000180), 0x8, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000040)) 17:33:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:20 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) [ 870.021727] kauditd_printk_skb: 1 callbacks suppressed [ 870.021750] audit: type=1326 audit(1529688801.020:1481): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23720 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:21 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:21 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) [ 870.245422] audit: type=1326 audit(1529688801.244:1482): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23732 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) [ 870.391935] audit: type=1326 audit(1529688801.390:1483): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23746 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:21 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:21 executing program 3: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) 17:33:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) socket$inet_tcp(0x2, 0x1, 0x0) [ 871.187137] audit: type=1326 audit(1529688802.185:1484): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23789 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000001c80)}) 17:33:22 executing program 3: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:22 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) socket$inet_tcp(0x2, 0x1, 0x0) 17:33:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) [ 871.352013] audit: type=1326 audit(1529688802.350:1485): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23806 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:22 executing program 3: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:22 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) socket$inet_tcp(0x2, 0x1, 0x0) 17:33:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:23 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) socket$inet_tcp(0x2, 0x1, 0x0) 17:33:23 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:23 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:23 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:23 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) nanosleep(&(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 17:33:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) [ 872.429959] audit: type=1326 audit(1529688803.428:1486): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23868 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) [ 872.513409] audit: type=1326 audit(1529688803.492:1487): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23867 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:23 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:23 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) [ 872.938525] audit: type=1326 audit(1529688803.937:1488): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23909 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) [ 873.394756] audit: type=1326 audit(1529688804.393:1489): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23925 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) [ 873.425688] audit: type=1326 audit(1529688804.423:1490): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23930 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 17:33:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f00000000c0)=""/166, 0xa6) 17:33:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:25 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f00000000c0)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 17:33:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:25 executing program 7: socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:26 executing program 7: socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 875.354576] kauditd_printk_skb: 7 callbacks suppressed [ 875.354600] audit: type=1326 audit(1529688806.353:1498): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24026 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:26 executing program 7: socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:26 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000001d80)) 17:33:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 875.600742] audit: type=1326 audit(1529688806.599:1499): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24050 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:26 executing program 1: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:26 executing program 0: socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:26 executing program 1: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) open$dir(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 17:33:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0xffffffffffffff9c}, 0x20) semget(0xffffffffffffffff, 0x0, 0x0) 17:33:27 executing program 0: socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:27 executing program 1: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) [ 876.335456] audit: type=1326 audit(1529688807.333:1500): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24103 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:27 executing program 2: pipe(&(0x7f00000011c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xffffffffffffff95) 17:33:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:27 executing program 0: socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:28 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:28 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:28 executing program 5: r0 = socket(0x1, 0x5, 0x0) recvfrom(r0, &(0x7f0000000000)=""/71, 0x47, 0x0, &(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback=0x7f000001}}}, 0x80) 17:33:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:28 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:28 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:29 executing program 6: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:29 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:29 executing program 6: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:29 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:29 executing program 6: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:29 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:29 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:30 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 878.997789] audit: type=1326 audit(1529688809.996:1501): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24312 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:30 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:30 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) [ 879.127591] audit: type=1326 audit(1529688810.126:1502): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24323 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:30 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:30 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:30 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:30 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:30 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) [ 879.955022] audit: type=1326 audit(1529688810.953:1503): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24378 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:31 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:31 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:31 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:31 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:31 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 880.148331] audit: type=1326 audit(1529688811.147:1504): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24397 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:31 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:31 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f00000000c0)) 17:33:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:31 executing program 5: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:31 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) [ 880.882005] audit: type=1326 audit(1529688811.880:1505): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24425 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 880.945710] audit: type=1326 audit(1529688811.929:1506): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24432 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 17:33:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:32 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:32 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 881.115241] audit: type=1326 audit(1529688812.113:1507): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24444 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:32 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) [ 881.872523] audit: type=1326 audit(1529688812.871:1508): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24476 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:33 executing program 1: ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:33:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:33 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) [ 882.310274] audit: type=1326 audit(1529688813.308:1509): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24515 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000400)=""/34) 17:33:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:33 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) [ 882.825819] audit: type=1326 audit(1529688813.824:1510): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24527 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 882.891999] audit: type=1326 audit(1529688813.883:1511): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24539 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) [ 882.995496] audit: type=1326 audit(1529688813.973:1512): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24543 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) [ 883.307640] audit: type=1326 audit(1529688814.306:1513): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24568 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) [ 883.819102] audit: type=1326 audit(1529688814.817:1514): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24579 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:35 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:35 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f00000001c0)=@random={'os2.', '+(\x00'}) 17:33:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:35 executing program 1: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/urandom\x00', 0x0, 0x0) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000980)='cgroup.subtree_control\x00', 0x2, 0x0) 17:33:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:35 executing program 1: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:35 executing program 1: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x0) 17:33:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:35 executing program 7: pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:36 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:36 executing program 7: pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:36 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:36 executing program 7: pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:36 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:36 executing program 0: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, &(0x7f0000000180)) 17:33:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180), 0x14) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:33:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:36 executing program 0: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:36 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 886.064148] kauditd_printk_skb: 9 callbacks suppressed [ 886.064168] audit: type=1326 audit(1529688817.062:1524): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24713 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:37 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:37 executing program 0: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:37 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:37 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) readahead(0xffffffffffffffff, 0x0, 0x0) 17:33:38 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:38 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) 17:33:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000780)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000780)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) [ 887.729377] audit: type=1326 audit(1529688818.728:1525): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24824 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000780)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:39 executing program 6: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:39 executing program 4: socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:39 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:39 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) close(0xffffffffffffffff) 17:33:39 executing program 6: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:39 executing program 4: socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:39 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) [ 888.661179] audit: type=1326 audit(1529688819.659:1526): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24884 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:39 executing program 6: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:39 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) [ 888.723354] audit: type=1326 audit(1529688819.700:1527): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24893 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:39 executing program 4: socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) close(0xffffffffffffffff) 17:33:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:40 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) [ 889.033840] audit: type=1326 audit(1529688820.032:1528): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24915 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:40 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) 17:33:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) close(0xffffffffffffffff) 17:33:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:40 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 889.643577] audit: type=1326 audit(1529688820.642:1529): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24937 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) [ 889.714994] audit: type=1326 audit(1529688820.692:1530): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24946 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:40 executing program 3: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:40 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) [ 890.083685] audit: type=1326 audit(1529688821.082:1531): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24973 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:41 executing program 3: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000140), 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x0, 0x0) [ 890.640471] audit: type=1326 audit(1529688821.639:1532): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24990 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:41 executing program 3: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:41 executing program 5: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:41 executing program 1: ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 17:33:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000640)=""/232) 17:33:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:42 executing program 1: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10}, 0xc) 17:33:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:42 executing program 5: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 891.161654] audit: type=1326 audit(1529688822.160:1533): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25036 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:42 executing program 5: accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:42 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) [ 891.749894] audit: type=1326 audit(1529688822.747:1534): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25084 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:43 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:43 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) [ 892.354381] audit: type=1326 audit(1529688823.352:1535): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25116 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 892.470846] audit: type=1326 audit(1529688823.447:1536): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25125 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) [ 892.822002] audit: type=1326 audit(1529688823.820:1537): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25153 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 893.283996] audit: type=1326 audit(1529688824.282:1538): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25182 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) [ 893.441932] audit: type=1326 audit(1529688824.440:1539): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25193 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)={'raw\x00', 0x2, [{}, {}]}, 0x48) 17:33:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') [ 893.851206] audit: type=1326 audit(1529688824.849:1540): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25215 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000200)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) 17:33:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) [ 894.264006] audit: type=1326 audit(1529688825.262:1541): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25237 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 17:33:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:45 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:45 executing program 0: pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:45 executing program 7: accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) [ 894.387532] audit: type=1326 audit(1529688825.386:1542): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25240 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:45 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:45 executing program 0: pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:45 executing program 7: accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGKEY(0xffffffffffffffff, 0x80404518, &(0x7f0000000340)=""/158) 17:33:45 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:45 executing program 7: accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:45 executing program 0: pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:46 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:46 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:46 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:46 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:46 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:47 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) [ 896.261117] kauditd_printk_skb: 3 callbacks suppressed [ 896.261139] audit: type=1326 audit(1529688827.259:1546): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25357 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 17:33:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 896.534334] audit: type=1326 audit(1529688827.532:1547): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25375 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000000)) close(0xffffffffffffffff) 17:33:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 897.181525] audit: type=1326 audit(1529688828.180:1548): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25397 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 897.706409] audit: type=1326 audit(1529688828.705:1549): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25441 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:49 executing program 4: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:49 executing program 4: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:49 executing program 6: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) [ 898.366677] audit: type=1326 audit(1529688829.365:1550): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25474 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:49 executing program 4: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:49 executing program 6: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:49 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 898.701666] audit: type=1326 audit(1529688829.700:1551): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25498 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:49 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:49 executing program 6: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) [ 898.783938] audit: type=1326 audit(1529688829.743:1552): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25501 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:50 executing program 2: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:50 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 899.322778] audit: type=1326 audit(1529688830.320:1553): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25536 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@multicast2}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) lchown(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:33:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000780)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) [ 899.669472] audit: type=1326 audit(1529688830.667:1554): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25546 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:50 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000780)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 899.744539] audit: type=1326 audit(1529688830.735:1555): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25558 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000040)) 17:33:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000780)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) getpeername$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f00000001c0)=0x6e) 17:33:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:51 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:51 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:52 executing program 3: socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:52 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:52 executing program 3: socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:52 executing program 7: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 901.648917] kauditd_printk_skb: 2 callbacks suppressed [ 901.648941] audit: type=1326 audit(1529688832.647:1558): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25659 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:52 executing program 3: socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:53 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) [ 902.058166] audit: type=1326 audit(1529688833.056:1559): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25693 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:33:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:53 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) capget(&(0x7f0000000000), &(0x7f0000000080)) [ 902.579353] audit: type=1326 audit(1529688833.578:1560): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25721 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) [ 902.660121] audit: type=1326 audit(1529688833.609:1561): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25727 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:54 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) [ 903.086622] audit: type=1326 audit(1529688834.085:1562): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25761 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:54 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 903.572680] audit: type=1326 audit(1529688834.571:1563): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25773 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:54 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) [ 903.640169] audit: type=1326 audit(1529688834.599:1564): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25781 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x80) 17:33:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:55 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 904.096808] audit: type=1326 audit(1529688835.095:1565): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25814 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 17:33:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:55 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000180), 0x4) 17:33:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) [ 904.630759] audit: type=1326 audit(1529688835.629:1566): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25844 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:55 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) [ 904.796991] audit: type=1326 audit(1529688835.795:1567): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25849 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:33:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:55 executing program 7: syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:55 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:33:56 executing program 7: syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:56 executing program 7: syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:33:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:33:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:33:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:33:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:33:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:33:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:33:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:33:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:33:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 17:33:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:33:57 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:33:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 906.805857] kauditd_printk_skb: 2 callbacks suppressed [ 906.805877] audit: type=1326 audit(1529688837.804:1570): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25974 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:33:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:33:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:33:58 executing program 4: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:33:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') [ 907.252238] audit: type=1326 audit(1529688838.250:1571): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26000 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:33:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:33:58 executing program 4: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:33:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:33:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 907.752035] audit: type=1326 audit(1529688838.750:1572): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26021 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:58 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:33:58 executing program 4: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:33:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:33:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:33:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f00000000c0)=""/95) 17:33:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:33:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:33:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') [ 908.273620] audit: type=1326 audit(1529688839.272:1573): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26055 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 908.350322] audit: type=1326 audit(1529688839.307:1574): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26061 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:33:59 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:33:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:33:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:33:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:33:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) [ 908.734639] audit: type=1326 audit(1529688839.733:1575): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26081 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:33:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:33:59 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:33:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:33:59 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) [ 908.955845] audit: type=1326 audit(1529688839.954:1576): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26090 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000780)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:34:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:34:00 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:34:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000780)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) [ 909.318679] audit: type=1326 audit(1529688840.317:1577): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26110 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) capget(&(0x7f0000000000), &(0x7f0000000080)) 17:34:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) [ 909.748734] audit: type=1326 audit(1529688840.747:1578): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26128 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:34:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000780)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:34:00 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:34:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:34:01 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:01 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) [ 910.026637] audit: type=1326 audit(1529688841.025:1579): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26146 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 17:34:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:34:01 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:01 executing program 5: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:34:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:34:01 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:01 executing program 1: ioctl$TCGETS(0xffffffffffffffff, 0x5401, &(0x7f0000000080)) 17:34:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') 17:34:02 executing program 1: getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xffffffffffffffe5) 17:34:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:34:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:02 executing program 5: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:34:02 executing program 5: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:02 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:34:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:34:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:03 executing program 3: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) [ 912.095209] kauditd_printk_skb: 3 callbacks suppressed [ 912.095232] audit: type=1326 audit(1529688843.093:1583): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26257 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:03 executing program 3: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:34:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000380)) 17:34:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:03 executing program 3: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:34:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) [ 913.059509] audit: type=1326 audit(1529688844.058:1584): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26309 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:04 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) [ 913.273120] audit: type=1326 audit(1529688844.271:1585): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26328 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:04 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) [ 913.422210] audit: type=1326 audit(1529688844.420:1586): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26342 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:04 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:04 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:05 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:34:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) [ 914.386176] audit: type=1326 audit(1529688845.384:1587): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26386 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:05 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:05 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) [ 914.552518] audit: type=1326 audit(1529688845.551:1588): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26402 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:05 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:05 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:05 executing program 7: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:05 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) [ 914.731473] audit: type=1326 audit(1529688845.730:1589): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26413 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:06 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f0000000140)) 17:34:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:06 executing program 7: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:06 executing program 0: getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) [ 915.341985] audit: type=1326 audit(1529688846.340:1590): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26441 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/164, 0xa4) 17:34:06 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:06 executing program 7: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) [ 915.579817] audit: type=1326 audit(1529688846.578:1591): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26461 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:06 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:06 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) [ 915.784234] audit: type=1326 audit(1529688846.782:1592): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26477 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:07 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:07 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:07 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:07 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 17:34:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:07 executing program 4: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:07 executing program 4: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) [ 917.465197] kauditd_printk_skb: 2 callbacks suppressed [ 917.465225] audit: type=1326 audit(1529688848.463:1595): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26561 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:08 executing program 4: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:08 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000340)) 17:34:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:09 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) [ 918.412490] audit: type=1326 audit(1529688849.411:1596): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26608 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) [ 918.501683] audit: type=1326 audit(1529688849.470:1597): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26623 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:09 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) [ 918.624702] audit: type=1326 audit(1529688849.614:1598): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26627 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:09 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) [ 918.703515] audit: type=1326 audit(1529688849.659:1599): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26632 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:10 executing program 3: ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000140)) 17:34:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:10 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) [ 919.439773] audit: type=1326 audit(1529688850.438:1600): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26659 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:10 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) [ 919.720187] audit: type=1326 audit(1529688850.717:1601): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26677 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:10 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) [ 919.826256] audit: type=1326 audit(1529688850.819:1602): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26690 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:10 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockname(0xffffffffffffffff, &(0x7f0000001600), &(0x7f0000001680)=0x80) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 17:34:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:11 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:11 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:11 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:11 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 920.450655] audit: type=1326 audit(1529688851.449:1603): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26719 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:11 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000280)) 17:34:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8910, &(0x7f00000002c0)=@buf={0x0, &(0x7f0000000140)}) 17:34:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:11 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:11 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:11 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) [ 920.735686] audit: type=1326 audit(1529688851.734:1604): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26734 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:11 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:12 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:12 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:12 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:12 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:12 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:12 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:12 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000001c0)=0xc) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000200)) 17:34:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:12 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:12 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:13 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000440)={"73797a5f74756e0000000f00", 0x0}) sendmsg$nl_route(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000003c00)=@newneigh={0x30, 0x1c, 0x331, 0x0, 0x0, {0xa, 0x0, 0x0, r1}, [@NDA_DST_IPV6={0x14, 0x1, @mcast2={0xff, 0x2, [], 0x1}}]}, 0x30}, 0x1}, 0x0) 17:34:13 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:13 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 17:34:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:13 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:13 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) [ 922.820874] kauditd_printk_skb: 3 callbacks suppressed [ 922.820898] audit: type=1326 audit(1529688853.819:1608): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26857 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:13 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:13 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:14 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:14 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) munlockall() 17:34:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 17:34:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) [ 923.790673] audit: type=1326 audit(1529688854.789:1609): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26899 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) [ 923.841204] audit: type=1326 audit(1529688854.811:1610): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26896 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:14 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:14 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) munlockall() 17:34:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:15 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:15 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:15 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) munlockall() 17:34:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:15 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:15 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:15 executing program 7: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 924.739873] audit: type=1326 audit(1529688855.738:1611): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26950 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) [ 924.811752] audit: type=1326 audit(1529688855.772:1612): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26953 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:15 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:15 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:15 executing program 7: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:16 executing program 7: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'IDLETIMER\x00'}, &(0x7f0000000140)=0x1e) 17:34:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:16 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 925.683123] audit: type=1326 audit(1529688856.681:1613): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27004 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:16 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) [ 925.763166] audit: type=1326 audit(1529688856.750:1614): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27012 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:16 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) [ 925.859874] audit: type=1326 audit(1529688856.782:1615): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27013 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:16 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:17 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:17 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:17 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5020f}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) [ 926.694740] audit: type=1326 audit(1529688857.693:1616): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27049 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:17 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:17 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:18 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5020f}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/108, &(0x7f00000000c0)=0x6c) 17:34:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:18 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:18 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5020f}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) [ 927.632522] audit: type=1326 audit(1529688858.631:1617): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27102 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:18 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:18 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5020f}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) [ 927.902271] audit: type=1326 audit(1529688858.900:1618): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27126 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:19 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5020f}]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:19 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:19 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5020f}]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:19 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) [ 928.721825] audit: type=1326 audit(1529688859.720:1619): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27163 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) keyctl$set_timeout(0xf, 0x0, 0x0) [ 928.798261] audit: type=1326 audit(1529688859.786:1620): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27174 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:19 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:19 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5020f}]}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) [ 928.897426] audit: type=1326 audit(1529688859.896:1621): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27181 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:20 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:20 executing program 6: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:20 executing program 6: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:20 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:20 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() [ 929.729560] audit: type=1326 audit(1529688860.728:1622): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27223 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 929.754397] audit: type=1326 audit(1529688860.752:1623): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27225 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:20 executing program 6: add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 17:34:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:20 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) [ 929.865869] audit: type=1326 audit(1529688860.864:1624): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27234 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:20 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5020f}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) [ 929.938115] audit: type=1326 audit(1529688860.899:1625): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27241 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:21 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5020f}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:34:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:21 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5020f}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) [ 930.701434] audit: type=1326 audit(1529688861.700:1626): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27282 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000004fe8)}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:21 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) munlockall() 17:34:21 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_yield() [ 930.873303] audit: type=1326 audit(1529688861.872:1627): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27292 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:21 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000004fe8)}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ptrace$setregs(0x0, 0x0, 0x0, &(0x7f00000001c0)) 17:34:22 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000200)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000004fe8)}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:22 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x5020f}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:22 executing program 0: r0 = socket(0x1, 0x5, 0x0) sendmsg$netlink(r0, &(0x7f000000ee40)={&(0x7f0000002d40)=@kern={0x10}, 0xc, &(0x7f000000eb40), 0x0, &(0x7f000000ed80)}, 0x0) 17:34:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000004c0)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000500), &(0x7f0000000580)=0x68) 17:34:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:23 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x5020f}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sched_yield() 17:34:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:23 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x5020f}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:23 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sched_yield() 17:34:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) sched_yield() 17:34:23 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f00000000c0)) 17:34:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:23 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) timer_delete(0x0) 17:34:23 executing program 3: pipe2(&(0x7f0000000040), 0x0) sched_yield() [ 933.053578] kauditd_printk_skb: 6 callbacks suppressed [ 933.053599] audit: type=1326 audit(1529688864.052:1634): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27422 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:24 executing program 3: pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:24 executing program 5: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000980)=@nat={'nat\x00', 0x19, 0x4, 0x90, [0x200002c0, 0x0, 0x0, 0x200002f0, 0x200004a0], 0x0, &(0x7f0000000000), &(0x7f00000002c0)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x2}]}, 0x108) 17:34:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:24 executing program 3: pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:24 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) [ 933.564148] audit: type=1326 audit(1529688864.562:1635): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27453 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:24 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:24 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:24 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) [ 934.010234] audit: type=1326 audit(1529688865.008:1636): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27471 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:25 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:25 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f00000000c0), 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) 17:34:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000780)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) [ 934.576315] audit: type=1326 audit(1529688865.574:1637): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27514 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:25 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:25 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000200)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)={0x14}, 0x14}, 0x1}, 0x0) 17:34:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:25 executing program 0: socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000780)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000780)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) sched_yield() [ 934.983701] audit: type=1326 audit(1529688865.982:1638): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27534 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:26 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:26 executing program 0: socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:26 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:26 executing program 0: socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x0, 0x0, 0x0, 0x501f9}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) [ 936.189421] audit: type=1326 audit(1529688867.188:1639): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27609 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:27 executing program 4: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:27 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:27 executing program 4: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:27 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) [ 936.590527] audit: type=1326 audit(1529688867.582:1640): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27635 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:27 executing program 4: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:27 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:28 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) [ 937.165033] audit: type=1326 audit(1529688868.162:1641): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27683 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:28 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:28 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000002c0)) 17:34:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) gettid() ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=""/20, 0x14}) 17:34:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) [ 937.571822] audit: type=1326 audit(1529688868.570:1642): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27718 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) gettid() ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=""/20, 0x14}) 17:34:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000780)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000040)) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rfkill\x00', 0x0, 0x0) 17:34:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000040)) 17:34:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) [ 938.114466] audit: type=1326 audit(1529688869.113:1643): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27746 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) [ 938.211220] audit: type=1326 audit(1529688869.113:1644): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27734 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) sched_yield() 17:34:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000040)) 17:34:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) [ 938.517370] audit: type=1326 audit(1529688869.516:1645): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27764 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) [ 938.576787] audit: type=1326 audit(1529688869.564:1646): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27772 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000040)) 17:34:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000240), 0x1) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000100)) 17:34:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) [ 939.102588] audit: type=1326 audit(1529688870.101:1647): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27797 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) getegid() 17:34:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) [ 939.480958] audit: type=1326 audit(1529688870.479:1648): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27828 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) [ 939.714723] audit: type=1326 audit(1529688870.713:1649): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27844 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) flistxattr(0xffffffffffffffff, &(0x7f00000000c0)=""/153, 0x99) 17:34:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) [ 940.072504] audit: type=1326 audit(1529688871.071:1650): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27873 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) 17:34:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) [ 940.476942] audit: type=1326 audit(1529688871.475:1651): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27890 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:31 executing program 6: pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) [ 940.763708] audit: type=1326 audit(1529688871.762:1652): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27907 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:31 executing program 6: pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:32 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:32 executing program 6: pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000380)='/dev/input/mice\x00', 0x0, 0x0) 17:34:32 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000001e40)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 17:34:32 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:32 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:32 executing program 5: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)) setreuid(0x0, 0x0) 17:34:32 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:32 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:33 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:33 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:33 executing program 2: msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:33 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 17:34:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:33 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000001540)='comm\x00') ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000001780)={0x0, &(0x7f0000001740)}) 17:34:33 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:33 executing program 2: msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:34 executing program 2: msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:34 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:34 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:35 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:35 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:35 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:35 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:35 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) tgkill(0x0, 0x0, 0x0) 17:34:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:35 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) [ 944.955790] kauditd_printk_skb: 4 callbacks suppressed [ 944.955814] audit: type=1326 audit(1529688875.954:1657): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28172 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:36 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) tgkill(0x0, 0x0, 0x0) 17:34:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:36 executing program 0: pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) [ 945.090012] audit: type=1326 audit(1529688875.988:1658): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28175 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:36 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:36 executing program 0: pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) tgkill(0x0, 0x0, 0x0) [ 945.470035] audit: type=1326 audit(1529688876.468:1659): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28210 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:36 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:36 executing program 0: pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:36 executing program 1: getpid() tgkill(0x0, 0x0, 0x0) [ 945.896236] audit: type=1326 audit(1529688876.894:1660): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28224 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) [ 946.009186] audit: type=1326 audit(1529688876.971:1661): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28236 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:37 executing program 1: getpid() tgkill(0x0, 0x0, 0x0) 17:34:37 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:37 executing program 1: getpid() tgkill(0x0, 0x0, 0x0) 17:34:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) [ 946.485005] audit: type=1326 audit(1529688877.483:1662): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28267 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:37 executing program 4: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:37 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'gre0\x00'}) 17:34:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:34:37 executing program 4: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) [ 946.931561] audit: type=1326 audit(1529688877.930:1663): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28278 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:38 executing program 4: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:38 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) [ 946.995261] audit: type=1326 audit(1529688877.952:1664): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28282 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 947.015195] audit: type=1326 audit(1529688877.992:1665): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28281 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:38 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000000)) 17:34:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:38 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:38 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) [ 947.474489] audit: type=1326 audit(1529688878.472:1666): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28322 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:38 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f00000000c0)) 17:34:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:38 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:39 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget$private(0x0, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/26) 17:34:39 executing program 3: r0 = socket(0x1, 0x80002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000004c0)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000180], 0x0, &(0x7f0000000140), &(0x7f0000000180)=[{}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x2}]}, 0x108) 17:34:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:39 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:39 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:40 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$TIOCSCTTY(0xffffffffffffffff, 0x540e, 0x0) 17:34:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) timer_delete(0x0) 17:34:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:40 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:40 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffa) inotify_rm_watch(0xffffffffffffffff, 0x0) 17:34:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:40 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) timer_delete(0x0) 17:34:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:41 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffa) inotify_rm_watch(0xffffffffffffffff, 0x0) [ 950.072347] kauditd_printk_skb: 7 callbacks suppressed [ 950.072372] audit: type=1326 audit(1529688881.068:1674): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28458 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) timer_delete(0x0) 17:34:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:41 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0xfffffffffffffffa) inotify_rm_watch(0xffffffffffffffff, 0x0) 17:34:41 executing program 5: open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:41 executing program 6: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getpid() tgkill(0x0, 0x0, 0x0) [ 950.864917] audit: type=1326 audit(1529688881.863:1675): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28499 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:41 executing program 6: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) [ 950.945577] audit: type=1326 audit(1529688881.910:1676): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28503 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:42 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:42 executing program 5: open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 17:34:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) [ 951.121482] audit: type=1326 audit(1529688882.120:1677): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28517 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:42 executing program 6: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:42 executing program 5: open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) 17:34:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000080)) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) 17:34:42 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:42 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:42 executing program 3: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) getpid() tgkill(0x0, 0x0, 0x0) 17:34:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000080)) [ 951.856782] audit: type=1326 audit(1529688882.855:1678): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28554 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 951.960695] audit: type=1326 audit(1529688882.959:1679): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28561 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:43 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) ioctl$EVIOCSABS0(0xffffffffffffffff, 0x401845c0, &(0x7f0000000040)) 17:34:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:43 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:43 executing program 3: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) mq_open(&(0x7f0000000000)='/selinux/validatetrans\x00', 0x0, 0x0, &(0x7f0000000140)) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000b80), &(0x7f0000000bc0)=0x14) 17:34:43 executing program 3: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:43 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) [ 952.130984] audit: type=1326 audit(1529688883.129:1680): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28576 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:44 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) io_submit(0x0, 0x0, &(0x7f0000000580)) 17:34:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:44 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x2710}, 0x10) 17:34:44 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000300)=""/46) 17:34:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:44 executing program 7: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:44 executing program 7: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:45 executing program 7: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:45 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:45 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) [ 954.406233] audit: type=1326 audit(1529688885.404:1681): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28734 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) [ 954.500232] audit: type=1326 audit(1529688885.441:1682): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28738 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:45 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:45 executing program 2: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) [ 954.961739] audit: type=1326 audit(1529688885.959:1683): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28775 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:46 executing program 2: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:46 executing program 0: socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) 17:34:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) [ 955.382344] audit: type=1326 audit(1529688886.381:1684): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28800 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) [ 955.488658] audit: type=1326 audit(1529688886.408:1685): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28807 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:46 executing program 0: socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:46 executing program 2: socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:46 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:46 executing program 0: socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 955.974216] audit: type=1326 audit(1529688886.972:1686): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28845 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='/\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000200)) 17:34:47 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:47 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:47 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) timer_delete(0x0) [ 956.380230] audit: type=1326 audit(1529688887.378:1687): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28862 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:47 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:47 executing program 4: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) [ 956.479113] audit: type=1326 audit(1529688887.401:1688): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28871 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 956.623568] audit: type=1326 audit(1529688887.621:1689): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28883 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:47 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000040)) 17:34:47 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:47 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 956.926261] audit: type=1326 audit(1529688887.924:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28904 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:48 executing program 6: ptrace$getregset(0x4205, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002100)=""/4096, 0xffffff5e}) 17:34:48 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:48 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050208}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x0) 17:34:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000000)) 17:34:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:48 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) [ 957.708165] audit: type=1326 audit(1529688888.706:1691): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28946 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000200)}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000300), 0x4) 17:34:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 17:34:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:48 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) seccomp(0x0, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000200)}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000300), 0x4) 17:34:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) accept$packet(0xffffffffffffffff, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000900)=0x14) socket$inet6_tcp(0xa, 0x1, 0x0) 17:34:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000380)) 17:34:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000140)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) [ 958.693003] audit: type=1326 audit(1529688889.691:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29027 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) [ 959.628897] audit: type=1326 audit(1529688890.627:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29069 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020d}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$void(0xffffffffffffffff, 0x0) 17:34:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fchdir(0xffffffffffffffff) 17:34:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:51 executing program 6: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) [ 960.567027] kauditd_printk_skb: 2 callbacks suppressed [ 960.572518] audit: type=1326 audit(1529688891.565:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29128 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$void(0xffffffffffffffff, 0x0) 17:34:51 executing program 6: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) [ 960.649597] audit: type=1326 audit(1529688891.648:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29133 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fchdir(0xffffffffffffffff) 17:34:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$void(0xffffffffffffffff, 0x0) 17:34:51 executing program 6: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fchdir(0xffffffffffffffff) 17:34:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:52 executing program 3: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) [ 961.138344] audit: type=1326 audit(1529688892.132:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29163 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 961.215187] audit: type=1326 audit(1529688892.179:1699): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29166 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:34:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:52 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:52 executing program 5: socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:52 executing program 3: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) [ 961.585619] audit: type=1326 audit(1529688892.584:1700): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29178 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:52 executing program 3: listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:52 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) [ 961.652359] audit: type=1326 audit(1529688892.628:1701): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29186 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:52 executing program 5: socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:52 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:52 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000080), 0xffeb, 0x0, &(0x7f0000000d00)=@abs, 0x63) 17:34:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)={@multicast1=0xe0000001}, 0x10) 17:34:53 executing program 5: socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) [ 962.146938] audit: type=1326 audit(1529688893.145:1702): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29224 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 962.183316] audit: type=1326 audit(1529688893.166:1703): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29222 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080), 0x0) 17:34:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:53 executing program 7: pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:53 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) [ 962.601399] audit: type=1326 audit(1529688893.597:1704): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29233 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:53 executing program 7: pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:53 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:53 executing program 7: pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:54 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:34:54 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:34:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:54 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:34:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) [ 964.258507] audit: type=1326 audit(1529688895.257:1705): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29362 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:34:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:34:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:34:56 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:34:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:56 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:56 executing program 4: pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:34:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:56 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:56 executing program 4: pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:56 executing program 2: pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:34:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:57 executing program 4: pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:57 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:57 executing program 1: pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) [ 966.208475] kauditd_printk_skb: 3 callbacks suppressed [ 966.208499] audit: type=1326 audit(1529688897.206:1709): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29486 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x62) ioctl$void(0xffffffffffffffff, 0x0) 17:34:57 executing program 2: pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:34:57 executing program 1: pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:57 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:57 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) [ 966.432751] audit: type=1326 audit(1529688897.431:1710): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29503 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:57 executing program 1: pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:57 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:57 executing program 2: pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) [ 966.516628] audit: type=1326 audit(1529688897.504:1711): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29508 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:57 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) [ 966.626258] audit: type=1326 audit(1529688897.586:1712): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29499 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:58 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:58 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:34:58 executing program 6: socketpair(0x1, 0x1, 0x0, &(0x7f0000002000)={0x0, 0x0}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) 17:34:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:58 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:58 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:34:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:34:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) listxattr(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)=""/98, 0x2a) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) [ 967.433200] audit: type=1326 audit(1529688898.431:1713): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29553 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:58 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) [ 967.500812] audit: type=1326 audit(1529688898.453:1714): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29555 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:34:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:34:58 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:34:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) fchdir(0xffffffffffffffff) 17:34:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:34:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:59 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:34:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:34:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000140), 0x0) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000040)) 17:34:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) [ 968.416441] audit: type=1326 audit(1529688899.414:1715): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29613 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:34:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:34:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) [ 968.519911] audit: type=1326 audit(1529688899.503:1716): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29619 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:34:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:34:59 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:34:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:34:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:35:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:35:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:35:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:35:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:35:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) [ 969.353141] audit: type=1326 audit(1529688900.351:1717): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29652 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:00 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) clone(0x0, &(0x7f0000001bc0), &(0x7f0000001c00), &(0x7f0000001c40), &(0x7f0000001c80)) 17:35:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) [ 969.436773] audit: type=1326 audit(1529688900.430:1718): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29655 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:35:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:35:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:00 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:35:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:35:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/89, 0x59) 17:35:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:35:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:35:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:35:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:01 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:35:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:01 executing program 6: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:01 executing program 3: socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:01 executing program 6: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:01 executing program 6: add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:35:01 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000004c0)={'broute\x00', 0x0, 0x0, 0x8d, [], 0x0, &(0x7f0000000140), &(0x7f0000000400)=""/141}, &(0x7f0000000540)=0x78) 17:35:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f0000000380)) 17:35:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:02 executing program 3: socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:02 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) [ 971.220950] kauditd_printk_skb: 5 callbacks suppressed [ 971.220970] audit: type=1326 audit(1529688902.219:1724): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29768 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 971.307721] audit: type=1326 audit(1529688902.305:1725): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29774 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:02 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) [ 971.377302] audit: type=1326 audit(1529688902.331:1726): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29782 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:02 executing program 3: socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:02 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:02 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:02 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, &(0x7f0000000000)) 17:35:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) [ 971.926461] audit: type=1326 audit(1529688902.924:1727): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29818 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:03 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000000c0)=""/151) 17:35:03 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:03 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:03 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) stat(&(0x7f0000002040)='./file0\x00', &(0x7f0000002080)) [ 972.301477] audit: type=1326 audit(1529688903.300:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29834 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000001180)) socket$inet(0x2, 0x0, 0x0) 17:35:03 executing program 5: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:03 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:03 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:04 executing program 7: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:04 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) semget$private(0x0, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)) 17:35:04 executing program 7: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:04 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:04 executing program 2: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000300)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) 17:35:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) [ 973.501744] audit: type=1326 audit(1529688904.500:1729): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29919 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:04 executing program 7: openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/117, 0x40, 0x0) 17:35:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:04 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:05 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:05 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) [ 974.468224] audit: type=1326 audit(1529688905.466:1730): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29983 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:05 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:06 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) mq_open(&(0x7f0000000000)='encrypted\x00', 0x0, 0x0, &(0x7f0000000040)) 17:35:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:06 executing program 4: socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) [ 975.385084] audit: type=1326 audit(1529688906.383:1731): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30037 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:06 executing program 4: socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) [ 975.464034] audit: type=1326 audit(1529688906.414:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30052 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:06 executing program 0: socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) [ 975.602462] audit: type=1326 audit(1529688906.601:1733): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30063 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:06 executing program 4: socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:07 executing program 1: pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:07 executing program 0: socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000540)=""/74) [ 976.367495] audit: type=1326 audit(1529688907.366:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30100 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:07 executing program 1: pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:07 executing program 0: socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:07 executing program 1: pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) [ 976.678691] audit: type=1326 audit(1529688907.677:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30127 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) [ 976.847466] audit: type=1326 audit(1529688907.846:1736): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30137 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:07 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:07 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 17:35:08 executing program 2: socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:08 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) [ 977.349797] audit: type=1326 audit(1529688908.348:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30177 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:35:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:08 executing program 2: socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:08 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) [ 977.641610] audit: type=1326 audit(1529688908.638:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30197 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:08 executing program 2: socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) [ 977.829098] audit: type=1326 audit(1529688908.827:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30211 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:09 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f0000000780)) 17:35:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000180)) 17:35:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:09 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 978.806888] audit: type=1326 audit(1529688909.805:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30271 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) [ 978.899570] audit: type=1326 audit(1529688909.878:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30282 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:10 executing program 5: 17:35:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:10 executing program 5: 17:35:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:10 executing program 6: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:10 executing program 7: 17:35:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) [ 979.821712] audit: type=1326 audit(1529688910.820:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30330 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:10 executing program 6: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:10 executing program 7: [ 979.914396] audit: type=1326 audit(1529688910.841:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30332 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:10 executing program 5: 17:35:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:11 executing program 5: 17:35:11 executing program 7: 17:35:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000040), 0x4) 17:35:11 executing program 6: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:11 executing program 5: 17:35:11 executing program 7: syz_open_dev$random(&(0x7f00000000c0)='/dev/random\x00', 0x0, 0x0) 17:35:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:11 executing program 5: 17:35:11 executing program 7: 17:35:11 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5020a}]}) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:12 executing program 7: 17:35:12 executing program 5: 17:35:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:12 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:12 executing program 7: 17:35:12 executing program 4: 17:35:12 executing program 5: 17:35:12 executing program 3: accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 981.726817] kauditd_printk_skb: 3 callbacks suppressed [ 981.726841] audit: type=1326 audit(1529688912.725:1747): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30419 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:12 executing program 4: 17:35:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f6}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f00000000c0)) 17:35:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$EVIOCSKEYCODE_V2(0xffffffffffffffff, 0x40284504, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "073d1821241b2e328a653ca3ffbb4f7e5d4ce47d8a0ddf4da9f644a93ca13849"}) 17:35:12 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)) 17:35:12 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:12 executing program 3: accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 981.913106] audit: type=1326 audit(1529688912.911:1748): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30432 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:13 executing program 4: 17:35:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:13 executing program 3: accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) [ 982.306814] audit: type=1326 audit(1529688913.305:1749): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30461 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:13 executing program 4: 17:35:13 executing program 5: 17:35:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:13 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)) 17:35:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:13 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:13 executing program 4: [ 982.802799] audit: type=1326 audit(1529688913.801:1750): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30472 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:13 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:13 executing program 5: 17:35:13 executing program 4: 17:35:13 executing program 1: 17:35:13 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)) 17:35:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000000100)) 17:35:14 executing program 1: 17:35:14 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:14 executing program 4: [ 983.297699] audit: type=1326 audit(1529688914.296:1751): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30507 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 17:35:14 executing program 5: 17:35:14 executing program 4: 17:35:14 executing program 1: 17:35:14 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)) 17:35:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) [ 983.776352] audit: type=1326 audit(1529688914.775:1752): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30514 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:14 executing program 5: 17:35:14 executing program 1: 17:35:14 executing program 4: 17:35:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:15 executing program 1: 17:35:15 executing program 5: 17:35:15 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000080)) 17:35:15 executing program 4: 17:35:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:15 executing program 1: 17:35:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:15 executing program 0: 17:35:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:15 executing program 5: 17:35:15 executing program 4: 17:35:15 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000080)) 17:35:15 executing program 2: 17:35:15 executing program 2: 17:35:15 executing program 4: 17:35:15 executing program 5: 17:35:15 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl(r0, 0x0, &(0x7f0000000140)) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000080)) 17:35:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:15 executing program 0: 17:35:15 executing program 1: 17:35:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) [ 984.969191] audit: type=1326 audit(1529688915.967:1753): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30583 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:16 executing program 2: 17:35:16 executing program 4: 17:35:16 executing program 5: 17:35:16 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup(r0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)) 17:35:16 executing program 2: 17:35:16 executing program 4: 17:35:16 executing program 5: 17:35:16 executing program 4: [ 985.463608] device bridge_slave_1 left promiscuous mode [ 985.469462] bridge0: port 2(bridge_slave_1) entered disabled state 17:35:16 executing program 2: 17:35:16 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup(r0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)) 17:35:16 executing program 5: [ 985.562174] device bridge_slave_0 left promiscuous mode [ 985.568186] bridge0: port 1(bridge_slave_0) entered disabled state 17:35:16 executing program 0: [ 985.791808] team0 (unregistering): Port device team_slave_1 removed [ 985.818600] team0 (unregistering): Port device team_slave_0 removed [ 985.834764] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 985.854564] bond0 (unregistering): Releasing backup interface bond_slave_0 17:35:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:16 executing program 4: 17:35:16 executing program 1: 17:35:16 executing program 2: 17:35:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020f}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:16 executing program 5: 17:35:16 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup(r0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)) [ 985.909019] bond0 (unregistering): Released all slaves 17:35:17 executing program 2: 17:35:17 executing program 5: 17:35:17 executing program 4: [ 986.011920] audit: type=1326 audit(1529688917.010:1754): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30623 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:17 executing program 7: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r0 = dup(0xffffffffffffffff) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000080)) 17:35:17 executing program 2: 17:35:17 executing program 5: 17:35:17 executing program 4: [ 986.247383] IPVS: ftp: loaded support on port[0] = 21 17:35:17 executing program 2: [ 986.664674] IPVS: ftp: loaded support on port[0] = 21 [ 986.695665] IPVS: ftp: loaded support on port[0] = 21 [ 987.562583] device bridge_slave_1 left promiscuous mode [ 987.568402] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.581166] device bridge_slave_0 left promiscuous mode [ 987.586971] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.599703] device bridge_slave_1 left promiscuous mode [ 987.605487] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.617973] device bridge_slave_0 left promiscuous mode [ 987.623730] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.689796] team0 (unregistering): Port device team_slave_1 removed [ 987.701924] team0 (unregistering): Port device team_slave_0 removed [ 987.714156] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 987.730970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 987.762597] bond0 (unregistering): Released all slaves [ 987.783696] team0 (unregistering): Port device team_slave_1 removed [ 987.795922] team0 (unregistering): Port device team_slave_0 removed [ 987.807814] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 987.824622] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 987.856872] bond0 (unregistering): Released all slaves [ 989.167156] IPVS: ftp: loaded support on port[0] = 21 [ 989.680532] IPVS: ftp: loaded support on port[0] = 21 [ 989.791797] IPVS: ftp: loaded support on port[0] = 21 [ 990.466601] bridge0: port 1(bridge_slave_0) entered blocking state [ 990.473138] bridge0: port 1(bridge_slave_0) entered disabled state [ 990.496978] device bridge_slave_0 entered promiscuous mode [ 990.576780] bridge0: port 2(bridge_slave_1) entered blocking state [ 990.583294] bridge0: port 2(bridge_slave_1) entered disabled state [ 990.590920] device bridge_slave_1 entered promiscuous mode [ 990.672149] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 990.758071] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 991.015829] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 991.106478] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 991.203537] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 991.210779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 991.232544] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.239138] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.247370] device bridge_slave_0 entered promiscuous mode [ 991.310926] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 991.318112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 991.339220] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.345791] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.354693] device bridge_slave_1 entered promiscuous mode [ 991.366993] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.373504] bridge0: port 1(bridge_slave_0) entered disabled state [ 991.394003] device bridge_slave_0 entered promiscuous mode [ 991.411969] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 991.504658] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.511163] bridge0: port 2(bridge_slave_1) entered disabled state [ 991.519973] device bridge_slave_1 entered promiscuous mode [ 991.528263] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 991.546287] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 991.554138] team0: Port device team_slave_0 added [ 991.614370] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 991.621813] team0: Port device team_slave_1 added [ 991.628620] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 991.760322] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 991.772488] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 991.809803] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 991.869306] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 991.904472] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 992.002107] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 992.009606] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 992.020278] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 992.048426] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 992.055492] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 992.100111] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 992.107631] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 992.116221] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 992.133971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 992.149132] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 992.157226] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 992.207417] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 992.295437] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 992.302966] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 992.421397] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 992.430647] team0: Port device team_slave_0 added [ 992.527574] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 992.536099] team0: Port device team_slave_1 added [ 992.633298] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 992.642962] team0: Port device team_slave_0 added [ 992.666345] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 993.061348] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 993.068323] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 993.077820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 993.089585] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 993.097180] team0: Port device team_slave_1 added [ 993.241368] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 993.248531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 993.261806] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 993.291490] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 993.299016] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 993.309768] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 993.351884] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 993.358991] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 993.369580] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 993.471528] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 993.479103] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 993.488636] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 993.504166] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 993.511580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 993.522474] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 993.618364] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 993.625878] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 993.636129] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 994.489125] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 995.036382] device bridge_slave_1 left promiscuous mode [ 995.042337] bridge0: port 2(bridge_slave_1) entered disabled state [ 995.055687] device bridge_slave_0 left promiscuous mode [ 995.061325] bridge0: port 1(bridge_slave_0) entered disabled state [ 995.084218] team0 (unregistering): Port device team_slave_1 removed [ 995.096944] team0 (unregistering): Port device team_slave_0 removed [ 995.108347] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 995.123624] bond0 (unregistering): Releasing backup interface bond_slave_0 17:35:26 executing program 1: 17:35:26 executing program 5: 17:35:26 executing program 4: 17:35:26 executing program 0: 17:35:26 executing program 2: 17:35:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:35:26 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:26 executing program 7: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r0 = dup(0xffffffffffffffff) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000080)) [ 995.156840] bond0 (unregistering): Released all slaves [ 995.209404] audit: type=1326 audit(1529688926.207:1755): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30923 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:26 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/12, 0xc) 17:35:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c}, 0x20) dup(0xffffffffffffffff) [ 995.314211] audit: type=1326 audit(1529688926.267:1756): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30932 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:35:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000080)=0x6e) 17:35:26 executing program 7: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r0 = dup(0xffffffffffffffff) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000080)) 17:35:26 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)) 17:35:26 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) syz_fuse_mount(&(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:35:26 executing program 2: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) 17:35:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c}, 0x20) dup(0xffffffffffffffff) [ 996.131262] IPVS: ftp: loaded support on port[0] = 21 [ 996.182996] IPVS: ftp: loaded support on port[0] = 21 [ 996.923735] device bridge_slave_1 left promiscuous mode [ 996.929616] bridge0: port 2(bridge_slave_1) entered disabled state [ 996.951018] device bridge_slave_0 left promiscuous mode [ 996.956890] bridge0: port 1(bridge_slave_0) entered disabled state [ 997.014539] team0 (unregistering): Port device team_slave_1 removed [ 997.036286] team0 (unregistering): Port device team_slave_0 removed [ 997.062110] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 997.084645] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 997.135245] bond0 (unregistering): Released all slaves [ 998.358030] IPVS: ftp: loaded support on port[0] = 21 [ 998.967215] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 998.978645] syz-executor0 cpuset=/ mems_allowed=0 [ 998.983654] CPU: 1 PID: 30992 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 998.990523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.999913] Call Trace: [ 999.002559] dump_stack+0x185/0x1d0 [ 999.006250] warn_alloc+0x430/0x690 [ 999.009954] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 999.014890] ? __msan_poison_alloca+0x15c/0x1d0 [ 999.019670] copy_process+0x778/0x9be0 [ 999.023662] ? __msan_poison_alloca+0x15c/0x1d0 [ 999.028573] ? handle_mm_fault+0x74eb/0x7ed0 [ 999.033137] ? handle_mm_fault+0x74eb/0x7ed0 [ 999.037623] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 999.043095] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 999.049159] ? handle_mm_fault+0x1eb0/0x7ed0 [ 999.053626] ? __msan_poison_alloca+0x141/0x1d0 [ 999.058370] _do_fork+0x353/0xf60 [ 999.061896] __x64_sys_clone+0x15e/0x1b0 [ 999.066021] ? __ia32_sys_vfork+0x70/0x70 [ 999.070207] do_syscall_64+0x15b/0x230 [ 999.074159] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 999.079398] RIP: 0033:0x458429 [ 999.082619] RSP: 002b:00007ffc60cbb978 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 999.090403] RAX: ffffffffffffffda RBX: 00007ffc60cbba30 RCX: 0000000000458429 [ 999.097728] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 999.105044] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 999.112357] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 999.119677] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 999.127210] Mem-Info: [ 999.129775] active_anon:127330 inactive_anon:78 isolated_anon:0 [ 999.129775] active_file:1703 inactive_file:3822 isolated_file:0 [ 999.129775] unevictable:0 dirty:31 writeback:0 unstable:0 [ 999.129775] slab_reclaimable:3296 slab_unreclaimable:9131 [ 999.129775] mapped:70812 shmem:84 pagetables:1019 bounce:0 [ 999.129775] free:29595 free_pcp:361 free_cma:0 [ 999.163071] Node 0 active_anon:509320kB inactive_anon:312kB active_file:6812kB inactive_file:14996kB unevictable:0kB isolated(anon):0kB isolated(file):116kB mapped:283016kB dirty:124kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 999.191409] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 999.217736] lowmem_reserve[]: 0 2817 7244 7244 [ 999.222484] Node 0 DMA32 free:51060kB min:26224kB low:32780kB high:39336kB active_anon:227708kB inactive_anon:8kB active_file:1720kB inactive_file:212kB unevictable:0kB writepending:8kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1280kB pagetables:1128kB bounce:0kB free_pcp:696kB local_pcp:0kB free_cma:0kB [ 999.251421] lowmem_reserve[]: 0 0 4426 4426 [ 999.255945] Node 0 Normal free:57024kB min:41208kB low:51508kB high:61808kB active_anon:281596kB inactive_anon:304kB active_file:5484kB inactive_file:9564kB unevictable:0kB writepending:116kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7808kB pagetables:2948kB bounce:0kB free_pcp:692kB local_pcp:20kB free_cma:0kB [ 999.285718] lowmem_reserve[]: 0 0 0 0 [ 999.289703] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 999.303154] Node 0 DMA32: 404*4kB (UMH) 2909*8kB (UMH) 517*16kB (UMH) 27*32kB (UMH) 16*64kB (UH) 1*128kB (H) 1*256kB (H) 0*512kB 0*1024kB 0*2048kB 4*4096kB (H) = 51816kB [ 999.318976] Node 0 Normal: 1959*4kB (UME) 868*8kB (UME) 233*16kB (UME) 131*32kB (UME) 39*64kB (UM) 10*128kB (UM) 56*256kB (UM) 0*512kB 3*1024kB (U) 3*2048kB (U) 2*4096kB (MH) = 58220kB [ 999.335964] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 999.344688] 3259 total pagecache pages [ 999.348662] 0 pages in swap cache [ 999.352227] Swap cache stats: add 0, delete 0, find 0/0 [ 999.357720] Free swap = 0kB [ 999.360848] Total swap = 0kB [ 999.363927] 1965969 pages RAM [ 999.367131] 0 pages HighMem/MovableOnly [ 999.371173] 106316 pages reserved [ 999.582560] bond0 (unregistering): Released all slaves [ 1001.377189] IPVS: ftp: loaded support on port[0] = 21 [ 1002.022245] bridge0: port 1(bridge_slave_0) entered blocking state [ 1002.028781] bridge0: port 1(bridge_slave_0) entered disabled state [ 1002.036453] device bridge_slave_0 entered promiscuous mode [ 1002.073901] bridge0: port 2(bridge_slave_1) entered blocking state [ 1002.080342] bridge0: port 2(bridge_slave_1) entered disabled state [ 1002.087716] device bridge_slave_1 entered promiscuous mode [ 1002.128245] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1002.165834] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1002.274210] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1002.314717] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1002.487773] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1002.495181] team0: Port device team_slave_0 added [ 1002.531309] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1002.538601] team0: Port device team_slave_1 added [ 1002.575801] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1002.616590] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1002.657558] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1002.692810] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1003.077439] bridge0: port 2(bridge_slave_1) entered blocking state [ 1003.084023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1003.090819] bridge0: port 1(bridge_slave_0) entered blocking state [ 1003.097289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1003.105289] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1003.809866] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1004.514467] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1004.654447] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1004.798452] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1004.804743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1004.813238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1004.947832] 8021q: adding VLAN 0 to HW filter on device team0 17:35:36 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) accept4$inet6(0xffffffffffffff9c, &(0x7f0000001d00)={0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}}, &(0x7f0000001d40)=0x1c, 0x0) 17:35:36 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)) 17:35:36 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:36 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0x0, 0xffffffffffffffff) accept$unix(0xffffffffffffff9c, 0x0, &(0x7f0000001a80)) 17:35:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50205}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) 17:35:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) 17:35:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c}, 0x20) dup(0xffffffffffffffff) 17:35:36 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020f}]}) add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, &(0x7f00000003c0), 0xde, 0xffffffffffffffff) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000240)) [ 1006.065275] syz-executor7: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1006.076727] syz-executor7 cpuset=syz7 mems_allowed=0 [ 1006.082036] CPU: 1 PID: 4534 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 1006.088828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.098221] Call Trace: [ 1006.100878] dump_stack+0x185/0x1d0 [ 1006.104563] warn_alloc+0x430/0x690 [ 1006.108294] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1006.113227] ? __msan_poison_alloca+0x15c/0x1d0 [ 1006.118009] copy_process+0x778/0x9be0 [ 1006.121959] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1006.127500] ? ptep_set_access_flags+0x10e/0x1d0 [ 1006.132321] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1006.137875] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1006.142341] ? __msan_poison_alloca+0x141/0x1d0 [ 1006.147089] _do_fork+0x353/0xf60 [ 1006.150588] __x64_sys_clone+0x15e/0x1b0 [ 1006.154674] ? __ia32_sys_vfork+0x70/0x70 [ 1006.158845] do_syscall_64+0x15b/0x230 [ 1006.162821] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1006.168026] RIP: 0033:0x45414a [ 1006.171340] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1006.179065] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 1006.186341] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1006.193625] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000001330940 [ 1006.200922] R10: 0000000001330c10 R11: 0000000000000246 R12: 0000000000000001 [ 1006.208204] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 1006.215624] Mem-Info: [ 1006.218181] active_anon:127813 inactive_anon:78 isolated_anon:0 [ 1006.218181] active_file:3299 inactive_file:3478 isolated_file:58 [ 1006.218181] unevictable:0 dirty:29 writeback:0 unstable:0 [ 1006.218181] slab_reclaimable:3295 slab_unreclaimable:9163 [ 1006.218181] mapped:68860 shmem:84 pagetables:972 bounce:0 [ 1006.218181] free:28604 free_pcp:393 free_cma:0 [ 1006.251559] Node 0 active_anon:511252kB inactive_anon:312kB active_file:12916kB inactive_file:12284kB unevictable:0kB isolated(anon):0kB isolated(file):232kB mapped:274280kB dirty:116kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1006.279943] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1006.306283] lowmem_reserve[]: 0 2817 7244 7244 [ 1006.311016] Node 0 DMA32 free:53592kB min:26224kB low:32780kB high:39336kB active_anon:227460kB inactive_anon:16kB active_file:1712kB inactive_file:160kB unevictable:0kB writepending:16kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1216kB pagetables:1000kB bounce:0kB free_pcp:860kB local_pcp:120kB free_cma:0kB [ 1006.340270] lowmem_reserve[]: 0 0 4426 4426 [ 1006.344768] Node 0 Normal free:51392kB min:41208kB low:51508kB high:61808kB active_anon:283608kB inactive_anon:296kB active_file:9524kB inactive_file:10168kB unevictable:0kB writepending:100kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7872kB pagetables:2888kB bounce:0kB free_pcp:716kB local_pcp:0kB free_cma:0kB [ 1006.374263] lowmem_reserve[]: 0 0 0 0 [ 1006.378197] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1006.391676] Node 0 DMA32: 488*4kB (UMH) 2956*8kB (UMH) 500*16kB (UMH) 24*32kB (UMH) 6*64kB (UH) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 4*4096kB (H) = 51136kB [ 1006.406441] Node 0 Normal: 1971*4kB (ME) 268*8kB (UMEH) 357*16kB (UME) 130*32kB (ME) 30*64kB (UMH) 11*128kB (UMH) 56*256kB (UMH) 1*512kB (U) 4*1024kB (U) 3*2048kB (UM) 0*4096kB = 48316kB [ 1006.423508] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1006.432176] 4732 total pagecache pages [ 1006.436147] 0 pages in swap cache [ 1006.439689] Swap cache stats: add 0, delete 0, find 0/0 [ 1006.445135] Free swap = 0kB [ 1006.448230] Total swap = 0kB [ 1006.451328] 1965969 pages RAM [ 1006.454509] 0 pages HighMem/MovableOnly [ 1006.458559] 106316 pages reserved [ 1006.462348] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1006.473840] syz-executor6 cpuset=syz6 mems_allowed=0 [ 1006.479153] CPU: 0 PID: 4536 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1006.485927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.495287] Call Trace: [ 1006.497910] dump_stack+0x185/0x1d0 [ 1006.501549] warn_alloc+0x430/0x690 [ 1006.505218] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1006.510094] ? __msan_poison_alloca+0x15c/0x1d0 [ 1006.514820] copy_process+0x778/0x9be0 [ 1006.518724] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1006.524199] ? ptep_set_access_flags+0x10e/0x1d0 [ 1006.528964] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1006.534453] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1006.538872] ? __msan_poison_alloca+0x141/0x1d0 [ 1006.543567] _do_fork+0x353/0xf60 [ 1006.547047] __x64_sys_clone+0x15e/0x1b0 [ 1006.551118] ? __ia32_sys_vfork+0x70/0x70 [ 1006.555271] do_syscall_64+0x15b/0x230 [ 1006.559175] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1006.564368] RIP: 0033:0x45414a [ 1006.567551] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1006.575268] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 1006.582553] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1006.589821] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 000000000264d940 [ 1006.597095] R10: 000000000264dc10 R11: 0000000000000246 R12: 0000000000000001 [ 1006.604624] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 1006.771554] device bridge_slave_1 left promiscuous mode [ 1006.777384] bridge0: port 2(bridge_slave_1) entered disabled state [ 1006.859082] device bridge_slave_0 left promiscuous mode [ 1006.864877] bridge0: port 1(bridge_slave_0) entered disabled state 17:35:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) [ 1006.980504] team0 (unregistering): Port device team_slave_1 removed [ 1007.014869] team0 (unregistering): Port device team_slave_0 removed [ 1007.051755] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1007.078148] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1007.155908] bond0 (unregistering): Released all slaves 17:35:38 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f0000000040)=0x1c, 0x0) keyctl$negate(0xd, 0x0, 0x0, 0x0) 17:35:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socketpair$inet6(0xa, 0x0, 0x0, &(0x7f0000000140)) futimesat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)={{0x0, 0x2710}, {0x0, 0x2710}}) 17:35:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c}, 0x20) dup(0xffffffffffffffff) 17:35:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) 17:35:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) clock_settime(0x0, &(0x7f0000000100)) 17:35:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020d}]}) memfd_create(&(0x7f0000000240)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000280)=""/235) 17:35:38 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r1 = dup(r0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)) 17:35:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020c}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x0, 0x0) 17:35:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept4$inet(0xffffffffffffff9c, &(0x7f0000000240)={0x0, 0x0, @dev}, &(0x7f0000000300)=0x10, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000040)=0x1e) [ 1008.175717] IPVS: ftp: loaded support on port[0] = 21 [ 1008.275021] IPVS: ftp: loaded support on port[0] = 21 [ 1008.317217] IPVS: ftp: loaded support on port[0] = 21 [ 1008.368748] IPVS: ftp: loaded support on port[0] = 21 [ 1008.398818] IPVS: ftp: loaded support on port[0] = 21 [ 1010.051384] device bridge_slave_1 left promiscuous mode [ 1010.057233] bridge0: port 2(bridge_slave_1) entered disabled state [ 1010.094226] device bridge_slave_0 left promiscuous mode [ 1010.100117] bridge0: port 1(bridge_slave_0) entered disabled state [ 1010.126975] device bridge_slave_1 left promiscuous mode [ 1010.132780] bridge0: port 2(bridge_slave_1) entered disabled state [ 1010.176116] device bridge_slave_0 left promiscuous mode [ 1010.181957] bridge0: port 1(bridge_slave_0) entered disabled state [ 1010.260720] device bridge_slave_1 left promiscuous mode [ 1010.266714] bridge0: port 2(bridge_slave_1) entered disabled state [ 1010.287320] device bridge_slave_0 left promiscuous mode [ 1010.293374] bridge0: port 1(bridge_slave_0) entered disabled state [ 1010.312125] device bridge_slave_1 left promiscuous mode [ 1010.317936] bridge0: port 2(bridge_slave_1) entered disabled state [ 1010.336339] device bridge_slave_0 left promiscuous mode [ 1010.342193] bridge0: port 1(bridge_slave_0) entered disabled state [ 1010.548618] team0 (unregistering): Port device team_slave_1 removed [ 1010.561939] team0 (unregistering): Port device team_slave_0 removed [ 1010.573860] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1010.595659] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1010.665421] bond0 (unregistering): Released all slaves [ 1010.707760] team0 (unregistering): Port device team_slave_1 removed [ 1010.719870] team0 (unregistering): Port device team_slave_0 removed [ 1010.733265] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1010.782733] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1010.822419] bond0 (unregistering): Released all slaves [ 1010.870140] team0 (unregistering): Port device team_slave_1 removed [ 1010.892570] team0 (unregistering): Port device team_slave_0 removed [ 1010.909547] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1010.969437] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1011.039816] bond0 (unregistering): Released all slaves [ 1011.099101] team0 (unregistering): Port device team_slave_1 removed [ 1011.108816] team0 (unregistering): Port device team_slave_0 removed [ 1011.129118] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1011.143544] kthreadd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1011.154555] kthreadd cpuset=/ mems_allowed=0 [ 1011.159129] CPU: 1 PID: 2 Comm: kthreadd Not tainted 4.17.0+ #9 [ 1011.165210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1011.174568] Call Trace: [ 1011.177179] dump_stack+0x185/0x1d0 [ 1011.180847] warn_alloc+0x430/0x690 [ 1011.184501] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1011.189396] ? __msan_poison_alloca+0x15c/0x1d0 [ 1011.194137] copy_process+0x778/0x9be0 [ 1011.198070] ? __list_add_valid+0xb8/0x450 [ 1011.202357] ? pick_next_task_fair+0x22c9/0x2530 [ 1011.207153] ? kthread_blkcg+0xf0/0xf0 [ 1011.211086] ? __msan_poison_alloca+0x140/0x1d0 [ 1011.215780] _do_fork+0x353/0xf60 [ 1011.219285] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1011.224690] ? balance_callback+0x48/0x260 [ 1011.228958] ? kthread_blkcg+0xf0/0xf0 [ 1011.232869] kernel_thread+0xc6/0xe0 [ 1011.236597] ? kthread_blkcg+0xf0/0xf0 [ 1011.240495] kthreadd+0x5df/0x940 [ 1011.243956] ? kthread_stop+0x680/0x680 [ 1011.248054] ret_from_fork+0x35/0x40 [ 1011.251828] warn_alloc_show_mem: 1 callbacks suppressed [ 1011.251833] Mem-Info: [ 1011.259662] active_anon:127558 inactive_anon:78 isolated_anon:0 [ 1011.259662] active_file:72 inactive_file:36 isolated_file:0 [ 1011.259662] unevictable:0 dirty:3 writeback:0 unstable:0 [ 1011.259662] slab_reclaimable:3299 slab_unreclaimable:8883 [ 1011.259662] mapped:65579 shmem:84 pagetables:1070 bounce:0 [ 1011.259662] free:26143 free_pcp:0 free_cma:0 [ 1011.292204] Node 0 active_anon:510232kB inactive_anon:312kB active_file:288kB inactive_file:144kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:262316kB dirty:12kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 241664kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1011.319913] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1011.346127] lowmem_reserve[]: 0 2817 7244 7244 [ 1011.350774] Node 0 DMA32 free:47064kB min:26224kB low:32780kB high:39336kB active_anon:228068kB inactive_anon:16kB active_file:300kB inactive_file:520kB unevictable:0kB writepending:12kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1664kB pagetables:1304kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1011.379483] lowmem_reserve[]: 0 0 4426 4426 [ 1011.383854] Node 0 Normal free:41604kB min:41208kB low:51508kB high:61808kB active_anon:282164kB inactive_anon:296kB active_file:116kB inactive_file:20kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7808kB pagetables:2976kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1011.412553] lowmem_reserve[]: 0 0 0 0 [ 1011.416414] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1011.429742] Node 0 DMA32: 737*4kB (UM) 2644*8kB (UM) 388*16kB (UM) 10*32kB (UM) 9*64kB (U) 1*128kB (U) 0*256kB 0*512kB 0*1024kB 0*2048kB 4*4096kB (UM) = 47716kB [ 1011.444648] Node 0 Normal: 2807*4kB (UME) 1549*8kB (UME) 521*16kB (UME) 131*32kB (ME) 29*64kB (UM) 7*128kB (UM) 2*256kB (M) 1*512kB (U) 0*1024kB 1*2048kB (U) 0*4096kB = 41972kB [ 1011.460697] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1011.469302] 178 total pagecache pages [ 1011.473127] 0 pages in swap cache [ 1011.476611] Swap cache stats: add 0, delete 0, find 0/0 [ 1011.482016] Free swap = 0kB [ 1011.485090] Total swap = 0kB [ 1011.488138] 1965969 pages RAM [ 1011.491258] 0 pages HighMem/MovableOnly [ 1011.495244] 106316 pages reserved [ 1011.498765] BUG: unable to handle kernel NULL pointer dereference at 00000000000008cc [ 1011.506755] PGD 80000001b6602067 P4D 80000001b6602067 PUD 1aac1b067 PMD 0 [ 1011.513766] Oops: 0002 [#1] SMP PTI [ 1011.517375] Dumping ftrace buffer: [ 1011.520892] (ftrace buffer empty) [ 1011.524583] Modules linked in: [ 1011.527774] CPU: 0 PID: 29579 Comm: kworker/u4:2 Not tainted 4.17.0+ #9 [ 1011.534506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1011.543896] RIP: 0010:memset_erms+0x9/0x10 [ 1011.548128] RSP: 0018:ffff88013536fa50 EFLAGS: 00010046 [ 1011.553477] RAX: 0000000000000000 RBX: ffff8801d8a71d40 RCX: 0000000000000fb0 [ 1011.560732] RDX: 0000000000000fb0 RSI: 0000000000000000 RDI: 00000000000008cc [ 1011.567989] RBP: ffff88013536fa80 R08: 0000000000000000 R09: 00000000000008cc [ 1011.575253] R10: 0000000000000000 R11: ffffffff8133eda0 R12: ffff8801d8a72618 [ 1011.582513] R13: 0000000000000000 R14: 0000000000000282 R15: fffffffffffffff4 [ 1011.589774] FS: 0000000000000000(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 1011.597987] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1011.603856] CR2: 00000000000000b0 CR3: 00000001a3000000 CR4: 00000000001406f0 [ 1011.611119] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1011.618384] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1011.625643] Call Trace: [ 1011.629020] ? kmsan_thread_create+0x56/0xb0 [ 1011.633424] __kthread_create_on_node+0x6ba/0x7b0 [ 1011.638262] kthread_create_on_node+0x243/0x270 [ 1011.642924] ? process_one_work+0x1fa0/0x1fa0 [ 1011.647419] create_worker+0x7c6/0x1000 [ 1011.651383] worker_thread+0x876/0x24f0 [ 1011.655348] ? __schedule+0x67e/0x770 [ 1011.659139] kthread+0x4db/0x6c0 [ 1011.662664] ? process_one_work+0x1fa0/0x1fa0 [ 1011.667155] ? kthread_blkcg+0xf0/0xf0 [ 1011.671042] ret_from_fork+0x35/0x40 [ 1011.674741] Code: 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 [ 1011.693912] RIP: memset_erms+0x9/0x10 RSP: ffff88013536fa50 [ 1011.699612] CR2: 00000000000008cc [ 1011.703070] ---[ end trace d724a3055aaf4b7f ]--- [ 1011.707805] Kernel panic - not syncing: Fatal exception [ 1011.713717] Dumping ftrace buffer: [ 1011.717263] (ftrace buffer empty) [ 1011.720951] Kernel Offset: disabled [ 1011.724554] Rebooting in 86400 seconds..