'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) accept4$inet(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, @loopback}, &(0x7f00000002c0)=0x10, 0x0) sync() 17:00:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 17:00:19 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) getresuid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)) signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) 17:00:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000100)) 17:00:20 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:20 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xfffffffffffffd65) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@mcast2={0xff, 0x2, [], 0x1}}, 0x20) 17:00:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 17:00:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:20 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:20 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:20 executing program 6: socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) [ 898.781194] kauditd_printk_skb: 12 callbacks suppressed [ 898.781219] audit: type=1326 audit(1529686820.779:1653): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19069 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:20 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:20 executing program 2: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:20 executing program 6: socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:20 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:21 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 17:00:21 executing program 2: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:21 executing program 6: socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:21 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) setpgid(0x0, 0x0) 17:00:21 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) keyctl$get_keyring_id(0x0, 0x0, 0x0) [ 899.695099] audit: type=1326 audit(1529686821.693:1654): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19108 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:21 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) setpgid(0x0, 0x0) 17:00:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:21 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:21 executing program 2: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:22 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:22 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) setpgid(0x0, 0x0) 17:00:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:22 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:22 executing program 3: prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:22 executing program 3: prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:22 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:22 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:22 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:22 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:22 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:22 executing program 3: prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:23 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:23 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:23 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:23 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:23 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:23 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:23 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:23 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:23 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:23 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:23 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:23 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:23 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:23 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:23 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:24 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:24 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) [ 902.241292] audit: type=1326 audit(1529686824.240:1655): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19319 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:24 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:24 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) [ 902.648885] audit: type=1326 audit(1529686824.647:1656): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19362 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:25 executing program 0: setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:25 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:25 executing program 0: setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) [ 903.210926] audit: type=1326 audit(1529686825.208:1657): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19393 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:25 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) [ 903.410628] audit: type=1326 audit(1529686825.409:1658): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19411 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:25 executing program 0: setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:25 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) [ 903.594813] audit: type=1326 audit(1529686825.593:1659): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19424 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:26 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000140)={'mangle\x00'}, &(0x7f0000000200)=0x54) 17:00:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:26 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) [ 904.140587] audit: type=1326 audit(1529686826.139:1660): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19430 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) [ 904.224643] audit: type=1326 audit(1529686826.223:1661): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19431 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 904.315670] audit: type=1326 audit(1529686826.314:1662): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19450 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) [ 904.445802] audit: type=1326 audit(1529686826.444:1663): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19461 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:00:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) [ 904.585257] audit: type=1326 audit(1529686826.583:1664): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19469 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 904.641243] audit: type=1326 audit(1529686826.638:1665): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19474 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:27 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) [ 905.076808] audit: type=1326 audit(1529686827.075:1666): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19480 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) [ 905.127371] audit: type=1326 audit(1529686827.104:1667): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19486 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) [ 905.306821] audit: type=1326 audit(1529686827.305:1668): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19500 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f000000ae00)=""/57) 17:00:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) [ 905.438125] audit: type=1326 audit(1529686827.436:1669): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19509 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:27 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:28 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setpgid(0x0, 0x0) 17:00:28 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:28 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) keyctl$get_keyring_id(0x0, 0x0, 0x0) 17:00:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:28 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0xc) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000000)) 17:00:28 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f00000000c0)=0x10, 0x0) 17:00:28 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:28 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f00000001c0)='/}%,(\\\x00', 0x7, 0x0) 17:00:28 executing program 5: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:28 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:29 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:29 executing program 2: truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:29 executing program 1: ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x0) 17:00:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) 17:00:30 executing program 2: truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:30 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f0000000100), 0x4) 17:00:30 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x5}, 0x1c) 17:00:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:30 executing program 2: truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:30 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:31 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) memfd_create(&(0x7f0000000100)='system\x00', 0x0) 17:00:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:31 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:31 executing program 6: socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000006f40)) 17:00:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:31 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:31 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:31 executing program 6: socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:31 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:31 executing program 4: setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:31 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)) [ 909.766612] kauditd_printk_skb: 9 callbacks suppressed [ 909.766634] audit: type=1326 audit(1529686831.765:1679): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19778 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:31 executing program 6: socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:31 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:31 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:31 executing program 4: setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:32 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:32 executing program 4: setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:32 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:32 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:32 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:32 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:32 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 910.725247] audit: type=1326 audit(1529686832.723:1680): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19852 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:32 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:32 executing program 7: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:32 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:32 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:32 executing program 1: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:32 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:33 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) [ 911.107894] audit: type=1326 audit(1529686833.106:1681): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19882 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:33 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:33 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:33 executing program 7: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:33 executing program 1: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x28}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000100), 0xc) 17:00:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:33 executing program 7: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 911.705649] audit: type=1326 audit(1529686833.704:1682): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19905 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:33 executing program 1: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:34 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 912.096941] audit: type=1326 audit(1529686834.095:1683): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19941 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:35 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 17:00:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:35 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:35 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) [ 913.156463] audit: type=1326 audit(1529686835.154:1684): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20006 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:35 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) [ 913.398542] audit: type=1326 audit(1529686835.397:1685): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20026 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:35 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:36 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x90) [ 914.104569] audit: type=1326 audit(1529686836.103:1686): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20047 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) [ 914.453839] audit: type=1326 audit(1529686836.452:1687): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20087 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) [ 914.601714] audit: type=1326 audit(1529686836.600:1688): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20100 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) [ 915.015233] audit: type=1326 audit(1529686837.013:1689): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20117 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 915.062979] audit: type=1326 audit(1529686837.049:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20121 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 915.108746] audit: type=1326 audit(1529686837.101:1691): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20128 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) faccessat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) 17:00:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:37 executing program 5: rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:37 executing program 5: rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) [ 915.403201] audit: type=1326 audit(1529686837.401:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20141 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:37 executing program 5: rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) [ 915.605632] audit: type=1326 audit(1529686837.604:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20155 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @in6=@dev={0xfe, 0x80}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@local={0xfe, 0x80, [], 0xaa}}}, 0xe8) 17:00:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) [ 916.020869] audit: type=1326 audit(1529686838.019:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20176 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 916.074400] audit: type=1326 audit(1529686838.051:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20178 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 916.094255] audit: type=1326 audit(1529686838.061:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20170 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) [ 916.338659] audit: type=1326 audit(1529686838.337:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20187 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)) 17:00:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) [ 916.582823] audit: type=1326 audit(1529686838.581:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20207 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:38 executing program 2: socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000140)=""/87) 17:00:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:38 executing program 2: socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, &(0x7f0000000180)) 17:00:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:39 executing program 2: socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x88) 17:00:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:40 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) prctl$intptr(0x0, 0x0) 17:00:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:40 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) prctl$intptr(0x0, 0x0) 17:00:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) prctl$intptr(0x0, 0x0) 17:00:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:41 executing program 4: socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:41 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:41 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) rt_sigprocmask(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8) ioctl$EVIOCGBITKEY(0xffffffffffffffff, 0x80404521, &(0x7f00000001c0)=""/105) 17:00:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:41 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:41 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:41 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:41 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:42 executing program 6: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:42 executing program 6: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:42 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50201}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100), 0x10) 17:00:42 executing program 6: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:42 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:43 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:43 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:43 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:43 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:43 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:43 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) [ 921.450279] kauditd_printk_skb: 7 callbacks suppressed [ 921.450303] audit: type=1326 audit(1529686843.448:1706): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20523 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:43 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:43 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:43 executing program 0: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:43 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:44 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:44 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:44 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:44 executing program 0: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) [ 922.359446] audit: type=1326 audit(1529686844.356:1707): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20578 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:44 executing program 0: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:44 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:44 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) [ 922.614144] audit: type=1326 audit(1529686844.612:1708): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20608 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f00000000c0)) 17:00:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:45 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) [ 923.304448] audit: type=1326 audit(1529686845.303:1709): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20630 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) [ 923.371909] audit: type=1326 audit(1529686845.338:1710): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20637 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:45 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) [ 923.647088] audit: type=1326 audit(1529686845.645:1711): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20661 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:46 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008a}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000002a00)={&(0x7f00000001c0)=@proc={0x10}, 0xc, &(0x7f00000029c0)}, 0x0) [ 924.292938] audit: type=1326 audit(1529686846.291:1712): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20682 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008a}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008a}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) [ 924.483629] audit: type=1326 audit(1529686846.480:1713): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20699 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0), 0x0) 17:00:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000040)) 17:00:46 executing program 5: truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) [ 924.655503] audit: type=1326 audit(1529686846.654:1714): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20715 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 924.710833] audit: type=1326 audit(1529686846.674:1715): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20720 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) prctl$intptr(0x0, 0x0) 17:00:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000180)=0xc) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000001280), &(0x7f00000000c0)=0x68) 17:00:47 executing program 5: truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:47 executing program 5: truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:47 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:47 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:47 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) getgroups(0x0, &(0x7f0000000100)) 17:00:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:48 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:48 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000000)) getgroups(0x0, &(0x7f0000000100)) 17:00:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0), 0x4) 17:00:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) [ 926.473836] kauditd_printk_skb: 6 callbacks suppressed [ 926.473861] audit: type=1326 audit(1529686848.472:1722): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20803 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:00:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) [ 926.738434] audit: type=1326 audit(1529686848.736:1723): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20825 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:49 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) [ 927.151117] audit: type=1326 audit(1529686849.149:1724): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20834 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000040)) 17:00:49 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) [ 927.291516] audit: type=1326 audit(1529686849.289:1725): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20846 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501ec}]}) memfd_create(&(0x7f00000000c0)='vboxnet0\x00', 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) 17:00:49 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:49 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:49 executing program 2: accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) [ 927.718703] audit: type=1326 audit(1529686849.717:1726): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20876 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "83af18726951ec3b12d7ebf54eb6fb3c9290e4e8dd50177408b75f4442a7cc87f1e7602134ca28e4a126762b75341249c827be566eede83e8cee2e2be24db6e4", "3f961577562c6da56e7350782fa3ceede48e374f48a7ccd3b7386431e749b07704bf32f44c527e8b02f3ec5134b8996e4519eba08194b21522714b9e30adcf45", "38a89663f5e6d7c966d376abdf05ec1222e70392d87ae12f837eb63524bde02d"}) 17:00:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) keyctl$assume_authority(0x10, 0x0) 17:00:50 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140), 0x0) 17:00:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f00000000c0)=""/151, &(0x7f0000000180)=0x97) 17:00:50 executing program 2: accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) [ 928.116520] audit: type=1326 audit(1529686850.115:1727): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20896 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) keyctl$assume_authority(0x10, 0x0) 17:00:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:50 executing program 2: accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) 17:00:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000180)}, 0x20) symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='./file0\x00') 17:00:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:50 executing program 3: socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) keyctl$assume_authority(0x10, 0x0) 17:00:50 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') [ 928.669011] audit: type=1326 audit(1529686850.667:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20935 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) shmdt(0x0) 17:00:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:51 executing program 3: socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:51 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:51 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:51 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:51 executing program 3: socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) 17:00:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:51 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)={0x8}, &(0x7f0000000080), 0x0) 17:00:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:51 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) chdir(&(0x7f0000000200)='./file0\x00') 17:00:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) 17:00:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) [ 929.639731] audit: type=1326 audit(1529686851.638:1729): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21004 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) chdir(&(0x7f0000000200)='./file0\x00') 17:00:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f00000002c0)) 17:00:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:51 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) chdir(&(0x7f0000000200)='./file0\x00') 17:00:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50207}]}) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:52 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:52 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50207}]}) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:52 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:52 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50207}]}) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:53 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 931.268294] audit: type=1326 audit(1529686853.252:1730): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21113 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:53 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:53 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:53 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:53 executing program 6: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:54 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:54 executing program 6: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) [ 932.180226] audit: type=1326 audit(1529686854.178:1731): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21175 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:54 executing program 6: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:54 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) [ 932.470148] audit: type=1326 audit(1529686854.468:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21204 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x44) 17:00:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:55 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:55 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) [ 933.149223] audit: type=1326 audit(1529686855.147:1733): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21229 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:55 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:55 executing program 5: socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) [ 933.457724] audit: type=1326 audit(1529686855.456:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21263 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 933.490955] audit: type=1326 audit(1529686855.489:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21268 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:56 executing program 5: socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:56 executing program 7: socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:56 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000040)) 17:00:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:56 executing program 5: socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) keyctl$assume_authority(0x10, 0x0) 17:00:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 17:00:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 934.526550] audit: type=1326 audit(1529686856.524:1736): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21326 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) [ 934.626440] audit: type=1326 audit(1529686856.623:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21324 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0) 17:00:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) [ 934.726924] audit: type=1326 audit(1529686856.647:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21335 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x0, 0x0) [ 934.921042] audit: type=1326 audit(1529686856.918:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21367 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:57 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) 17:00:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:00:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540)=0x4) 17:00:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') [ 935.509366] audit: type=1326 audit(1529686857.508:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21383 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:00:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:00:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:00:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:00:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:00:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) 17:00:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) chdir(&(0x7f0000000200)='./file0\x00') 17:00:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="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", 0x2, 0x0) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) 17:00:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:00:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) 17:00:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000d}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 17:00:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) 17:00:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:00:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000800)='/dev/ppp\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) 17:00:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:59 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:00:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:00:59 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:00:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:00:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:00:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:00:59 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000180)) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f0000000080)=0xc) [ 937.481601] kauditd_printk_skb: 7 callbacks suppressed [ 937.481622] audit: type=1326 audit(1529686859.480:1748): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21533 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:59 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:00:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:00:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:00:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:00:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:00:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)) 17:00:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:00:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) [ 937.893939] audit: type=1326 audit(1529686859.892:1749): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21558 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:00:59 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) [ 937.958845] audit: type=1326 audit(1529686859.938:1750): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21561 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:00 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:01:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:00 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:01:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:00 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:01:00 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) [ 938.446538] audit: type=1326 audit(1529686860.445:1751): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21606 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 17:01:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:01:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) clock_getres(0x0, &(0x7f00000004c0)) [ 938.815446] audit: type=1326 audit(1529686860.813:1752): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21619 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:01:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) clock_getres(0x0, &(0x7f00000004c0)) 17:01:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:01:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) [ 939.389632] audit: type=1326 audit(1529686861.388:1753): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21664 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) clock_getres(0x0, &(0x7f00000004c0)) 17:01:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:01:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, @loopback}, &(0x7f0000000180)=0x10) fchown(0xffffffffffffffff, 0x0, 0x0) 17:01:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:01 executing program 3: socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:01:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$setopts(0x0, 0x0, 0x0, 0x0) 17:01:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)) 17:01:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:01:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:02 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:02 executing program 3: socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:02 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:02 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:01:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:02 executing program 3: socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50005}]}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) [ 940.571823] audit: type=1326 audit(1529686862.570:1754): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21747 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000140), 0x0) 17:01:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:02 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:02 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:02 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50005}]}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:02 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:02 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:03 executing program 6: socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:03 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:01:03 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50005}]}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:03 executing program 6: socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:03 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) [ 941.577526] audit: type=1326 audit(1529686863.576:1755): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21827 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:03 executing program 6: socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:03 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) [ 941.683488] audit: type=1326 audit(1529686863.682:1756): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21833 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50005}]}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:03 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) socket(0x0, 0x0, 0x0) 17:01:04 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50005}]}) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) [ 942.547141] audit: type=1326 audit(1529686864.545:1757): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21880 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:04 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50005}]}) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) [ 942.745132] audit: type=1326 audit(1529686864.743:1758): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21893 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fb}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50005}]}) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fb}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fb}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:05 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 17:01:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) [ 943.793313] audit: type=1326 audit(1529686865.791:1759): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21966 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:05 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:05 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) [ 943.982661] audit: type=1326 audit(1529686865.981:1760): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21982 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:06 executing program 5: openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:06 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) [ 944.167154] audit: type=1326 audit(1529686866.165:1761): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21999 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:06 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50005}]}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:06 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:06 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:06 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50005}]}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) [ 945.001193] audit: type=1326 audit(1529686866.999:1762): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22047 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) userfaultfd(0x0) 17:01:07 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50005}]}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) [ 945.089347] audit: type=1326 audit(1529686867.046:1763): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22048 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) [ 945.234465] audit: type=1326 audit(1529686867.190:1764): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22064 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) userfaultfd(0x0) 17:01:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) keyctl$chown(0x4, 0x0, 0x0, 0x0) 17:01:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) userfaultfd(0x0) [ 945.916676] audit: type=1326 audit(1529686867.915:1765): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22105 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 945.982397] audit: type=1326 audit(1529686867.981:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22114 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000300)={0x0, &(0x7f00000002c0)}, 0x10) 17:01:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000004fe8)}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:08 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:08 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50005}]}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:08 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50005}]}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) clock_getres(0x0, &(0x7f00000004c0)) 17:01:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:09 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50005}]}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) seccomp(0x0, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000100)}) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 17:01:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:09 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00', &(0x7f00000000c0)='vmnet1md5sum:\x00', 0xe, 0x0) 17:01:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.posix_acl_default\x00', &(0x7f00000000c0)='vmnet1md5sum:\x00', 0xe, 0x0) 17:01:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:09 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) [ 947.871808] kauditd_printk_skb: 5 callbacks suppressed [ 947.871837] audit: type=1326 audit(1529686869.870:1772): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22212 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 17:01:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) [ 948.110808] audit: type=1326 audit(1529686870.109:1773): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22237 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) [ 948.283176] audit: type=1326 audit(1529686870.281:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22248 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) [ 948.829309] audit: type=1326 audit(1529686870.827:1775): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22274 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_dccp_buf(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000200), 0x0) 17:01:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) 17:01:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:11 executing program 0: socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) [ 949.310800] audit: type=1326 audit(1529686871.309:1776): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22308 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 949.339761] audit: type=1326 audit(1529686871.330:1777): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22303 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:11 executing program 0: socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000080), 0x4) 17:01:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:11 executing program 0: socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) [ 949.801033] audit: type=1326 audit(1529686871.799:1778): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22335 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) [ 950.267900] audit: type=1326 audit(1529686872.266:1779): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22354 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) [ 950.890734] audit: type=1326 audit(1529686872.889:1780): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22398 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000180)=0xc) userfaultfd(0x0) 17:01:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:13 executing program 3: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:13 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) [ 951.241613] audit: type=1326 audit(1529686873.233:1781): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22421 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:13 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:13 executing program 3: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:13 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:13 executing program 3: accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:14 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:14 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:14 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:14 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:14 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:14 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:15 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x0) 17:01:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:15 executing program 6: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:15 executing program 6: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) [ 953.157945] kauditd_printk_skb: 1 callbacks suppressed [ 953.157966] audit: type=1326 audit(1529686875.156:1783): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22531 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:15 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:16 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:16 executing program 6: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:16 executing program 7: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) [ 954.095849] audit: type=1326 audit(1529686876.094:1784): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22575 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:16 executing program 7: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:16 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:16 executing program 7: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:17 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:17 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:17 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:17 executing program 2: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) [ 955.032513] audit: type=1326 audit(1529686877.030:1785): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22628 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:17 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') [ 955.101742] audit: type=1326 audit(1529686877.051:1786): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22631 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 955.121580] audit: type=1326 audit(1529686877.077:1787): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22640 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:17 executing program 2: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:17 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:17 executing program 2: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000500), 0x0) 17:01:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:17 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) [ 956.000502] audit: type=1326 audit(1529686877.999:1788): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22677 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 956.043243] audit: type=1326 audit(1529686878.041:1789): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22685 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') [ 956.116848] audit: type=1326 audit(1529686878.115:1790): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22684 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008a}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008a}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008a}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000180)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 17:01:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000200)=""/165) 17:01:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) [ 957.102603] audit: type=1326 audit(1529686879.101:1791): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22743 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) [ 957.196042] audit: type=1326 audit(1529686879.145:1792): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22750 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) tkill(0x0, 0x0) [ 958.188840] kauditd_printk_skb: 4 callbacks suppressed [ 958.188865] audit: type=1326 audit(1529686880.187:1797): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22812 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:20 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) [ 958.319041] audit: type=1326 audit(1529686880.289:1798): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22818 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) tkill(0x0, 0x0) 17:01:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) [ 958.470932] audit: type=1326 audit(1529686880.379:1799): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22826 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:20 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) tkill(0x0, 0x0) 17:01:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:20 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000380)=ANY=[], &(0x7f0000000140)) 17:01:21 executing program 0: truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) [ 959.054676] audit: type=1326 audit(1529686881.052:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22865 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 959.127863] audit: type=1326 audit(1529686881.126:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22870 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) rmdir(&(0x7f0000000200)='./file0\x00') 17:01:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) [ 959.227941] audit: type=1326 audit(1529686881.226:1802): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22876 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) 17:01:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:21 executing program 0: truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:21 executing program 0: truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) [ 959.356428] audit: type=1326 audit(1529686881.355:1803): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22888 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:21 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) write$binfmt_script(0xffffffffffffffff, &(0x7f00000001c0)={'#! ', './file0', [], 0xa}, 0xb) 17:01:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) [ 960.108246] audit: type=1326 audit(1529686882.106:1804): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22922 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:22 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:22 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:22 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:22 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:22 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:22 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:23 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:23 executing program 3: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:23 executing program 2: r0 = socket$inet(0x2, 0x801, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) connect$inet(r0, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) connect$inet(r0, &(0x7f00000dcff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect(r0, &(0x7f0000000000)=@un=@abs, 0x80) 17:01:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:23 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) [ 961.528226] audit: type=1326 audit(1529686883.526:1805): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23028 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:23 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:23 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:24 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) [ 962.488623] audit: type=1326 audit(1529686884.487:1806): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23086 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:24 executing program 7: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:24 executing program 6: socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:24 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:24 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, &(0x7f0000000040)) 17:01:25 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:25 executing program 7: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:25 executing program 6: socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:25 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) [ 963.382547] kauditd_printk_skb: 1 callbacks suppressed [ 963.382569] audit: type=1326 audit(1529686885.381:1808): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23137 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:25 executing program 6: socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:25 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:25 executing program 7: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:25 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) [ 963.718913] audit: type=1326 audit(1529686885.716:1809): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23169 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 963.815172] audit: type=1326 audit(1529686885.769:1810): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23177 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:26 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) [ 964.334638] audit: type=1326 audit(1529686886.333:1811): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23189 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:26 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:26 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) tkill(0x0, 0x0) 17:01:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:26 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:26 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) [ 964.713569] audit: type=1326 audit(1529686886.705:1812): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23224 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:26 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) [ 964.770341] audit: type=1326 audit(1529686886.738:1813): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23232 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:27 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) [ 965.283036] audit: type=1326 audit(1529686887.281:1814): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23264 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) 17:01:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:27 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) [ 965.690857] audit: type=1326 audit(1529686887.689:1815): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23277 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:27 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) poll(&(0x7f0000000080), 0x0, 0x0) 17:01:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) 17:01:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) [ 966.256796] audit: type=1326 audit(1529686888.255:1816): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23321 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) 17:01:28 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:28 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) [ 966.786001] audit: type=1326 audit(1529686888.784:1817): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23350 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) 17:01:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:29 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000140)='logon\x00', &(0x7f0000000180)='\\&))system\x00') 17:01:29 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:29 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setregid(0x0, 0x0) 17:01:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:29 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) unlinkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) 17:01:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:29 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setregid(0x0, 0x0) 17:01:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:30 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:30 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) removexattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@random={'osx.', 'net/anycast6\x00'}) 17:01:30 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) setregid(0x0, 0x0) 17:01:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:30 executing program 0: getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) 17:01:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:30 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) removexattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@random={'osx.', 'net/anycast6\x00'}) 17:01:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:30 executing program 0: getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) [ 968.430741] kauditd_printk_skb: 5 callbacks suppressed [ 968.430771] audit: type=1326 audit(1529686890.429:1823): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23444 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:30 executing program 0: getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) [ 968.680146] audit: type=1326 audit(1529686890.678:1824): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23460 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) 17:01:31 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) removexattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@random={'osx.', 'net/anycast6\x00'}) 17:01:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:31 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) 17:01:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:31 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) [ 969.104893] audit: type=1326 audit(1529686891.103:1825): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23471 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:31 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) 17:01:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) [ 969.166720] audit: type=1326 audit(1529686891.135:1826): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23479 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:31 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) removexattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=@random={'osx.', 'net/anycast6\x00'}) 17:01:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 17:01:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:31 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) 17:01:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) [ 969.394793] audit: type=1326 audit(1529686891.393:1827): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23495 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x501ff}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) 17:01:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) 17:01:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000140)) 17:01:32 executing program 1: accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) 17:01:32 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 17:01:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) [ 970.109161] audit: type=1326 audit(1529686892.107:1828): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23530 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) 17:01:32 executing program 3: prctl$setptracer(0x59616d61, 0x0) prctl$setendian(0x14, 0x0) 17:01:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:32 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50201}]}) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000100), 0x0, 0xfffffffffffffffb) ioctl$SIOCGIFMTU(0xffffffffffffffff, 0x8921, &(0x7f0000000200)) 17:01:32 executing program 1: accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) [ 970.464391] audit: type=1326 audit(1529686892.454:1829): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23566 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:32 executing program 1: accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:32 executing program 3: prctl$setptracer(0x59616d61, 0x0) prctl$setendian(0x14, 0x0) 17:01:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:32 executing program 3: prctl$setptracer(0x59616d61, 0x0) prctl$setendian(0x14, 0x0) 17:01:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) 17:01:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 17:01:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:33 executing program 3: prctl$setptracer(0x59616d61, 0x0) prctl$setendian(0x14, 0x0) 17:01:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) [ 971.196712] audit: type=1326 audit(1529686893.195:1830): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23613 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:33 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:01:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) keyctl$clear(0x7, 0x0) 17:01:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) [ 971.438906] audit: type=1326 audit(1529686893.437:1831): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23636 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000080)={'ip6gretap0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:01:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) 17:01:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:34 executing program 5: prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:34 executing program 6: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) [ 972.375299] audit: type=1326 audit(1529686894.373:1832): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23679 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:34 executing program 5: prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008a}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:34 executing program 6: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:34 executing program 5: prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:34 executing program 6: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008a}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000200)) setregid(0x0, 0x0) 17:01:35 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:35 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008a}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:35 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) [ 973.789673] kauditd_printk_skb: 2 callbacks suppressed [ 973.789698] audit: type=1326 audit(1529686895.788:1835): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23771 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:36 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:36 executing program 2: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:36 executing program 2: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:36 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:36 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:36 executing program 3: sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:36 executing program 2: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:36 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) [ 974.704872] audit: type=1326 audit(1529686896.703:1836): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23826 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:36 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:36 executing program 3: sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:36 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:37 executing program 3: sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) accept$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000000)=0x6e) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000300)={0x10}, 0xc, &(0x7f00000003c0)={&(0x7f0000000540)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:37 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:37 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) socket$l2tp(0x18, 0x1, 0x1) 17:01:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) [ 975.625628] audit: type=1326 audit(1529686897.624:1837): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23874 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:37 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:37 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) socket$l2tp(0x18, 0x1, 0x1) 17:01:37 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:38 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:38 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) socket$l2tp(0x18, 0x1, 0x1) 17:01:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) [ 976.593818] audit: type=1326 audit(1529686898.592:1838): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23925 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:38 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) [ 976.662313] audit: type=1326 audit(1529686898.622:1839): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23928 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:38 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:38 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:39 executing program 4: socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:39 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) 17:01:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:39 executing program 0: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) [ 977.540821] audit: type=1326 audit(1529686899.539:1840): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23980 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:39 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) [ 977.616626] audit: type=1326 audit(1529686899.596:1841): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23988 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:39 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:40 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f0000000080)) 17:01:40 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:40 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000180), 0x4) [ 978.539978] audit: type=1326 audit(1529686900.538:1842): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24033 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) [ 978.592200] audit: type=1326 audit(1529686900.580:1843): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24042 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:40 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050209}]}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) [ 978.706547] audit: type=1326 audit(1529686900.705:1844): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24046 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50208}]}) accept4$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000000)=0x6e, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 17:01:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:41 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 979.519254] audit: type=1326 audit(1529686901.516:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24081 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) [ 979.575925] audit: type=1326 audit(1529686901.543:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24080 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:41 executing program 1: socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) dup2(0xffffffffffffff9c, 0xffffffffffffffff) 17:01:41 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) [ 979.759526] audit: type=1326 audit(1529686901.758:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24100 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000014c0)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001700)={{{@in6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}}, {{@in6=@local={0xfe, 0x80, [], 0xaa}}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0xe8) 17:01:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) 17:01:42 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:42 executing program 1: socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050209}]}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) [ 980.495220] audit: type=1326 audit(1529686902.493:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24134 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 980.572689] audit: type=1326 audit(1529686902.514:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24144 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/231, &(0x7f0000000240)=0xe7) 17:01:42 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:42 executing program 1: socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) [ 980.718281] audit: type=1326 audit(1529686902.716:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24157 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 980.738193] audit: type=1326 audit(1529686902.717:1851): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24156 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 980.846016] audit: type=1326 audit(1529686902.841:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24163 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:42 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) semctl$SEM_INFO(0x0, 0x0, 0x13, &(0x7f0000000040)=""/86) 17:01:43 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:43 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) sysfs$2(0x2, 0x0, &(0x7f0000000140)=""/106) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x0, 0x0, 0x0, 0x0, {0x8}}, 0x14}, 0x1}, 0x0) [ 981.446596] audit: type=1326 audit(1529686903.445:1853): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24191 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:43 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 981.503223] audit: type=1326 audit(1529686903.489:1854): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24200 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:43 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:43 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:43 executing program 6: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:43 executing program 6: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) semget$private(0x0, 0x0, 0x0) 17:01:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:44 executing program 6: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:44 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) socket$l2tp(0x18, 0x1, 0x1) 17:01:44 executing program 5: socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:44 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) socket$inet6_udplite(0xa, 0x2, 0x88) sched_rr_get_interval(0x0, &(0x7f0000000100)) 17:01:44 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:44 executing program 5: socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:45 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:45 executing program 5: socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:45 executing program 4: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000580)={&(0x7f0000000440)=@generic={0x2, "3767b4818fa51940a75a64ff601bed813ca4a744c0b30776cbb54beba33938bf9ccf422347bed9adea3ea7b2af4dc38251de34ee1983e9f78ee47cdbc9f40f1c533e017a6210f8b1ae7433ba79ea888efd4d2ca875816bb74e7216bf0a3da8b1dbb6bd851d93d102318daaf0f7c44c2c16d06122e97f68275e698782a0a1"}, 0x80, &(0x7f00000006c0), 0x0, &(0x7f0000003e80)=ANY=[]}, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000000140), 0x0, &(0x7f00000005c0)=""/201, 0xc9, 0x2}, 0x10102) setsockopt$sock_attach_bpf(r0, 0x84, 0xb, &(0x7f0000000080), 0x4) sendmsg$kcm(r0, &(0x7f0000001d40)={&(0x7f0000000740)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x16}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001bc0)="01", 0x1}], 0x1, &(0x7f0000001c80)}, 0x0) 17:01:45 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:45 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000040)}, 0x20) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:01:45 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:45 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:45 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@mcast2={0xff, 0x2, [], 0x1}, @empty, @mcast1={0xff, 0x1, [], 0x1}}) 17:01:46 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:46 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:46 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:46 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:46 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 17:01:46 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:46 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:46 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, &(0x7f0000000140)) 17:01:46 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:46 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:46 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:46 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:46 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) [ 984.994184] kauditd_printk_skb: 5 callbacks suppressed [ 984.994207] audit: type=1326 audit(1529686906.992:1860): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24446 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:47 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:47 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:47 executing program 3: socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) [ 985.105512] audit: type=1326 audit(1529686907.061:1861): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24461 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:47 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:47 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:47 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:47 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:01:47 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:47 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:47 executing program 3: socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) 17:01:47 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) [ 985.995914] audit: type=1326 audit(1529686907.994:1862): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24508 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:48 executing program 3: socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) [ 986.086752] audit: type=1326 audit(1529686908.047:1863): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24521 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:48 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:48 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:48 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:48 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:48 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000140)) 17:01:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:48 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 986.997859] audit: type=1326 audit(1529686908.996:1864): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24572 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:49 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:49 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:49 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:49 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) [ 987.314516] audit: type=1326 audit(1529686909.313:1865): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24607 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:49 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:49 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008a}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:49 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:49 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:49 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:50 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:50 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008a}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:50 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:50 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) [ 988.238249] audit: type=1326 audit(1529686910.236:1866): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24668 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008a}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:50 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:50 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) [ 988.317323] audit: type=1326 audit(1529686910.287:1867): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24684 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:50 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:50 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) [ 988.690366] audit: type=1326 audit(1529686910.689:1868): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24713 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x44) 17:01:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:51 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:51 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) [ 989.225265] audit: type=1326 audit(1529686911.223:1869): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24729 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:51 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) 17:01:52 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000200)) 17:01:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) [ 990.219616] kauditd_printk_skb: 2 callbacks suppressed [ 990.219639] audit: type=1326 audit(1529686912.217:1872): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24778 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 990.244751] audit: type=1326 audit(1529686912.220:1873): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24781 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:52 executing program 1: socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:52 executing program 1: socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) [ 990.597845] audit: type=1326 audit(1529686912.596:1874): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24813 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000080)) [ 990.725138] audit: type=1326 audit(1529686912.722:1875): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24822 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:53 executing program 1: socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:53 executing program 6: openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:01:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:53 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) [ 991.217606] audit: type=1326 audit(1529686913.216:1876): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24841 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:53 executing program 6: openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:53 executing program 6: openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:53 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) [ 991.481925] audit: type=1326 audit(1529686913.480:1877): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24859 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) [ 991.650130] audit: type=1326 audit(1529686913.648:1878): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24872 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:53 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140), 0xc) 17:01:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000300), 0x0) 17:01:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='com.apple.FinderInfo\x00', &(0x7f0000000180)='cpuset\x00', 0x7, 0x0) 17:01:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:01:54 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) [ 992.227788] audit: type=1326 audit(1529686914.226:1879): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24902 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:54 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) [ 992.471848] audit: type=1326 audit(1529686914.470:1880): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24922 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:54 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$TUNGETFEATURES(0xffffffffffffffff, 0x800454cf, &(0x7f0000000100)) 17:01:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:01:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='com.apple.FinderInfo\x00', &(0x7f0000000180)='cpuset\x00', 0x7, 0x0) 17:01:54 executing program 5: pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:54 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) [ 992.632766] audit: type=1326 audit(1529686914.631:1881): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24939 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:55 executing program 5: pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:55 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) getpgid(0x0) 17:01:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) setxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='com.apple.FinderInfo\x00', &(0x7f0000000180)='cpuset\x00', 0x7, 0x0) 17:01:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:01:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000000200)) 17:01:55 executing program 5: pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:55 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) getpgid(0x0) 17:01:55 executing program 7: 17:01:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:01:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:55 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:55 executing program 4: 17:01:55 executing program 7: 17:01:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:55 executing program 4: 17:01:55 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) getpgid(0x0) 17:01:56 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:01:56 executing program 7: 17:01:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:01:56 executing program 4: 17:01:56 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:56 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:56 executing program 0: 17:01:56 executing program 4: 17:01:56 executing program 7: 17:01:56 executing program 0: 17:01:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:56 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:01:56 executing program 4: 17:01:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:01:56 executing program 7: 17:01:56 executing program 0: 17:01:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:56 executing program 2: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:01:56 executing program 7: 17:01:56 executing program 4: 17:01:57 executing program 4: 17:01:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) 17:01:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:01:57 executing program 0: 17:01:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:01:57 executing program 7: 17:01:57 executing program 4: 17:01:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) [ 995.383819] kauditd_printk_skb: 3 callbacks suppressed [ 995.383844] audit: type=1326 audit(1529686917.382:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25085 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:57 executing program 0: 17:01:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:01:57 executing program 7: 17:01:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:01:57 executing program 4: [ 995.558254] audit: type=1326 audit(1529686917.444:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25090 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:01:57 executing program 0: 17:01:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$cgroup_int(0xffffffffffffff9c, &(0x7f0000000040)='memory.max\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(0xffffffffffffffff, 0x111, 0x5, 0x0, 0x4) 17:01:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:58 executing program 7: 17:01:58 executing program 4: 17:01:58 executing program 0: 17:01:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:01:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:01:58 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) socket(0x0, 0x0, 0x0) msgsnd(0x0, &(0x7f0000000180), 0x8, 0x0) [ 996.394965] audit: type=1326 audit(1529686918.393:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25123 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:58 executing program 7: 17:01:58 executing program 4: 17:01:58 executing program 0: 17:01:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) [ 996.478855] audit: type=1326 audit(1529686918.430:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25124 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:58 executing program 3: prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:01:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:58 executing program 4: 17:01:58 executing program 0: 17:01:59 executing program 1: 17:01:59 executing program 7: 17:01:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:01:59 executing program 3: prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:01:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:01:59 executing program 4: 17:01:59 executing program 0: 17:01:59 executing program 6: 17:01:59 executing program 7: [ 997.356737] audit: type=1326 audit(1529686919.355:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25172 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:01:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:01:59 executing program 0: 17:01:59 executing program 6: 17:01:59 executing program 1: 17:01:59 executing program 4: 17:01:59 executing program 3: prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:01:59 executing program 7: 17:01:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:01:59 executing program 0: 17:01:59 executing program 6: 17:01:59 executing program 1: 17:02:00 executing program 6: 17:02:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:02:00 executing program 4: 17:02:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:02:00 executing program 1: 17:02:00 executing program 0: 17:02:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:02:00 executing program 7: 17:02:00 executing program 4: [ 998.336499] audit: type=1326 audit(1529686920.335:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25221 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:00 executing program 1: 17:02:00 executing program 7: 17:02:00 executing program 0: 17:02:00 executing program 6: 17:02:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:02:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:02:00 executing program 4: [ 998.539668] audit: type=1326 audit(1529686920.538:1891): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25236 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:00 executing program 6: 17:02:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "5fd6c6e2cd778af1a496dfacc201e4e5ce30103bbf871610cb3a5870683df40bc9e6b2142de22232f7ed21c19a22a075431bcf08f85ebf8e9574379f0590a95b", "9febf8c7c69970ac2406777816d0760a05b8528cc674a1bfe1fbb98080500733"}) 17:02:01 executing program 7: 17:02:01 executing program 1: 17:02:01 executing program 0: 17:02:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:02:01 executing program 4: 17:02:01 executing program 6: 17:02:01 executing program 4: 17:02:01 executing program 6: 17:02:01 executing program 1: [ 999.311832] audit: type=1326 audit(1529686921.305:1892): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25258 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:01 executing program 0: 17:02:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:02:01 executing program 7: 17:02:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:02:01 executing program 1: 17:02:01 executing program 6: [ 999.630858] audit: type=1326 audit(1529686921.622:1893): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25281 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:02:02 executing program 4: 17:02:02 executing program 0: 17:02:02 executing program 7: 17:02:02 executing program 6: 17:02:02 executing program 1: 17:02:02 executing program 5: 17:02:02 executing program 7: 17:02:02 executing program 4: 17:02:02 executing program 0: 17:02:02 executing program 6: 17:02:02 executing program 1: 17:02:02 executing program 5: 17:02:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) getpgid(0x0) 17:02:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:02:02 executing program 7: 17:02:02 executing program 6: 17:02:02 executing program 4: 17:02:02 executing program 1: 17:02:02 executing program 0: 17:02:02 executing program 5: 17:02:02 executing program 1: 17:02:02 executing program 4: 17:02:02 executing program 6: [ 1000.713285] audit: type=1326 audit(1529686922.711:1894): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25326 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:02 executing program 7: 17:02:02 executing program 0: 17:02:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:02:02 executing program 5: 17:02:02 executing program 1: 17:02:03 executing program 6: 17:02:03 executing program 0: 17:02:03 executing program 4: 17:02:03 executing program 5: 17:02:03 executing program 7: 17:02:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:02:03 executing program 1: 17:02:03 executing program 2: 17:02:03 executing program 1: 17:02:03 executing program 5: 17:02:03 executing program 6: 17:02:03 executing program 4: 17:02:03 executing program 7: 17:02:03 executing program 0: 17:02:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:02:03 executing program 2: 17:02:03 executing program 5: 17:02:03 executing program 6: 17:02:03 executing program 1: 17:02:03 executing program 4: 17:02:03 executing program 0: 17:02:04 executing program 2: 17:02:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:02:04 executing program 7: 17:02:04 executing program 0: 17:02:04 executing program 5: 17:02:04 executing program 6: 17:02:04 executing program 1: 17:02:04 executing program 4: [ 1002.200932] audit: type=1326 audit(1529686924.199:1895): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25393 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:04 executing program 2: 17:02:04 executing program 7: 17:02:04 executing program 6: 17:02:04 executing program 0: 17:02:04 executing program 5: 17:02:04 executing program 1: 17:02:04 executing program 4: 17:02:04 executing program 7: 17:02:04 executing program 5: 17:02:05 executing program 6: 17:02:05 executing program 2: 17:02:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:02:05 executing program 0: 17:02:05 executing program 1: 17:02:05 executing program 5: 17:02:05 executing program 7: 17:02:05 executing program 4: 17:02:05 executing program 1: 17:02:05 executing program 5: [ 1003.140727] audit: type=1326 audit(1529686925.138:1896): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25440 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:05 executing program 2: 17:02:05 executing program 4: 17:02:05 executing program 0: 17:02:05 executing program 6: 17:02:05 executing program 7: 17:02:05 executing program 1: 17:02:05 executing program 0: 17:02:05 executing program 2: 17:02:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000003c0)}) select(0x40, &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240), &(0x7f00000002c0)) 17:02:06 executing program 4: 17:02:06 executing program 6: 17:02:06 executing program 5: 17:02:06 executing program 7: 17:02:06 executing program 1: 17:02:06 executing program 2: 17:02:06 executing program 0: 17:02:06 executing program 0: 17:02:06 executing program 2: 17:02:06 executing program 6: 17:02:06 executing program 1: 17:02:06 executing program 7: [ 1004.119905] audit: type=1326 audit(1529686926.118:1897): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25478 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:06 executing program 4: 17:02:06 executing program 5: 17:02:06 executing program 0: 17:02:07 executing program 7: 17:02:07 executing program 2: 17:02:07 executing program 6: 17:02:07 executing program 4: 17:02:07 executing program 5: 17:02:07 executing program 1: 17:02:07 executing program 0: 17:02:07 executing program 3: 17:02:07 executing program 4: 17:02:07 executing program 0: 17:02:07 executing program 1: 17:02:07 executing program 6: 17:02:07 executing program 7: 17:02:07 executing program 2: 17:02:07 executing program 5: 17:02:07 executing program 3: 17:02:07 executing program 4: 17:02:07 executing program 0: 17:02:07 executing program 6: 17:02:07 executing program 1: 17:02:07 executing program 5: 17:02:07 executing program 7: 17:02:07 executing program 3: 17:02:07 executing program 2: 17:02:07 executing program 4: 17:02:07 executing program 5: 17:02:07 executing program 6: 17:02:07 executing program 1: 17:02:07 executing program 2: 17:02:07 executing program 0: 17:02:07 executing program 7: 17:02:07 executing program 3: 17:02:07 executing program 4: 17:02:07 executing program 5: 17:02:07 executing program 1: 17:02:07 executing program 6: 17:02:07 executing program 7: 17:02:07 executing program 3: 17:02:07 executing program 2: 17:02:07 executing program 0: 17:02:07 executing program 1: 17:02:07 executing program 4: 17:02:08 executing program 5: 17:02:08 executing program 7: 17:02:08 executing program 3: 17:02:08 executing program 2: 17:02:08 executing program 0: 17:02:08 executing program 6: 17:02:08 executing program 5: 17:02:08 executing program 1: 17:02:08 executing program 7: 17:02:08 executing program 4: 17:02:08 executing program 2: 17:02:08 executing program 3: 17:02:08 executing program 6: 17:02:08 executing program 0: 17:02:08 executing program 5: 17:02:08 executing program 1: 17:02:08 executing program 4: 17:02:08 executing program 7: 17:02:08 executing program 3: 17:02:08 executing program 2: 17:02:08 executing program 6: 17:02:08 executing program 5: 17:02:08 executing program 0: 17:02:08 executing program 1: 17:02:08 executing program 7: 17:02:08 executing program 4: 17:02:08 executing program 3: 17:02:08 executing program 2: 17:02:08 executing program 5: 17:02:08 executing program 6: 17:02:08 executing program 0: 17:02:08 executing program 7: 17:02:08 executing program 4: 17:02:08 executing program 1: 17:02:08 executing program 2: 17:02:08 executing program 3: 17:02:09 executing program 5: 17:02:09 executing program 6: 17:02:09 executing program 7: 17:02:09 executing program 0: 17:02:09 executing program 4: 17:02:09 executing program 2: 17:02:09 executing program 3: 17:02:09 executing program 5: 17:02:09 executing program 1: 17:02:09 executing program 7: 17:02:09 executing program 6: 17:02:09 executing program 2: 17:02:09 executing program 4: 17:02:09 executing program 0: 17:02:09 executing program 3: 17:02:09 executing program 5: 17:02:09 executing program 1: 17:02:09 executing program 7: 17:02:09 executing program 6: 17:02:09 executing program 2: 17:02:09 executing program 5: 17:02:09 executing program 0: 17:02:09 executing program 4: 17:02:09 executing program 3: 17:02:09 executing program 1: 17:02:09 executing program 7: 17:02:09 executing program 6: 17:02:09 executing program 0: 17:02:09 executing program 4: 17:02:09 executing program 5: 17:02:09 executing program 2: 17:02:09 executing program 3: 17:02:09 executing program 1: 17:02:09 executing program 7: 17:02:09 executing program 5: 17:02:10 executing program 6: 17:02:10 executing program 0: 17:02:10 executing program 4: 17:02:10 executing program 2: 17:02:10 executing program 3: 17:02:10 executing program 1: 17:02:10 executing program 5: 17:02:10 executing program 7: 17:02:10 executing program 6: 17:02:10 executing program 3: 17:02:10 executing program 2: 17:02:10 executing program 5: 17:02:10 executing program 4: 17:02:10 executing program 0: 17:02:10 executing program 6: 17:02:10 executing program 1: 17:02:10 executing program 7: 17:02:10 executing program 5: 17:02:10 executing program 2: 17:02:10 executing program 0: 17:02:10 executing program 6: 17:02:10 executing program 3: 17:02:10 executing program 1: 17:02:10 executing program 4: 17:02:10 executing program 5: 17:02:10 executing program 7: 17:02:10 executing program 0: 17:02:10 executing program 6: 17:02:10 executing program 3: 17:02:10 executing program 2: 17:02:10 executing program 4: 17:02:10 executing program 5: 17:02:10 executing program 1: 17:02:10 executing program 7: 17:02:10 executing program 3: 17:02:10 executing program 0: 17:02:11 executing program 6: 17:02:11 executing program 2: 17:02:11 executing program 4: 17:02:11 executing program 1: 17:02:11 executing program 5: 17:02:11 executing program 7: 17:02:11 executing program 6: 17:02:11 executing program 2: 17:02:11 executing program 3: 17:02:11 executing program 0: 17:02:11 executing program 4: 17:02:11 executing program 1: 17:02:11 executing program 7: 17:02:11 executing program 5: 17:02:11 executing program 6: 17:02:11 executing program 3: 17:02:11 executing program 2: 17:02:11 executing program 0: 17:02:11 executing program 1: 17:02:11 executing program 7: 17:02:11 executing program 4: 17:02:11 executing program 5: 17:02:11 executing program 6: 17:02:11 executing program 3: 17:02:11 executing program 0: 17:02:11 executing program 7: 17:02:11 executing program 2: 17:02:11 executing program 4: 17:02:11 executing program 1: 17:02:11 executing program 5: 17:02:11 executing program 6: 17:02:11 executing program 3: 17:02:11 executing program 0: 17:02:11 executing program 2: 17:02:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) inotify_init1(0x0) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/21) 17:02:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xfffffffffffffdde) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 17:02:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 17:02:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) accept4$unix(0xffffffffffffff9c, &(0x7f00000000c0), &(0x7f0000000000)=0x6e, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000180)=""/159) 17:02:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5017c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000200)='bic\x00', 0x4) 17:02:12 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) keyctl$assume_authority(0x10, 0x0) 17:02:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x80000000006, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'yam0\x00'}) 17:02:12 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={"76630600000000000000ffff00", {0x2, 0x0, @multicast2=0xe0000002}}) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000100)={'gre0\x00', {0x2, 0x0, @broadcast=0xffffffff}}) 17:02:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5017c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:12 executing program 3: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f0000000380)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000003a00050300140000000000000a000000"], 0x1}, 0x1}, 0x0) recvfrom(r0, &(0x7f0000000000)=""/48, 0x30, 0x0, &(0x7f00000003c0)=@ax25={0x3, {"36c946ab0c07fa"}}, 0x709000) 17:02:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x80000000006, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000a}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00') 17:02:12 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$EVIOCGMASK(0xffffffffffffffff, 0x80104592, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)}) 17:02:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5017c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x80000000006, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008a}]}) socket$key(0xf, 0x3, 0x2) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/156, &(0x7f0000000080)=0x9c) 17:02:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5017c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x80000000006, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5000b}]}) pipe2(&(0x7f0000000000), 0x0) mincore(&(0x7f0000ffc000/0x2000)=nil, 0x2000, &(0x7f00000000c0)=""/192) 17:02:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5017c}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x80000000006, 0x0, 0x0, 0x501f9}]}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x80000000006, 0x0, 0x0, 0x501f9}]}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5017c}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5017c}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x80000000006, 0x0, 0x0, 0x501f9}]}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:14 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:14 executing program 0: setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:14 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:14 executing program 0: setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:14 executing program 7: socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:14 executing program 6: prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:14 executing program 0: setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:14 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:15 executing program 6: prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:15 executing program 1: setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:15 executing program 7: socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5017c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x80000000006, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:15 executing program 6: prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:15 executing program 1: setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x80000000006, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5017c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:15 executing program 7: socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:15 executing program 4: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:15 executing program 1: setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:15 executing program 2: prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x80000000006, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5017c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:15 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:15 executing program 4: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:15 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:15 executing program 2: prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x800050206}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:16 executing program 4: getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:16 executing program 3: accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:16 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:16 executing program 2: prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:16 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:16 executing program 3: accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:16 executing program 3: accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5017c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:16 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5017c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050206}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5017c}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050206}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x80000000006}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) [ 1015.519555] audit: type=1326 audit(1529686937.518:1898): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26324 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x800050206}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) [ 1015.658729] audit: type=1326 audit(1529686937.649:1899): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26337 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f9}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) [ 1015.965669] audit: type=1326 audit(1529686937.964:1900): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26361 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x80000000006}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) [ 1016.446479] audit: type=1326 audit(1529686938.445:1901): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26379 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1016.510989] audit: type=1326 audit(1529686938.483:1902): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26388 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) [ 1016.689308] audit: type=1326 audit(1529686938.687:1903): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26403 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501fc}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) [ 1016.968637] audit: type=1326 audit(1529686938.967:1904): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26418 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1016.999753] audit: type=1326 audit(1529686938.988:1905): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26421 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1017.019655] audit: type=1326 audit(1529686938.990:1906): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26416 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1017.039434] audit: type=1326 audit(1529686938.997:1907): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26426 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x80000000006}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0xc) 17:02:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 17:02:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000080)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 17:02:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000200), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) 17:02:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$SG_SCSI_RESET(0xffffffffffffffff, 0x2284, 0x0) 17:02:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000240), &(0x7f0000000280)=0x4) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x0) 17:02:20 executing program 0: ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) 17:02:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@multicast1=0xe0000001}}, {{@in6=@loopback={0x0, 0x1}}, 0x0, @in6=@mcast1={0xff, 0x1, [], 0x1}}}, 0xe8) 17:02:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) getrandom(&(0x7f0000000000)=""/113, 0x71, 0x0) 17:02:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) sigaltstack(&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140)) 17:02:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5000b}]}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50204}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x6}}, 0x14}, 0x1}, 0x0) 17:02:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5000b}]}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) 17:02:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000040)='bpq0\x00') 17:02:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5000b}]}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4$unix(0xffffffffffffff9c, &(0x7f0000003840), &(0x7f00000038c0)=0x6e, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}}, 0x5c) 17:02:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xfffffffffffffdde) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000000)) 17:02:21 executing program 1: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) move_pages(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0), 0x0) 17:02:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5000b}]}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:21 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000001380)='/proc/self/net/pfkey\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f00000013c0), 0x4) 17:02:21 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5000b}]}) sched_yield() 17:02:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) seccomp(0x0, 0x0, &(0x7f0000000300)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000040)='rose0\x00') 17:02:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:22 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:22 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5000b}]}) sched_yield() 17:02:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a}, &(0x7f0000000380), 0x0, 0xfffffffffffffffb) 17:02:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000200)=""/120}, 0x18) 17:02:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5000b}]}) sched_yield() 17:02:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) getdents64(0xffffffffffffffff, &(0x7f00000001c0)=""/4096, 0x1000) 17:02:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:22 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) 17:02:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:22 executing program 6: pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:22 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:23 executing program 6: pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:23 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:23 executing program 6: pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:23 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:23 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5000b}]}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:23 executing program 0: truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:23 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:23 executing program 2: pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:23 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5000b}]}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:23 executing program 0: truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:23 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:23 executing program 2: pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x5000b}]}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:24 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:24 executing program 0: truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:24 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:24 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:24 executing program 2: pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:24 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioprio_get$uid(0x0, 0x0) 17:02:24 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:24 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:24 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:24 executing program 3: accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:24 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:24 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioprio_get$uid(0x0, 0x0) 17:02:24 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:24 executing program 3: accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:24 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:24 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioprio_get$uid(0x0, 0x0) 17:02:24 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:24 executing program 3: accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5000b}]}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:25 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:25 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:25 executing program 7: socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:25 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:25 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5000b}]}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:25 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:25 executing program 4: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:25 executing program 7: socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:25 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x5000b}]}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:25 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:25 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:25 executing program 7: socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) [ 1023.853715] kauditd_printk_skb: 14 callbacks suppressed [ 1023.853736] audit: type=1326 audit(1529686945.852:1922): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26904 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) [ 1023.981897] audit: type=1326 audit(1529686945.923:1923): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26917 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:26 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:26 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:26 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:26 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:26 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) [ 1024.778769] audit: type=1326 audit(1529686946.777:1924): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26973 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:26 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:26 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:26 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) [ 1024.922670] audit: type=1326 audit(1529686946.921:1925): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26981 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1024.986002] audit: type=1326 audit(1529686946.947:1926): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26978 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:27 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) [ 1025.056491] audit: type=1326 audit(1529686947.005:1927): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26992 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:27 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:27 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "0cf2c2c9b84763187fe3f2b8e0ba6c1c96f3aaeed4a10f9634213b0191c523c31442e809b902fd4fb884ece586cc4d1818de7e1f51617fb6b2ddb80d29325511", "e79bf6b2e43403588b9bda5110c32dff4845479bdd77ebc6e258cce052cd510a8bb6d182a7681893cb24177610e0a648f71180ad69f9d35a32d2dcc8f547e15d", "84535a77545b6a41eede5979f3cc993b188ad4564be2aa5ce374e096a3551c5d"}) 17:02:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:27 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) [ 1025.703678] audit: type=1326 audit(1529686947.702:1928): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27019 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1025.740609] audit: type=1326 audit(1529686947.738:1929): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27025 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) sched_yield() 17:02:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:27 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) [ 1025.921409] audit: type=1326 audit(1529686947.920:1930): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27033 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:28 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) [ 1025.989030] audit: type=1326 audit(1529686947.967:1931): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27037 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:28 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:28 executing program 6: 17:02:28 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) truncate(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80) 17:02:28 executing program 6: 17:02:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:29 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:29 executing program 6: 17:02:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:29 executing program 6: 17:02:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 17:02:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:29 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:29 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:30 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) accept4(0xffffffffffffffff, &(0x7f0000000540)=@ax25, &(0x7f00000005c0)=0x80, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) 17:02:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:30 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000080)=""/46) 17:02:30 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:30 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:30 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:30 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:30 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:30 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:30 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:30 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:30 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:31 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioprio_get$uid(0x0, 0x0) 17:02:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:31 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:31 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_fuse_mount(&(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1029.245101] kauditd_printk_skb: 13 callbacks suppressed [ 1029.245124] audit: type=1326 audit(1529686951.243:1945): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27242 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:31 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:31 executing program 6: socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:02:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:02:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:32 executing program 6: socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:32 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:32 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:32 executing program 6: socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:32 executing program 0: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:32 executing program 2: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 17:02:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) fchdir(0xffffffffffffffff) 17:02:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:32 executing program 2: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:32 executing program 0: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:32 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) fchdir(0xffffffffffffffff) 17:02:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:32 executing program 2: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:32 executing program 0: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) fchdir(0xffffffffffffffff) 17:02:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:33 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:33 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:33 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) [ 1031.232521] audit: type=1326 audit(1529686953.231:1946): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27385 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:33 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:33 executing program 1: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:33 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:33 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:33 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:33 executing program 1: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:33 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:33 executing program 1: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:33 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:34 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:34 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) [ 1032.219392] audit: type=1326 audit(1529686954.218:1947): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27462 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:34 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:34 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:34 executing program 7: mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:34 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000000c0)={{0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @multicast2=0xe0000002}, 'bpq0\x00'}) 17:02:35 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:35 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:35 executing program 7: mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:35 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) [ 1033.133763] audit: type=1326 audit(1529686955.132:1948): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27502 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:35 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:35 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:35 executing program 7: mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:35 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:35 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:36 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:36 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:36 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:36 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) [ 1034.268894] audit: type=1326 audit(1529686956.267:1949): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27577 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) [ 1034.388684] audit: type=1326 audit(1529686956.306:1950): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27581 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1034.408629] audit: type=1326 audit(1529686956.340:1951): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27589 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:36 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) 17:02:37 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) [ 1035.189901] audit: type=1326 audit(1529686957.188:1952): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27632 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) [ 1035.286165] audit: type=1326 audit(1529686957.284:1953): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27643 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) [ 1035.429486] audit: type=1326 audit(1529686957.428:1954): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27650 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1035.525915] audit: type=1326 audit(1529686957.510:1955): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27657 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setns(0xffffffffffffffff, 0x0) 17:02:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000140), 0x0, 0x0) [ 1036.120716] audit: type=1326 audit(1529686958.119:1956): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27680 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:38 executing program 2: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000300)=@get={0x1, &(0x7f0000000240)=""/178}) 17:02:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setns(0xffffffffffffffff, 0x0) 17:02:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) [ 1036.227014] audit: type=1326 audit(1529686958.221:1957): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27687 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, &(0x7f0000000240)=""/185) 17:02:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setns(0xffffffffffffffff, 0x0) [ 1036.311569] audit: type=1326 audit(1529686958.280:1958): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27693 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:38 executing program 5: msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:38 executing program 5: msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:39 executing program 5: msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:39 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:39 executing program 2: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0x4) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000002c0)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in6}}, {{}, 0x0, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, 0xe8) 17:02:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:39 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000480), 0x0) 17:02:39 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) fchdir(0xffffffffffffffff) 17:02:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:39 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:39 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'cgroup(trusted^%vmnet1+\\$\x00'}, &(0x7f00000001c0), 0x0) 17:02:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:40 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:40 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:40 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) mremap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 17:02:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) tkill(0x0, 0x0) 17:02:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) 17:02:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:41 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:41 executing program 3: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000180)={'vcan0\x00', {0x2, 0x0, @multicast2=0xe0000002}}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'veth1_to_team\x00', {0x2}}) 17:02:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)) fcntl$getown(0xffffffffffffffff, 0x9) 17:02:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:41 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:41 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:41 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:42 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:42 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) [ 1040.183965] kauditd_printk_skb: 12 callbacks suppressed [ 1040.183986] audit: type=1326 audit(1529686962.182:1971): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27921 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:42 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:42 executing program 6: openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) setns(0xffffffffffffffff, 0x0) 17:02:43 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:43 executing program 2: msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) listen(0xffffffffffffffff, 0x0) 17:02:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) [ 1041.159729] audit: type=1326 audit(1529686963.158:1972): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27971 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:43 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:43 executing program 2: msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) listen(0xffffffffffffffff, 0x0) 17:02:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:44 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:44 executing program 2: msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) listen(0xffffffffffffffff, 0x0) 17:02:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:44 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:44 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:44 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:44 executing program 7: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:44 executing program 3: socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:44 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:44 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:44 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:44 executing program 7: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:44 executing program 3: socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:44 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:44 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:44 executing program 7: socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:44 executing program 1: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:44 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:45 executing program 3: socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:45 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:45 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:45 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:45 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:45 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:45 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:45 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:45 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:45 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) [ 1043.456696] audit: type=1326 audit(1529686965.455:1973): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28133 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:45 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:45 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:45 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:45 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:45 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) [ 1043.919809] audit: type=1326 audit(1529686965.918:1974): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28175 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:46 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) [ 1044.372009] audit: type=1326 audit(1529686966.370:1975): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28190 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:46 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:46 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) [ 1044.844243] audit: type=1326 audit(1529686966.842:1976): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28234 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1044.877260] audit: type=1326 audit(1529686966.873:1977): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28238 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000000)) 17:02:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:47 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) [ 1045.330631] audit: type=1326 audit(1529686967.328:1978): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28244 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:47 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:47 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000980)='/dev/urandom\x00', 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:02:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) [ 1045.904982] audit: type=1326 audit(1529686967.903:1979): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28294 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) [ 1046.268259] audit: type=1326 audit(1529686968.266:1980): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28303 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1046.312135] audit: type=1326 audit(1529686968.304:1981): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28299 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) [ 1046.461665] audit: type=1326 audit(1529686968.460:1982): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28321 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) [ 1046.551157] audit: type=1326 audit(1529686968.495:1983): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28324 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 17:02:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1047.217639] audit: type=1326 audit(1529686969.216:1984): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28363 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1047.263592] audit: type=1326 audit(1529686969.238:1985): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28366 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1047.283577] audit: type=1326 audit(1529686969.253:1986): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28369 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) dup(0xffffffffffffffff) 17:02:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) [ 1047.491742] audit: type=1326 audit(1529686969.490:1987): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28377 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) dup(0xffffffffffffffff) 17:02:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) dup(0xffffffffffffffff) 17:02:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000600)=""/205, &(0x7f0000000700)=0xcd) 17:02:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:50 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fb}]}) seccomp(0x0, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000004fe8)}) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}}) 17:02:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:50 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) listen(0xffffffffffffffff, 0x0) 17:02:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000040)) 17:02:50 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:50 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:50 executing program 6: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:02:51 executing program 6: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:51 executing program 6: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:51 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0, 0x72, &(0x7f0000000080), &(0x7f00000001c0)=""/114}, 0x28) 17:02:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:52 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:52 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:02:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:53 executing program 2: msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) [ 1051.396153] kauditd_printk_skb: 9 callbacks suppressed [ 1051.396176] audit: type=1326 audit(1529686973.394:1997): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28591 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:02:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:53 executing program 2: msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:02:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:54 executing program 2: msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:54 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:54 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:02:54 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) [ 1052.353455] audit: type=1326 audit(1529686974.352:1998): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28659 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:54 executing program 7: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:54 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:54 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:02:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:54 executing program 4: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:54 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) dup(0xffffffffffffffff) 17:02:55 executing program 7: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:02:55 executing program 3: accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:55 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) [ 1053.313944] audit: type=1326 audit(1529686975.312:1999): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28705 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:55 executing program 7: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) [ 1053.356962] audit: type=1326 audit(1529686975.337:2000): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28697 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:55 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:55 executing program 3: accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:02:55 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:56 executing program 4: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:56 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:56 executing program 3: accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:56 executing program 5: nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:02:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) 17:02:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) [ 1054.275007] audit: type=1326 audit(1529686976.273:2001): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28746 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:56 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:56 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:02:56 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:56 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:57 executing program 5: nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:02:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:02:57 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='tunl0\x00'}) [ 1055.230968] audit: type=1326 audit(1529686977.229:2002): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28813 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:57 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50208}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:57 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50208}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:58 executing program 5: nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:02:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:02:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:58 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50208}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) [ 1056.168656] audit: type=1326 audit(1529686978.167:2003): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28857 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:58 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:58 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getpid() 17:02:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) [ 1056.343358] audit: type=1326 audit(1529686978.340:2004): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28875 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:02:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) [ 1056.427777] audit: type=1326 audit(1529686978.390:2005): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28873 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:02:58 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) [ 1056.516437] audit: type=1326 audit(1529686978.480:2006): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28886 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:02:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:02:59 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:02:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:02:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) [ 1057.192641] audit: type=1326 audit(1529686979.191:2007): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28912 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:59 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:02:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:02:59 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:02:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:02:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) [ 1057.316960] audit: type=1326 audit(1529686979.315:2008): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28922 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1057.402715] audit: type=1326 audit(1529686979.401:2009): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28926 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) [ 1057.459854] audit: type=1326 audit(1529686979.440:2010): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28931 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:59 executing program 0: msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) [ 1057.492794] audit: type=1326 audit(1529686979.486:2011): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28936 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:02:59 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:02:59 executing program 0: msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:02:59 executing program 0: msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:03:00 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:03:00 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) keyctl$link(0x8, 0x0, 0x0) 17:03:00 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:03:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}, 0x1}, 0x0) 17:03:00 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) [ 1058.136263] audit: type=1326 audit(1529686980.134:2012): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28956 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:00 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) keyctl$link(0x8, 0x0, 0x0) 17:03:00 executing program 4: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, &(0x7f0000000100)) 17:03:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000480)={0x1000, ""/4096}) 17:03:00 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) [ 1058.299471] audit: type=1326 audit(1529686980.298:2013): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28973 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:03:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:03:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 17:03:00 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) keyctl$link(0x8, 0x0, 0x0) [ 1058.434681] audit: type=1326 audit(1529686980.433:2014): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28981 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:03:00 executing program 6: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:03:01 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:03:01 executing program 6: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:03:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:03:01 executing program 6: ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:01 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffff9c, 0x0, &(0x7f00000008c0), 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000900)={0x0, {{0x2, 0x0, @loopback=0x7f000001}}}, 0x88) 17:03:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:03:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:01 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:03:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:02 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:03:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:02 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:02 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 17:03:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:03:02 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:03:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:03 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:03 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:03 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) msgget(0xffffffffffffffff, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x0, 0x0, 0x0) 17:03:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) [ 1061.614905] kauditd_printk_skb: 5 callbacks suppressed [ 1061.614930] audit: type=1326 audit(1529686983.613:2020): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29168 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:03 executing program 2: memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:04 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) [ 1062.032172] audit: type=1326 audit(1529686984.030:2021): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29181 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:04 executing program 2: memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:04 executing program 1: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:04 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:04 executing program 7: socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:04 executing program 2: memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:04 executing program 1: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:04 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:04 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:04 executing program 1: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:04 executing program 7: socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-generic\x00'}, 0x58) r1 = accept(r0, 0x0, &(0x7f0000000300)=0xfffffffffffffe98) write$binfmt_misc(r1, &(0x7f0000000000)={'syz1'}, 0x4) write$binfmt_elf32(r1, &(0x7f0000000440)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) 17:03:04 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:03:04 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:04 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:04 executing program 7: socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) [ 1062.971426] audit: type=1326 audit(1529686984.970:2022): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29244 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:05 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:05 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:05 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:05 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000040)) keyctl$link(0x8, 0x0, 0x0) 17:03:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:03:05 executing program 3: socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:05 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:05 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) [ 1063.902541] audit: type=1326 audit(1529686985.901:2023): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29298 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:06 executing program 3: socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:06 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:06 executing program 3: socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:03:06 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50203}]}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:03:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 17:03:07 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1065.934372] audit: type=1326 audit(1529686987.933:2024): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29426 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 1066.001897] audit: type=1326 audit(1529686987.963:2025): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29438 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1066.021784] audit: type=1326 audit(1529686987.964:2026): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29435 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:08 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) [ 1066.340450] audit: type=1326 audit(1529686988.339:2027): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29467 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:03:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) [ 1066.929689] audit: type=1326 audit(1529686988.928:2028): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29484 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1066.986152] audit: type=1326 audit(1529686988.950:2029): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29480 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1067.006138] audit: type=1326 audit(1529686988.955:2030): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29488 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:09 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 1067.025912] audit: type=1326 audit(1529686988.977:2031): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29489 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:09 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50203}]}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) [ 1067.372826] audit: type=1326 audit(1529686989.371:2032): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29521 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:09 executing program 6: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}) nanosleep(&(0x7f00000000c0)={0x77359400}, &(0x7f0000000080)) modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) 17:03:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 17:03:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) memfd_create(&(0x7f0000000000)='cpuset\x00', 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) [ 1067.891425] audit: type=1326 audit(1529686989.890:2033): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29532 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1067.972347] audit: type=1326 audit(1529686989.921:2034): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29531 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1067.992230] audit: type=1326 audit(1529686989.951:2035): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29541 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:10 executing program 6: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 1068.012010] audit: type=1326 audit(1529686989.969:2036): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29543 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:10 executing program 6: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 1068.079419] audit: type=1326 audit(1529686990.042:2037): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29546 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000080)) 17:03:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:10 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:10 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x41, &(0x7f0000000240)={'filter\x00'}, &(0x7f0000000040)=0x24) 17:03:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$key(0xf, 0x3, 0x2) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)}, &(0x7f0000000200)) 17:03:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:12 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001640)=@raw, &(0x7f0000000080)='GPL\x00', 0x0, 0x86, &(0x7f0000001580)=""/134}, 0x48) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 17:03:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:12 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020b}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:12 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:12 executing program 1: socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:13 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:13 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:13 executing program 1: socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:13 executing program 5: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:13 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:13 executing program 4: ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 17:03:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:13 executing program 1: socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:13 executing program 4: ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:13 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:13 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) [ 1071.936577] kauditd_printk_skb: 8 callbacks suppressed [ 1071.936598] audit: type=1326 audit(1529686993.935:2046): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29779 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:14 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:14 executing program 4: ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:14 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:14 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:14 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:14 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:14 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:14 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:14 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}, {0xa}}, 0x5c) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 1072.886809] audit: type=1326 audit(1529686994.885:2047): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29841 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:14 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:15 executing program 7: nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:15 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:15 executing program 3: pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:16 executing program 7: nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:16 executing program 3: pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:16 executing program 3: pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:16 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:16 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:16 executing program 7: nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:16 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:16 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) [ 1075.047975] audit: type=1326 audit(1529686997.046:2048): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=29981 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) [ 1075.285978] audit: type=1326 audit(1529686997.284:2049): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30006 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:17 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:17 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) [ 1075.974853] audit: type=1326 audit(1529686997.973:2050): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30030 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1076.002255] audit: type=1326 audit(1529686998.000:2051): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30027 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:18 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) [ 1076.066175] audit: type=1326 audit(1529686998.040:2052): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30041 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 1076.312795] audit: type=1326 audit(1529686998.311:2053): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30063 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:18 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:18 executing program 6: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000180)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) [ 1076.963340] audit: type=1326 audit(1529686998.962:2054): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30081 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) 17:03:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x50012}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 1077.056831] audit: type=1326 audit(1529686998.999:2055): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30084 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:19 executing program 6: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) [ 1077.159817] audit: type=1326 audit(1529686999.098:2056): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30097 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) connect$netlink(0xffffffffffffffff, &(0x7f0000000040)=@kern={0x10}, 0xc) 17:03:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:19 executing program 6: dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) [ 1077.245159] audit: type=1326 audit(1529686999.243:2057): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30107 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:19 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) [ 1077.345557] audit: type=1326 audit(1529686999.344:2058): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30114 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008d}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) 17:03:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6}]}) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000180)={'bridge_slave_0\x00'}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000940)) 17:03:19 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:19 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) [ 1077.983498] audit: type=1326 audit(1529686999.982:2059): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30133 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) [ 1078.033419] audit: type=1326 audit(1529687000.011:2060): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30139 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1078.053319] audit: type=1326 audit(1529687000.012:2061): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30135 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) [ 1078.283995] audit: type=1326 audit(1529687000.282:2062): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30159 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) [ 1079.032812] audit: type=1326 audit(1529687001.031:2063): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30198 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f00000000c0)={0x0, 0x0, 'client1\x00', 0x0, "9a3c8a92ec8e4197", "3d6ee5d438701371c1e7735c7f7978905be6e81927d8a95ce4e7b34408a99cd6"}) 17:03:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) 17:03:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:22 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) chdir(&(0x7f0000000040)='./file1\x00') 17:03:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:22 executing program 2: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:22 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:22 executing program 2: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) chdir(&(0x7f0000000040)='./file1\x00') 17:03:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:22 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) chdir(&(0x7f0000000040)='./file1\x00') 17:03:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:22 executing program 2: ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:22 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:22 executing program 1: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000180)=""/122) 17:03:23 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:23 executing program 1: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:23 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:23 executing program 4: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:23 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:23 executing program 4: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:23 executing program 1: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:23 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:23 executing program 4: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:23 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:23 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:03:24 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:24 executing program 6: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x4000000031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000080)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000540)={0x0, {{0x2, 0x0, @rand_addr}}}, 0x88) 17:03:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:24 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) syz_open_dev$admmidi(&(0x7f0000000580)='/dev/admmidi#\x00', 0x0, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000340)) 17:03:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:03:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:03:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:03:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5000e}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:03:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:03:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:03:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:03:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) [ 1084.043293] kauditd_printk_skb: 5 callbacks suppressed [ 1084.043318] audit: type=1326 audit(1529687006.042:2069): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30484 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1084.180261] audit: type=1326 audit(1529687006.122:2070): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30483 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:03:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:03:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) [ 1084.745789] audit: type=1326 audit(1529687006.744:2071): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30512 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:03:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) [ 1084.834987] audit: type=1326 audit(1529687006.778:2072): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30515 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) 17:03:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:27 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:03:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:27 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) [ 1085.147781] audit: type=1326 audit(1529687007.146:2073): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30537 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:27 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:27 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) [ 1085.455461] device bridge_slave_1 left promiscuous mode [ 1085.461532] bridge0: port 2(bridge_slave_1) entered disabled state [ 1085.512931] device bridge_slave_0 left promiscuous mode [ 1085.518758] bridge0: port 1(bridge_slave_0) entered disabled state [ 1085.572689] team0 (unregistering): Port device team_slave_1 removed [ 1085.585506] team0 (unregistering): Port device team_slave_0 removed [ 1085.595308] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1085.610912] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1085.641701] bond0 (unregistering): Released all slaves 17:03:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:27 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:27 executing program 6: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:03:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)=""/48) 17:03:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) 17:03:27 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:03:27 executing program 6: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) [ 1085.745321] audit: type=1326 audit(1529687007.743:2074): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30557 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1085.807249] audit: type=1326 audit(1529687007.798:2075): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30561 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:27 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:28 executing program 6: mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:03:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)=@nl=@kern={0x10}, 0x80) [ 1086.170340] audit: type=1326 audit(1529687008.168:2076): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30576 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:28 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:03:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:28 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:03:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) [ 1086.543782] IPVS: ftp: loaded support on port[0] = 21 [ 1086.553614] IPVS: ftp: loaded support on port[0] = 21 17:03:28 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:03:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000000)={0x0, @empty, 0x0, 0x0, 'lblc\x00'}, 0x2c) [ 1086.839949] IPVS: ftp: loaded support on port[0] = 21 [ 1087.993686] device bridge_slave_1 left promiscuous mode [ 1087.999559] bridge0: port 2(bridge_slave_1) entered disabled state [ 1088.021957] device bridge_slave_0 left promiscuous mode [ 1088.027662] bridge0: port 1(bridge_slave_0) entered disabled state [ 1088.049675] device bridge_slave_1 left promiscuous mode [ 1088.055327] bridge0: port 2(bridge_slave_1) entered disabled state [ 1088.076921] device bridge_slave_0 left promiscuous mode [ 1088.082582] bridge0: port 1(bridge_slave_0) entered disabled state [ 1088.094530] device bridge_slave_1 left promiscuous mode [ 1088.100240] bridge0: port 2(bridge_slave_1) entered disabled state [ 1088.112937] device bridge_slave_0 left promiscuous mode [ 1088.118566] bridge0: port 1(bridge_slave_0) entered disabled state [ 1088.143607] device bridge_slave_1 left promiscuous mode [ 1088.149281] bridge0: port 2(bridge_slave_1) entered disabled state [ 1088.169848] device bridge_slave_0 left promiscuous mode [ 1088.175469] bridge0: port 1(bridge_slave_0) entered disabled state [ 1088.187516] device bridge_slave_1 left promiscuous mode [ 1088.193189] bridge0: port 2(bridge_slave_1) entered disabled state [ 1088.204840] device bridge_slave_0 left promiscuous mode [ 1088.210502] bridge0: port 1(bridge_slave_0) entered disabled state [ 1088.331276] team0 (unregistering): Port device team_slave_1 removed [ 1088.342390] team0 (unregistering): Port device team_slave_0 removed [ 1088.353349] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1088.368981] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1088.399565] bond0 (unregistering): Released all slaves [ 1088.418963] team0 (unregistering): Port device team_slave_1 removed [ 1088.430343] team0 (unregistering): Port device team_slave_0 removed [ 1088.441166] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1088.465840] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1088.515851] bond0 (unregistering): Released all slaves [ 1088.545892] team0 (unregistering): Port device team_slave_1 removed [ 1088.567145] team0 (unregistering): Port device team_slave_0 removed [ 1088.585521] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1088.600693] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1088.625524] bond0 (unregistering): Released all slaves [ 1088.645037] team0 (unregistering): Port device team_slave_1 removed [ 1088.654775] team0 (unregistering): Port device team_slave_0 removed [ 1088.664290] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1088.680666] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1088.702641] bond0 (unregistering): Released all slaves [ 1088.720603] team0 (unregistering): Port device team_slave_1 removed [ 1088.729821] team0 (unregistering): Port device team_slave_0 removed [ 1088.739223] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1088.755615] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1088.779466] bond0 (unregistering): Released all slaves [ 1089.202334] bridge0: port 1(bridge_slave_0) entered blocking state [ 1089.208929] bridge0: port 1(bridge_slave_0) entered disabled state [ 1089.229009] device bridge_slave_0 entered promiscuous mode [ 1089.340569] bridge0: port 2(bridge_slave_1) entered blocking state [ 1089.347039] bridge0: port 2(bridge_slave_1) entered disabled state [ 1089.355495] device bridge_slave_1 entered promiscuous mode [ 1089.373717] IPVS: ftp: loaded support on port[0] = 21 [ 1089.450818] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1089.557254] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1089.867209] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1089.948348] IPVS: ftp: loaded support on port[0] = 21 [ 1089.998123] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1090.128031] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1090.135153] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1090.242100] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1090.249178] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1090.577578] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1090.588148] team0: Port device team_slave_0 added [ 1090.679433] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1090.686973] team0: Port device team_slave_1 added [ 1090.750496] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1090.831626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1090.868285] bridge0: port 1(bridge_slave_0) entered blocking state [ 1090.874773] bridge0: port 1(bridge_slave_0) entered disabled state [ 1090.882695] device bridge_slave_0 entered promiscuous mode [ 1090.903154] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1090.910513] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1090.923250] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1090.981618] bridge0: port 2(bridge_slave_1) entered blocking state [ 1090.988125] bridge0: port 2(bridge_slave_1) entered disabled state [ 1090.996207] device bridge_slave_1 entered promiscuous mode [ 1091.007714] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1091.015119] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1091.025947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1091.079918] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1091.133240] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1091.336881] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1091.410423] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1091.498479] bridge0: port 1(bridge_slave_0) entered blocking state [ 1091.504989] bridge0: port 1(bridge_slave_0) entered disabled state [ 1091.513107] device bridge_slave_0 entered promiscuous mode [ 1091.594542] bridge0: port 2(bridge_slave_1) entered blocking state [ 1091.601107] bridge0: port 2(bridge_slave_1) entered disabled state [ 1091.616555] device bridge_slave_1 entered promiscuous mode [ 1091.737710] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1091.750300] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1091.757854] team0: Port device team_slave_0 added [ 1091.816725] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1091.825129] team0: Port device team_slave_1 added [ 1091.844421] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1091.867153] bridge0: port 2(bridge_slave_1) entered blocking state [ 1091.873596] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1091.880376] bridge0: port 1(bridge_slave_0) entered blocking state [ 1091.886804] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1091.895315] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1091.928963] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1091.935939] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1091.949259] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1092.009246] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1092.016681] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1092.032300] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1092.069541] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1092.076921] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1092.085946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1092.147120] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1092.172947] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1092.181923] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1092.199386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1092.216185] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1092.587601] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1092.602429] team0: Port device team_slave_0 added [ 1092.665824] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1092.674393] team0: Port device team_slave_1 added [ 1092.727332] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1092.804849] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1092.840431] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1092.879321] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1092.886749] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1092.895794] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1092.959747] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1092.967378] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1092.980032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1093.056166] bridge0: port 2(bridge_slave_1) entered blocking state [ 1093.062621] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1093.069464] bridge0: port 1(bridge_slave_0) entered blocking state [ 1093.075893] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1093.083719] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1093.855219] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1093.916628] bridge0: port 2(bridge_slave_1) entered blocking state [ 1093.923120] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1093.929927] bridge0: port 1(bridge_slave_0) entered blocking state [ 1093.936366] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1093.948139] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1094.879225] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1095.132544] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1095.411195] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1095.714736] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1095.721132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1095.729386] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1096.070235] 8021q: adding VLAN 0 to HW filter on device team0 [ 1096.227489] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1096.519677] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1096.888425] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1096.894814] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1096.916858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1097.052330] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1097.196142] 8021q: adding VLAN 0 to HW filter on device team0 [ 1097.292698] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1097.642881] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1097.649244] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1097.666930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1097.860928] audit: type=1326 audit(1529687019.859:2077): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=31290 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1097.961698] 8021q: adding VLAN 0 to HW filter on device team0 [ 1099.046134] audit: type=1326 audit(1529687021.044:2078): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=31379 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) chdir(&(0x7f0000000040)='./file1\x00') 17:03:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x6}]}) nanosleep(&(0x7f00000011c0)={0x77359400}, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000001200), &(0x7f0000001240), &(0x7f0000001280), &(0x7f0000001300)={&(0x7f00000012c0), 0x8}) 17:03:41 executing program 2: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x78) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000180)=0x78) 17:03:41 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:03:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000100), 0x0) 17:03:41 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:03:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:03:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ptrace$getregs(0x0, 0x0, 0x0, &(0x7f0000000040)=""/48) [ 1100.008715] audit: type=1326 audit(1529687022.007:2079): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=31390 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) [ 1100.079800] audit: type=1326 audit(1529687022.045:2080): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=31395 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 17:03:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x78) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000180)=0x78) 17:03:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) 17:03:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:03:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x78) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000180)=0x78) 17:03:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) 17:03:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:03:42 executing program 2: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x78) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000180)=0x78) [ 1100.613310] syz-executor5: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1100.613627] syz-executor2: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1100.624794] syz-executor5 cpuset=syz5 mems_allowed=0 [ 1100.624847] CPU: 0 PID: 31416 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 1100.624861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.624874] Call Trace: [ 1100.624937] dump_stack+0x185/0x1d0 [ 1100.636216] syz-executor2 cpuset= [ 1100.641311] warn_alloc+0x430/0x690 [ 1100.641383] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1100.648197] syz2 [ 1100.657603] ? __msan_poison_alloca+0x15c/0x1d0 [ 1100.660165] mems_allowed=0 [ 1100.663818] copy_process+0x778/0x9be0 [ 1100.689112] ? __msan_poison_alloca+0x15c/0x1d0 [ 1100.693798] ? handle_mm_fault+0x74eb/0x7ed0 [ 1100.698226] ? handle_mm_fault+0x74eb/0x7ed0 [ 1100.702655] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1100.708068] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 1100.714071] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1100.718492] ? __msan_poison_alloca+0x140/0x1d0 [ 1100.723192] _do_fork+0x353/0xf60 [ 1100.726672] __x64_sys_clone+0x15e/0x1b0 [ 1100.730745] ? __ia32_sys_vfork+0x70/0x70 [ 1100.734901] do_syscall_64+0x15b/0x230 [ 1100.738806] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1100.744019] RIP: 0033:0x458429 [ 1100.747217] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1100.754969] RAX: ffffffffffffffda RBX: 00007fdda37a9700 RCX: 0000000000458429 [ 1100.762251] RDX: 00007fdda37a99d0 RSI: 00007fdda37a8db0 RDI: 00000000003d0f00 [ 1100.769537] RBP: 0000000000a3e8a0 R08: 00007fdda37a9700 R09: 00007fdda37a9700 [ 1100.776808] R10: 00007fdda37a99d0 R11: 0000000000000202 R12: 0000000000000000 [ 1100.784085] R13: 0000000000a3e81f R14: 00007fdda37a99c0 R15: 0000000000000000 [ 1100.791389] CPU: 1 PID: 31419 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 1100.791891] Mem-Info: [ 1100.798248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.798260] Call Trace: [ 1100.798305] dump_stack+0x185/0x1d0 [ 1100.798337] warn_alloc+0x430/0x690 [ 1100.798405] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1100.800863] active_anon:120861 inactive_anon:77 isolated_anon:0 [ 1100.800863] active_file:2371 inactive_file:5437 isolated_file:32 [ 1100.800863] unevictable:0 dirty:3 writeback:0 unstable:0 [ 1100.800863] slab_reclaimable:3292 slab_unreclaimable:8381 [ 1100.800863] mapped:68419 shmem:84 pagetables:1066 bounce:0 [ 1100.800863] free:27685 free_pcp:0 free_cma:0 [ 1100.810152] ? __msan_poison_alloca+0x15c/0x1d0 [ 1100.810233] copy_process+0x778/0x9be0 [ 1100.812860] Node 0 active_anon:483444kB inactive_anon:308kB active_file:9484kB inactive_file:21748kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:273676kB dirty:12kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 239616kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1100.816407] ? __msan_poison_alloca+0x15c/0x1d0 [ 1100.816444] ? handle_mm_fault+0x74eb/0x7ed0 [ 1100.816488] ? handle_mm_fault+0x74eb/0x7ed0 [ 1100.820120] Node 0 [ 1100.824942] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1100.824985] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 1100.825086] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1100.858164] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1100.862622] ? __msan_poison_alloca+0x140/0x1d0 [ 1100.862682] _do_fork+0x353/0xf60 [ 1100.866563] lowmem_reserve[]: [ 1100.894763] __x64_sys_clone+0x15e/0x1b0 [ 1100.894800] ? __ia32_sys_vfork+0x70/0x70 [ 1100.899469] 0 [ 1100.903848] do_syscall_64+0x15b/0x230 [ 1100.903883] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1100.903912] RIP: 0033:0x458429 [ 1100.908323] 2817 [ 1100.910522] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1100.910553] RAX: ffffffffffffffda RBX: 00007ff8bdee1700 RCX: 0000000000458429 [ 1100.910579] RDX: 00007ff8bdee19d0 RSI: 00007ff8bdee0db0 RDI: 00000000003d0f00 [ 1100.915948] 7244 [ 1100.921881] RBP: 0000000000a3e8a0 R08: 00007ff8bdee1700 R09: 00007ff8bdee1700 [ 1100.921903] R10: 00007ff8bdee19d0 R11: 0000000000000202 R12: 0000000000000000 [ 1100.921930] R13: 0000000000a3e81f R14: 00007ff8bdee19c0 R15: 0000000000000000 [ 1100.926358] 7244 [ 1101.010596] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1101.012505] Node 0 DMA32 free:50256kB min:26224kB low:32780kB high:39336kB active_anon:226336kB inactive_anon:16kB active_file:1552kB inactive_file:876kB unevictable:0kB writepending:16kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1280kB pagetables:1180kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1101.012587] lowmem_reserve[]: [ 1101.019958] syz-executor0 cpuset= [ 1101.027198] 0 0 4426 4426 [ 1101.027229] Node 0 Normal free:40284kB min:41208kB low:51508kB high:61808kB active_anon:257020kB inactive_anon:292kB active_file:6812kB inactive_file:20360kB unevictable:0kB writepending:112kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3084kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1101.027296] lowmem_reserve[]: 0 0 0 0 [ 1101.027327] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB [ 1101.034726] syz0 mems_allowed=0 [ 1101.036834] 1*1024kB [ 1101.048129] CPU: 1 PID: 31420 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 1101.048158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.076889] (U) [ 1101.079963] Call Trace: [ 1101.080008] dump_stack+0x185/0x1d0 [ 1101.080051] warn_alloc+0x430/0x690 [ 1101.083514] 1*2048kB [ 1101.086385] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1101.086449] ? __msan_poison_alloca+0x15c/0x1d0 [ 1101.115588] (M) [ 1101.119425] copy_process+0x778/0x9be0 [ 1101.119473] ? __msan_poison_alloca+0x15c/0x1d0 [ 1101.128473] 3*4096kB [ 1101.131736] ? handle_mm_fault+0x74eb/0x7ed0 [ 1101.131780] ? handle_mm_fault+0x74eb/0x7ed0 [ 1101.134178] (M) [ 1101.141006] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1101.141065] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 1101.150402] = 15904kB [ 1101.152364] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1101.152398] ? __msan_poison_alloca+0x140/0x1d0 [ 1101.154989] Node 0 [ 1101.158610] _do_fork+0x353/0xf60 [ 1101.158656] __x64_sys_clone+0x15e/0x1b0 [ 1101.162270] DMA32: [ 1101.164665] ? __ia32_sys_vfork+0x70/0x70 [ 1101.164687] do_syscall_64+0x15b/0x230 [ 1101.164731] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1101.169568] 290*4kB [ 1101.174195] RIP: 0033:0x458429 [ 1101.174210] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1101.174247] RAX: ffffffffffffffda RBX: 00007f4cefabe700 RCX: 0000000000458429 [ 1101.176226] (M) [ 1101.180079] RDX: 00007f4cefabe9d0 RSI: 00007f4cefabddb0 RDI: 00000000003d0f00 [ 1101.180098] RBP: 0000000000a3e8a0 R08: 00007f4cefabe700 R09: 00007f4cefabe700 [ 1101.180112] R10: 00007f4cefabe9d0 R11: 0000000000000202 R12: 0000000000000000 [ 1101.180137] R13: 0000000000a3e81f R14: 00007f4cefabe9c0 R15: 0000000000000000 [ 1101.184811] 2970*8kB [ 1101.226311] syz-executor4: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1101.226949] (UM) [ 1101.231102] syz-executor4 cpuset= [ 1101.233350] 577*16kB [ 1101.237507] / mems_allowed=0 [ 1101.241434] (UM) [ 1101.246664] CPU: 1 PID: 31385 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 1101.246686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.249028] 0*32kB [ 1101.252175] Call Trace: [ 1101.252222] dump_stack+0x185/0x1d0 [ 1101.252263] warn_alloc+0x430/0x690 [ 1101.259966] 0*64kB [ 1101.267250] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1101.267309] ? __msan_poison_alloca+0x15c/0x1d0 [ 1101.269263] 0*128kB [ 1101.276544] copy_process+0x778/0x9be0 [ 1101.276591] ? __msan_poison_alloca+0x15c/0x1d0 [ 1101.283854] 0*256kB [ 1101.291114] ? handle_mm_fault+0x74eb/0x7ed0 [ 1101.291159] ? handle_mm_fault+0x74eb/0x7ed0 [ 1101.298449] 0*512kB [ 1101.300848] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1101.300913] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 1101.312150] 0*1024kB [ 1101.314205] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1101.314240] ? __msan_poison_alloca+0x141/0x1d0 [ 1101.317696] 0*2048kB [ 1101.320102] _do_fork+0x353/0xf60 [ 1101.320147] __x64_sys_clone+0x15e/0x1b0 [ 1101.323169] 4*4096kB [ 1101.325216] ? __ia32_sys_vfork+0x70/0x70 [ 1101.325239] do_syscall_64+0x15b/0x230 [ 1101.325282] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1101.332110] (UH) [ 1101.341434] RIP: 0033:0x458429 [ 1101.341449] RSP: 002b:00007ffc7bc62e38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1101.341485] RAX: ffffffffffffffda RBX: 00007ffc7bc62ef0 RCX: 0000000000458429 [ 1101.343729] = 50536kB [ 1101.346272] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 1101.346290] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 1101.346304] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 1101.346328] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 1101.349963] Node 0 Normal: 1725*4kB (ME) 843*8kB (UME) 280*16kB (UME) 213*32kB (ME) 41*64kB (UM) 16*128kB (UM) 0*256kB 1*512kB (U) 0*1024kB 3*2048kB (UM) 1*4096kB (U) = 40364kB [ 1101.507635] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1101.516300] 4265 total pagecache pages [ 1101.520259] 0 pages in swap cache [ 1101.523782] Swap cache stats: add 0, delete 0, find 0/0 [ 1101.529207] Free swap = 0kB [ 1101.532285] Total swap = 0kB [ 1101.535361] 1965969 pages RAM [ 1101.538523] 0 pages HighMem/MovableOnly [ 1101.542558] 106316 pages reserved [ 1101.654668] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1101.666069] syz-executor6 cpuset=/ mems_allowed=0 [ 1101.671098] CPU: 1 PID: 31394 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1101.677977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.679383] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1101.687345] Call Trace: [ 1101.687394] dump_stack+0x185/0x1d0 [ 1101.687427] warn_alloc+0x430/0x690 [ 1101.687472] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1101.687532] ? __msan_poison_alloca+0x15c/0x1d0 [ 1101.687601] copy_process+0x778/0x9be0 [ 1101.687639] ? __msan_poison_alloca+0x15c/0x1d0 [ 1101.687676] ? handle_mm_fault+0x74eb/0x7ed0 [ 1101.687711] ? handle_mm_fault+0x74eb/0x7ed0 [ 1101.687748] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1101.687786] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 1101.687825] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1101.687860] ? __msan_poison_alloca+0x141/0x1d0 [ 1101.698542] udevd cpuset= [ 1101.701046] _do_fork+0x353/0xf60 [ 1101.701088] __x64_sys_clone+0x15e/0x1b0 [ 1101.701125] ? __ia32_sys_vfork+0x70/0x70 [ 1101.704755] / [ 1101.708362] do_syscall_64+0x15b/0x230 [ 1101.713205] mems_allowed=0 [ 1101.717844] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1101.717863] RIP: 0033:0x458429 [ 1101.717876] RSP: 002b:00007ffcd6ee3188 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1101.717910] RAX: ffffffffffffffda RBX: 00007ffcd6ee3240 RCX: 0000000000458429 [ 1101.717926] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 1101.717950] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 1101.816265] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 1101.823558] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 1101.830857] CPU: 0 PID: 7347 Comm: udevd Not tainted 4.17.0+ #9 [ 1101.830894] warn_alloc_show_mem: 3 callbacks suppressed [ 1101.830901] Mem-Info: [ 1101.836928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.836941] Call Trace: [ 1101.836992] dump_stack+0x185/0x1d0 [ 1101.842388] active_anon:120820 inactive_anon:77 isolated_anon:0 [ 1101.842388] active_file:982 inactive_file:959 isolated_file:61 [ 1101.842388] unevictable:0 dirty:11 writeback:0 unstable:0 [ 1101.842388] slab_reclaimable:3292 slab_unreclaimable:8381 [ 1101.842388] mapped:65728 shmem:84 pagetables:1085 bounce:0 [ 1101.842388] free:25396 free_pcp:0 free_cma:0 [ 1101.844726] warn_alloc+0x430/0x690 [ 1101.844779] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1101.854161] Node 0 active_anon:483280kB inactive_anon:308kB active_file:3928kB inactive_file:3836kB unevictable:0kB isolated(anon):0kB isolated(file):244kB mapped:262912kB dirty:44kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 239616kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1101.856706] ? __msan_poison_alloca+0x15c/0x1d0 [ 1101.856788] copy_process+0x778/0x9be0 [ 1101.860399] Node 0 [ 1101.893195] ? expand_files+0x5b/0xe00 [ 1101.893245] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1101.896905] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1101.901669] ? expand_files+0xa6/0xe00 [ 1101.901724] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1101.929727] lowmem_reserve[]: [ 1101.934393] ? find_next_zero_bit+0x12b/0x2f0 [ 1101.934436] ? __msan_poison_alloca+0x141/0x1d0 [ 1101.938302] 0 [ 1101.940535] _do_fork+0x353/0xf60 [ 1101.940580] __x64_sys_clone+0x15e/0x1b0 [ 1101.944443] 2817 [ 1101.949801] ? __ia32_sys_vfork+0x70/0x70 [ 1101.949842] do_syscall_64+0x15b/0x230 [ 1101.975334] 7244 [ 1101.979227] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1101.979258] RIP: 0033:0x7fdcc00c9f46 [ 1101.984607] 7244 [ 1101.987687] RSP: 002b:00007ffd2295b3e0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1101.987726] RAX: ffffffffffffffda RBX: 00007ffd2295b3e0 RCX: 00007fdcc00c9f46 [ 1101.996864] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1101.996881] RBP: 00007ffd2295b440 R08: 0000000000001cb3 R09: 0000000000001cb3 [ 1101.996910] R10: 00007fdcc09e6a70 R11: 0000000000000246 R12: 0000000000000000 [ 1101.998710] Node 0 [ 1102.002135] R13: 00007ffd2295b400 R14: 0000000000000005 R15: 0000000000000005 [ 1102.076190] DMA32 free:44148kB min:26224kB low:32780kB high:39336kB active_anon:226272kB inactive_anon:12kB active_file:896kB inactive_file:1448kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1088kB pagetables:1244kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1102.104331] lowmem_reserve[]: 0 0 4426 4426 [ 1102.108767] Node 0 Normal free:40760kB min:41208kB low:51508kB high:61808kB active_anon:257008kB inactive_anon:296kB active_file:3704kB inactive_file:2596kB unevictable:0kB writepending:44kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3096kB bounce:0kB free_pcp:12kB local_pcp:0kB free_cma:0kB [ 1102.138008] lowmem_reserve[]: 0 0 0 0 [ 1102.141936] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1102.155441] Node 0 DMA32: 359*4kB (M) 3009*8kB (M) 571*16kB (UM) 3*32kB (UM) 2*64kB (UM) 1*128kB (M) 1*256kB (M) 1*512kB (M) 0*1024kB 0*2048kB 2*4096kB (UM) = 43956kB [ 1102.170760] Node 0 Normal: 1805*4kB (ME) 1443*8kB (UME) 625*16kB (UME) 214*32kB (UME) 45*64kB (UM) 17*128kB (UM) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 40924kB [ 1102.186313] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1102.194970] 1783 total pagecache pages [ 1102.198915] 0 pages in swap cache [ 1102.202449] Swap cache stats: add 0, delete 0, find 0/0 [ 1102.207869] Free swap = 0kB [ 1102.210959] Total swap = 0kB [ 1102.214061] 1965969 pages RAM [ 1102.217232] 0 pages HighMem/MovableOnly [ 1102.221240] 106316 pages reserved [ 1102.223499] syz-executor3 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 1102.239091] syz-executor3 cpuset=/ mems_allowed=0 [ 1102.244285] CPU: 0 PID: 31389 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 1102.251153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.260506] Call Trace: [ 1102.263134] dump_stack+0x185/0x1d0 [ 1102.266769] dump_header+0x2cc/0x16f0 [ 1102.270589] ? __msan_poison_alloca+0x15c/0x1d0 [ 1102.275281] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1102.280737] ? ___ratelimit+0x67f/0x760 [ 1102.284720] oom_kill_process+0x341/0x2160 [ 1102.288978] ? oom_evaluate_task+0x856/0xb60 [ 1102.293412] out_of_memory+0x1700/0x1da0 [ 1102.297485] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1102.302103] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1102.307001] alloc_pages_current+0x6b1/0x970 [ 1102.311424] __vmalloc_node_range+0x83c/0x1170 [ 1102.316039] vmalloc_user+0xe1/0x3d0 [ 1102.319792] ? kcov_mmap+0x2a/0x120 [ 1102.323442] ? kcov_ioctl+0x1d0/0x1d0 [ 1102.327253] kcov_mmap+0x2a/0x120 [ 1102.330708] ? kcov_ioctl+0x1d0/0x1d0 [ 1102.334519] mmap_region+0x2751/0x3730 [ 1102.338472] do_mmap+0x1902/0x2010 [ 1102.342046] vm_mmap_pgoff+0x31b/0x430 [ 1102.345967] ksys_mmap_pgoff+0xa5a/0xaf0 [ 1102.350073] __x64_sys_mmap+0x1f1/0x260 [ 1102.354067] ? align_vdso_addr+0x420/0x420 [ 1102.358310] do_syscall_64+0x15b/0x230 [ 1102.362210] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1102.367407] RIP: 0033:0x455aea [ 1102.370596] RSP: 002b:00007ffd7f7ef238 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1102.378311] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 1102.385591] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 1102.392862] RBP: 0000000000000011 R08: 0000000000000011 R09: 0000000000000000 [ 1102.400149] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 1102.407425] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 1102.414771] Mem-Info: [ 1102.417306] active_anon:120297 inactive_anon:77 isolated_anon:0 [ 1102.417306] active_file:654 inactive_file:724 isolated_file:64 [ 1102.417306] unevictable:0 dirty:11 writeback:0 unstable:0 [ 1102.417306] slab_reclaimable:3292 slab_unreclaimable:8381 [ 1102.417306] mapped:65728 shmem:84 pagetables:1085 bounce:0 [ 1102.417306] free:26527 free_pcp:366 free_cma:0 [ 1102.450608] Node 0 active_anon:481188kB inactive_anon:308kB active_file:2616kB inactive_file:2896kB unevictable:0kB isolated(anon):0kB isolated(file):256kB mapped:262796kB dirty:44kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 239616kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1102.478732] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1102.505189] lowmem_reserve[]: 0 2817 7244 7244 [ 1102.509893] Node 0 DMA32 free:46292kB min:26224kB low:32780kB high:39336kB active_anon:224180kB inactive_anon:12kB active_file:896kB inactive_file:1448kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1088kB pagetables:1244kB bounce:0kB free_pcp:708kB local_pcp:0kB free_cma:0kB [ 1102.539160] lowmem_reserve[]: 0 0 4426 4426 [ 1102.543600] Node 0 Normal free:44416kB min:41208kB low:51508kB high:61808kB active_anon:257008kB inactive_anon:296kB active_file:2596kB inactive_file:2092kB unevictable:0kB writepending:44kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3096kB bounce:0kB free_pcp:456kB local_pcp:0kB free_cma:0kB [ 1102.573151] lowmem_reserve[]: 0 0 0 0 [ 1102.577304] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1102.591412] Node 0 DMA32: 732*4kB (UM) 3761*8kB (UM) 921*16kB (UM) 174*32kB (UM) 128*64kB (UM) 48*128kB (UM) 30*256kB (UM) 14*512kB (UM) 2*1024kB (U) 2*2048kB (UM) 1*4096kB (M) = 92744kB [ 1102.608771] Node 0 Normal: 1836*4kB (UME) 1421*8kB (UME) 626*16kB (UME) 213*32kB (UME) 43*64kB (UM) 17*128kB (UM) 0*256kB 0*512kB 0*1024kB 2*2048kB (H) 0*4096kB = 44568kB [ 1102.624692] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1102.633580] 1792 total pagecache pages [ 1102.637536] 0 pages in swap cache [ 1102.641079] Swap cache stats: add 0, delete 0, find 0/0 [ 1102.646686] Free swap = 0kB [ 1102.649876] Total swap = 0kB [ 1102.653001] 1965969 pages RAM 17:03:44 executing program 2: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000180)=0x78) 17:03:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) [ 1102.656252] 0 pages HighMem/MovableOnly [ 1102.660272] 106316 pages reserved [ 1102.663983] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1102.673149] [ 2270] 0 2270 5476 481 94208 0 -1000 udevd [ 1102.681689] [ 4221] 0 4221 2493 573 53248 0 0 dhclient [ 1102.690559] [ 4360] 0 4360 14250 302 118784 0 0 rsyslogd [ 1102.699488] [ 4403] 0 4403 4725 216 86016 0 0 cron 17:03:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) [ 1102.708187] [ 4430] 0 4430 12490 351 143360 0 -1000 sshd [ 1102.716790] [ 4454] 0 4454 3694 221 77824 0 0 getty [ 1102.725373] [ 4455] 0 4455 3694 220 69632 0 0 getty [ 1102.733882] [ 4456] 0 4456 3694 223 77824 0 0 getty [ 1102.742334] [ 4457] 0 4457 3694 225 73728 0 0 getty [ 1102.750764] [ 4458] 0 4458 3694 218 77824 0 0 getty [ 1102.759430] [ 4459] 0 4459 3694 217 73728 0 0 getty [ 1102.768523] [ 4460] 0 4460 3649 219 73728 0 0 getty [ 1102.777007] [ 4476] 0 4476 17821 354 188416 0 0 sshd [ 1102.785453] [ 4478] 0 4478 244271 118675 1576960 0 0 syz-fuzzer [ 1102.794445] [ 4492] 0 4492 17553 78 114688 0 0 syz-executor2 [ 1102.804247] [ 4495] 0 4495 17553 78 114688 0 0 syz-executor7 [ 1102.813429] [ 4501] 0 4501 17552 8312 122880 0 0 syz-executor2 [ 1102.822747] [ 4502] 0 4502 17552 8313 122880 0 0 syz-executor7 [ 1102.832056] [ 7347] 0 7347 5476 485 90112 0 -1000 udevd [ 1102.840571] [10763] 0 10763 5475 485 90112 0 -1000 udevd [ 1102.849178] [30562] 0 30562 17553 126 118784 0 0 syz-executor5 [ 1102.858467] [30599] 0 30599 17552 8352 126976 0 0 syz-executor5 [ 1102.868341] [30642] 0 30642 17553 134 118784 0 0 syz-executor0 [ 1102.877451] [30645] 0 30645 17552 8353 126976 0 0 syz-executor0 [ 1102.886577] [30656] 0 30656 17553 134 118784 0 0 syz-executor1 [ 1102.895844] [30669] 0 30669 17552 8353 126976 0 0 syz-executor1 [ 1102.905053] [31389] 0 31389 16529 148 106496 0 0 syz-executor3 [ 1102.914473] [31403] 0 31403 5475 536 90112 0 -1000 udevd [ 1102.923197] [31422] 0 31422 88 1 45056 0 -1000 blkid [ 1102.932635] [31423] 0 31423 5475 575 90112 0 -1000 udevd [ 1102.941222] [31424] 0 31424 5475 592 90112 0 -1000 udevd [ 1102.949761] [31425] 0 31425 17585 8730 131072 0 0 syz-executor5 [ 1102.959280] [31427] 0 31427 88 1 40960 0 -1000 blkid [ 1102.967943] [31428] 0 31428 639 50 45056 0 -1000 blkid [ 1102.976569] [31429] 0 31429 17585 8730 131072 0 0 syz-executor1 [ 1102.985807] Out of memory: Kill process 4478 (syz-fuzzer) score 63 or sacrifice child [ 1102.993931] Killed process 31389 (syz-executor3) total-vm:66116kB, anon-rss:60kB, file-rss:532kB, shmem-rss:0kB [ 1104.749587] IPVS: ftp: loaded support on port[0] = 21 [ 1105.034750] IPVS: ftp: loaded support on port[0] = 21 [ 1105.340118] IPVS: ftp: loaded support on port[0] = 21 [ 1106.815674] bridge0: port 1(bridge_slave_0) entered blocking state [ 1106.822166] bridge0: port 1(bridge_slave_0) entered disabled state [ 1106.830660] device bridge_slave_0 entered promiscuous mode [ 1106.886713] bridge0: port 2(bridge_slave_1) entered blocking state [ 1106.893204] bridge0: port 2(bridge_slave_1) entered disabled state [ 1106.901573] device bridge_slave_1 entered promiscuous mode [ 1106.957482] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1107.013694] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1107.276714] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1107.283953] IPVS: ftp: loaded support on port[0] = 21 [ 1107.378559] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1107.454338] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1107.461908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1107.707994] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1107.716606] team0: Port device team_slave_0 added [ 1107.933111] IPVS: ftp: loaded support on port[0] = 21 [ 1109.380287] bridge0: port 1(bridge_slave_0) entered blocking state [ 1109.386757] bridge0: port 1(bridge_slave_0) entered disabled state [ 1109.394828] device bridge_slave_0 entered promiscuous mode [ 1109.447770] bridge0: port 2(bridge_slave_1) entered blocking state [ 1109.454261] bridge0: port 2(bridge_slave_1) entered disabled state [ 1109.463253] device bridge_slave_1 entered promiscuous mode [ 1109.517804] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1109.577879] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1109.590841] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1109.805421] syz-executor3: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1109.816814] syz-executor3 cpuset=/ mems_allowed=0 [ 1109.821799] CPU: 1 PID: 31448 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 1109.828652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.838030] Call Trace: [ 1109.840660] dump_stack+0x185/0x1d0 [ 1109.844434] warn_alloc+0x430/0x690 [ 1109.848119] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1109.853023] ? __msan_poison_alloca+0x15c/0x1d0 [ 1109.857785] copy_process+0x778/0x9be0 [ 1109.861741] ? __msan_poison_alloca+0x141/0x1d0 [ 1109.866468] _do_fork+0x353/0xf60 [ 1109.869986] __x64_sys_clone+0x15e/0x1b0 [ 1109.874080] ? __ia32_sys_vfork+0x70/0x70 [ 1109.878283] do_syscall_64+0x15b/0x230 [ 1109.882213] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1109.887420] RIP: 0033:0x41f8b9 [ 1109.890626] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1109.898369] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1109.905662] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1109.912950] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 000000000000002d [ 1109.920264] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3ff10 [ 1109.927555] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1109.934965] warn_alloc_show_mem: 1 callbacks suppressed [ 1109.934972] Mem-Info: [ 1109.942935] active_anon:120147 inactive_anon:77 isolated_anon:0 [ 1109.942935] active_file:2241 inactive_file:2208 isolated_file:20 [ 1109.942935] unevictable:0 dirty:78 writeback:0 unstable:0 [ 1109.942935] slab_reclaimable:3294 slab_unreclaimable:8845 [ 1109.942935] mapped:68313 shmem:84 pagetables:1011 bounce:0 [ 1109.942935] free:19202 free_pcp:67 free_cma:0 [ 1109.976869] Node 0 active_anon:480588kB inactive_anon:308kB active_file:8460kB inactive_file:8424kB unevictable:0kB isolated(anon):0kB isolated(file):336kB mapped:272672kB dirty:312kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 237568kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1110.005339] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1110.031627] lowmem_reserve[]: 0 2817 7244 7244 [ 1110.036357] Node 0 DMA32 free:44096kB min:26224kB low:32780kB high:39336kB active_anon:223636kB inactive_anon:4kB active_file:1044kB inactive_file:2604kB unevictable:0kB writepending:120kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1088kB pagetables:952kB bounce:0kB free_pcp:128kB local_pcp:0kB free_cma:0kB [ 1110.065407] lowmem_reserve[]: 0 0 4426 4426 [ 1110.069844] Node 0 Normal free:15920kB min:41208kB low:51508kB high:61808kB active_anon:256952kB inactive_anon:304kB active_file:6740kB inactive_file:5096kB unevictable:0kB writepending:192kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3092kB bounce:0kB free_pcp:76kB local_pcp:0kB free_cma:0kB [ 1110.099167] lowmem_reserve[]: 0 0 0 0 [ 1110.103089] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1110.116556] Node 0 DMA32: 717*4kB (UM) 1791*8kB (M) 458*16kB (M) 73*32kB (M) 32*64kB (ME) 14*128kB (UME) 9*256kB (UME) 2*512kB (M) 4*1024kB (UME) 3*2048kB (M) 0*4096kB = 44268kB [ 1110.132825] Node 0 Normal: 1367*4kB (UME) 191*8kB (UME) 205*16kB (UME) 44*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 1*4096kB (H) = 15780kB [ 1110.147218] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1110.155869] 3237 total pagecache pages [ 1110.159813] 0 pages in swap cache [ 1110.160838] syz-executor4 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 1110.163316] Swap cache stats: add 0, delete 0, find 0/0 [ 1110.177751] syz-executor4 cpuset= [ 1110.183075] Free swap = 0kB [ 1110.183079] / mems_allowed=0 [ 1110.186565] Total swap = 0kB [ 1110.189605] CPU: 0 PID: 31615 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 1110.189627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1110.192650] 1965969 pages RAM [ 1110.195625] Call Trace: [ 1110.195674] dump_stack+0x185/0x1d0 [ 1110.195713] dump_header+0x2cc/0x16f0 [ 1110.202542] 0 pages HighMem/MovableOnly [ 1110.211883] ? __msan_poison_alloca+0x15c/0x1d0 [ 1110.211939] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1110.215055] 106316 pages reserved [ 1110.217610] ? ___ratelimit+0x67f/0x760 [ 1110.217646] oom_kill_process+0x341/0x2160 [ 1110.250858] ? oom_evaluate_task+0x84a/0xb60 [ 1110.255329] out_of_memory+0x1700/0x1da0 [ 1110.259450] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1110.264093] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1110.269038] alloc_pages_current+0x6b1/0x970 [ 1110.273485] __vmalloc_node_range+0x83c/0x1170 [ 1110.278126] vmalloc_user+0xe1/0x3d0 [ 1110.281879] ? kcov_mmap+0x2a/0x120 [ 1110.285538] ? kcov_ioctl+0x1d0/0x1d0 [ 1110.289378] kcov_mmap+0x2a/0x120 [ 1110.292857] ? kcov_ioctl+0x1d0/0x1d0 [ 1110.296684] mmap_region+0x2751/0x3730 [ 1110.300649] do_mmap+0x1902/0x2010 [ 1110.304252] vm_mmap_pgoff+0x31b/0x430 [ 1110.308207] ksys_mmap_pgoff+0xa5a/0xaf0 [ 1110.312328] __x64_sys_mmap+0x1f1/0x260 [ 1110.316339] ? align_vdso_addr+0x420/0x420 [ 1110.320579] do_syscall_64+0x15b/0x230 [ 1110.324478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1110.329668] RIP: 0033:0x455aea [ 1110.332855] RSP: 002b:00007fff6589f008 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1110.340572] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 1110.347869] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 1110.355139] RBP: 0000000000000012 R08: 0000000000000012 R09: 0000000000000000 [ 1110.362410] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 1110.369681] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 1110.377170] Mem-Info: [ 1110.379685] active_anon:120147 inactive_anon:77 isolated_anon:0 [ 1110.379685] active_file:812 inactive_file:849 isolated_file:25 [ 1110.379685] unevictable:0 dirty:20 writeback:0 unstable:0 [ 1110.379685] slab_reclaimable:3294 slab_unreclaimable:8845 [ 1110.379685] mapped:66660 shmem:84 pagetables:1011 bounce:0 [ 1110.379685] free:20051 free_pcp:327 free_cma:0 [ 1110.413198] Node 0 active_anon:480588kB inactive_anon:308kB active_file:3104kB inactive_file:3024kB unevictable:0kB isolated(anon):0kB isolated(file):100kB mapped:266060kB dirty:80kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 237568kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1110.441446] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1110.467860] lowmem_reserve[]: 0 2817 7244 7244 [ 1110.472688] Node 0 DMA32 free:43960kB min:26224kB low:32780kB high:39336kB active_anon:223636kB inactive_anon:4kB active_file:1548kB inactive_file:388kB unevictable:0kB writepending:120kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1088kB pagetables:952kB bounce:0kB free_pcp:8kB local_pcp:0kB free_cma:0kB [ 1110.501488] lowmem_reserve[]: 0 0 4426 4426 [ 1110.505904] Node 0 Normal free:22356kB min:41208kB low:51508kB high:61808kB active_anon:256952kB inactive_anon:304kB active_file:2068kB inactive_file:2884kB unevictable:0kB writepending:192kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3092kB bounce:0kB free_pcp:660kB local_pcp:0kB free_cma:0kB [ 1110.535294] lowmem_reserve[]: 0 0 0 0 [ 1110.539193] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1110.552630] Node 0 DMA32: 721*4kB (UM) 1914*8kB (UM) 458*16kB (UM) 73*32kB (M) 31*64kB (ME) 15*128kB (UME) 7*256kB (ME) 1*512kB (M) 2*1024kB (ME) 4*2048kB (M) 0*4096kB = 44308kB [ 1110.568955] Node 0 Normal: 1746*4kB (UME) 991*8kB (UME) 223*16kB (UME) 50*32kB (UM) 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 1*4096kB (H) = 24176kB [ 1110.583322] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1110.591985] 1091 total pagecache pages [ 1110.595957] 0 pages in swap cache [ 1110.599502] Swap cache stats: add 0, delete 0, find 0/0 [ 1110.604920] Free swap = 0kB [ 1110.608015] Total swap = 0kB [ 1110.611079] 1965969 pages RAM [ 1110.614246] 0 pages HighMem/MovableOnly [ 1110.618253] 106316 pages reserved [ 1110.621743] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1110.630458] [ 2270] 0 2270 5476 289 94208 0 -1000 udevd [ 1110.638677] [ 4221] 0 4221 2493 573 53248 0 0 dhclient [ 1110.647152] [ 4360] 0 4360 14250 166 118784 0 0 rsyslogd [ 1110.655629] [ 4403] 0 4403 4725 53 86016 0 0 cron [ 1110.663764] [ 4430] 0 4430 12490 162 143360 0 -1000 sshd [ 1110.671902] [ 4454] 0 4454 3694 58 77824 0 0 getty [ 1110.680117] [ 4455] 0 4455 3694 57 69632 0 0 getty [ 1110.688331] [ 4456] 0 4456 3694 58 77824 0 0 getty [ 1110.696729] [ 4457] 0 4457 3694 60 73728 0 0 getty [ 1110.704949] [ 4458] 0 4458 3694 55 77824 0 0 getty [ 1110.713392] [ 4459] 0 4459 3694 55 73728 0 0 getty [ 1110.721629] [ 4460] 0 4460 3649 57 73728 0 0 getty [ 1110.729842] [ 4476] 0 4476 17821 198 188416 0 0 sshd [ 1110.738265] [ 4478] 0 4478 244271 117956 1576960 0 0 syz-fuzzer [ 1110.746924] [ 4492] 0 4492 17553 14 114688 0 0 syz-executor2 [ 1110.756038] [ 4495] 0 4495 17553 14 114688 0 0 syz-executor7 [ 1110.765240] [ 4501] 0 4501 17552 8221 122880 0 0 syz-executor2 [ 1110.774444] [ 4502] 0 4502 17552 8219 122880 0 0 syz-executor7 [ 1110.780696] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1110.783575] [30562] 0 30562 17553 14 118784 0 0 syz-executor5 [ 1110.794673] syz-executor6 cpuset= [ 1110.803538] [30599] 0 30599 17552 8205 126976 0 0 syz-executor5 [ 1110.803577] [30642] 0 30642 17553 14 118784 0 0 syz-executor0 [ 1110.807069] / [ 1110.815933] [30645] 0 30645 17552 8220 126976 0 0 syz-executor0 [ 1110.824777] mems_allowed=0 [ 1110.826484] [30656] 0 30656 17553 14 118784 0 0 syz-executor1 [ 1110.826523] [30669] 0 30669 17552 8207 126976 0 0 syz-executor1 [ 1110.835376] CPU: 1 PID: 31526 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1110.838321] [31423] 0 31423 5475 265 90112 0 -1000 udevd [ 1110.847101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1110.847113] Call Trace: [ 1110.847164] dump_stack+0x185/0x1d0 [ 1110.855992] [31424] 0 31424 5475 265 90112 0 -1000 udevd [ 1110.862795] warn_alloc+0x430/0x690 [ 1110.862850] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1110.870984] [31443] 0 31443 17553 16 118784 0 0 syz-executor3 [ 1110.880332] ? __msan_poison_alloca+0x15c/0x1d0 [ 1110.880412] copy_process+0x778/0x9be0 [ 1110.882964] [31448] 0 31448 17553 8189 118784 0 0 syz-executor3 [ 1110.886588] ? __msan_poison_alloca+0x141/0x1d0 [ 1110.894753] [31520] 0 31520 17553 15 114688 0 0 syz-executor6 [ 1110.898357] _do_fork+0x353/0xf60 [ 1110.898418] __x64_sys_clone+0x15e/0x1b0 [ 1110.903250] [31526] 0 31526 17553 8044 114688 0 0 syz-executor6 [ 1110.912054] ? __ia32_sys_vfork+0x70/0x70 [ 1110.912088] do_syscall_64+0x15b/0x230 [ 1110.916767] [31615] 0 31615 17041 19 114688 0 0 syz-executor4 [ 1110.920617] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1110.920647] RIP: 0033:0x41f8b9 [ 1110.929964] Out of memory: Kill process 4478 (syz-fuzzer) score 64 or sacrifice child [ 1110.934595] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1110.934634] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1110.943545] Killed process 31615 (syz-executor4) total-vm:68164kB, anon-rss:60kB, file-rss:16kB, shmem-rss:0kB [ 1110.946899] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1110.946915] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 000000000000002f [ 1110.946940] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fed0 [ 1111.039929] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1111.047921] Mem-Info: [ 1111.050466] active_anon:120144 inactive_anon:77 isolated_anon:0 [ 1111.050466] active_file:74 inactive_file:110 isolated_file:0 [ 1111.050466] unevictable:0 dirty:6 writeback:0 unstable:0 [ 1111.050466] slab_reclaimable:3282 slab_unreclaimable:8854 [ 1111.050466] mapped:65079 shmem:84 pagetables:992 bounce:0 [ 1111.050466] free:22465 free_pcp:14 free_cma:0 [ 1111.083214] Node 0 active_anon:480576kB inactive_anon:308kB active_file:272kB inactive_file:400kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:260200kB dirty:24kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 237568kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1111.110995] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1111.137289] lowmem_reserve[]: 0 2817 7244 7244 [ 1111.141969] Node 0 DMA32 free:43448kB min:26224kB low:32780kB high:39336kB active_anon:223624kB inactive_anon:4kB active_file:116kB inactive_file:280kB unevictable:0kB writepending:24kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1088kB pagetables:876kB bounce:0kB free_pcp:696kB local_pcp:0kB free_cma:0kB [ 1111.170794] lowmem_reserve[]: 0 0 4426 4426 [ 1111.175238] Node 0 Normal free:24928kB min:41208kB low:51508kB high:61808kB active_anon:256952kB inactive_anon:304kB active_file:64kB inactive_file:48kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3092kB bounce:0kB free_pcp:88kB local_pcp:0kB free_cma:0kB [ 1111.204063] lowmem_reserve[]: 0 0 0 0 [ 1111.207980] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1111.221472] Node 0 DMA32: 774*4kB (UM) 1976*8kB (UM) 458*16kB (UM) 72*32kB (M) 32*64kB (ME) 14*128kB (UME) 7*256kB (UME) 3*512kB (UM) 2*1024kB (ME) 3*2048kB (M) 0*4096kB = 43896kB [ 1111.237933] Node 0 Normal: 2497*4kB (UME) 1411*8kB (UME) 411*16kB (UME) 104*32kB (UM) 4*64kB (U) 3*128kB (U) 3*256kB (U) 0*512kB 0*1024kB 0*2048kB 1*4096kB (H) = 36684kB [ 1111.253556] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1111.262205] 195 total pagecache pages [ 1111.266075] 0 pages in swap cache [ 1111.269587] Swap cache stats: add 0, delete 0, find 0/0 [ 1111.274999] Free swap = 0kB [ 1111.278068] Total swap = 0kB [ 1111.281129] 1965969 pages RAM [ 1111.284284] 0 pages HighMem/MovableOnly [ 1111.288287] 106316 pages reserved [ 1111.599681] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1111.605849] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1111.679722] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1111.686766] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1111.695270] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1111.884833] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1111.947222] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1112.159765] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1112.166159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1112.177778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1112.465343] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1112.471634] 8021q: adding VLAN 0 to HW filter on device team0 [ 1112.825703] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready 17:03:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) [ 1114.097816] syz-executor4 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 1114.112180] syz-executor4 cpuset=/ mems_allowed=0 [ 1114.117181] CPU: 1 PID: 31719 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 1114.124044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.133425] Call Trace: [ 1114.136038] dump_stack+0x185/0x1d0 [ 1114.139667] dump_header+0x2cc/0x16f0 [ 1114.143477] ? __msan_poison_alloca+0x15c/0x1d0 [ 1114.148156] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1114.153624] ? ___ratelimit+0x67f/0x760 [ 1114.157628] oom_kill_process+0x341/0x2160 [ 1114.161920] ? oom_evaluate_task+0x84a/0xb60 [ 1114.166380] out_of_memory+0x1700/0x1da0 [ 1114.170480] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1114.175111] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1114.180004] ? new_slab+0x17e1/0x1b50 [ 1114.183891] alloc_pages_current+0x6b1/0x970 [ 1114.188337] __vmalloc_node_range+0x83c/0x1170 [ 1114.192952] vmalloc_user+0xe1/0x3d0 [ 1114.196673] ? kcov_mmap+0x2a/0x120 [ 1114.200305] ? kcov_ioctl+0x1d0/0x1d0 [ 1114.204097] kcov_mmap+0x2a/0x120 [ 1114.207540] ? kcov_ioctl+0x1d0/0x1d0 [ 1114.211333] mmap_region+0x2751/0x3730 [ 1114.215241] do_mmap+0x1902/0x2010 [ 1114.218792] vm_mmap_pgoff+0x31b/0x430 [ 1114.222693] ksys_mmap_pgoff+0xa5a/0xaf0 [ 1114.226766] __x64_sys_mmap+0x1f1/0x260 [ 1114.230737] ? align_vdso_addr+0x420/0x420 [ 1114.234964] do_syscall_64+0x15b/0x230 [ 1114.238870] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1114.244061] RIP: 0033:0x455aea [ 1114.247240] RSP: 002b:00007ffd269f4438 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1114.254943] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 1114.262204] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 1114.269477] RBP: 0000000000000012 R08: 0000000000000012 R09: 0000000000000000 [ 1114.276735] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 1114.283994] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 1114.291361] Mem-Info: [ 1114.293887] active_anon:120212 inactive_anon:77 isolated_anon:0 [ 1114.293887] active_file:32 inactive_file:0 isolated_file:0 [ 1114.293887] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1114.293887] slab_reclaimable:3276 slab_unreclaimable:8864 [ 1114.293887] mapped:65039 shmem:84 pagetables:994 bounce:0 [ 1114.293887] free:18751 free_pcp:0 free_cma:0 [ 1114.326313] Node 0 active_anon:480848kB inactive_anon:308kB active_file:128kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:260156kB dirty:0kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 237568kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1114.353762] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1114.379945] lowmem_reserve[]: 0 2817 7244 7244 [ 1114.384596] Node 0 DMA32 free:43828kB min:26224kB low:32780kB high:39336kB active_anon:223924kB inactive_anon:16kB active_file:120kB inactive_file:24kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1088kB pagetables:876kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1114.413109] lowmem_reserve[]: 0 0 4426 4426 [ 1114.417522] Node 0 Normal free:15272kB min:41208kB low:51508kB high:61808kB active_anon:256924kB inactive_anon:292kB active_file:64kB inactive_file:0kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8128kB pagetables:3100kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1114.446203] lowmem_reserve[]: 0 0 0 0 [ 1114.450074] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1114.463533] Node 0 DMA32: 870*4kB (UM) 2064*8kB (UM) 489*16kB (ME) 82*32kB (UME) 27*64kB (ME) 8*128kB (ME) 3*256kB (ME) 2*512kB (M) 3*1024kB (UME) 3*2048kB (M) 0*4096kB = 44200kB [ 1114.479868] Node 0 Normal: 784*4kB (UME) 553*8kB (UME) 175*16kB (UME) 29*32kB (UM) 1*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 1*2048kB (H) 0*4096kB = 15320kB [ 1114.495765] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1114.504388] 129 total pagecache pages [ 1114.508231] 0 pages in swap cache [ 1114.511747] Swap cache stats: add 0, delete 0, find 0/0 [ 1114.517158] Free swap = 0kB [ 1114.520221] Total swap = 0kB [ 1114.523285] 1965969 pages RAM [ 1114.526427] 0 pages HighMem/MovableOnly [ 1114.530705] 106316 pages reserved [ 1114.534208] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1114.542866] [ 2270] 0 2270 5476 262 94208 0 -1000 udevd [ 1114.551094] [ 4221] 0 4221 2493 573 53248 0 0 dhclient [ 1114.559568] [ 4360] 0 4360 14250 166 118784 0 0 rsyslogd [ 1114.568017] [ 4403] 0 4403 4725 48 86016 0 0 cron [ 1114.576494] [ 4430] 0 4430 12490 153 143360 0 -1000 sshd [ 1114.584626] [ 4454] 0 4454 3694 41 77824 0 0 getty [ 1114.592814] [ 4455] 0 4455 3694 40 69632 0 0 getty [ 1114.601014] [ 4456] 0 4456 3694 39 77824 0 0 getty [ 1114.609233] [ 4457] 0 4457 3694 41 73728 0 0 getty [ 1114.617417] [ 4458] 0 4458 3694 38 77824 0 0 getty [ 1114.625618] [ 4459] 0 4459 3694 39 73728 0 0 getty [ 1114.633832] [ 4460] 0 4460 3649 41 73728 0 0 getty [ 1114.642053] [ 4476] 0 4476 17821 214 188416 0 0 sshd [ 1114.650210] [ 4478] 0 4478 244271 118050 1576960 0 0 syz-fuzzer [ 1114.658868] [ 4492] 0 4492 17553 14 114688 0 0 syz-executor2 [ 1114.667790] [ 4495] 0 4495 17553 14 114688 0 0 syz-executor7 [ 1114.676675] [ 4501] 0 4501 17552 8218 122880 0 0 syz-executor2 [ 1114.685576] [ 4502] 0 4502 17552 8218 122880 0 0 syz-executor7 [ 1114.694478] [30562] 0 30562 17553 14 118784 0 0 syz-executor5 [ 1114.703378] [30599] 0 30599 17552 8202 126976 0 0 syz-executor5 [ 1114.712288] [30642] 0 30642 17553 14 118784 0 0 syz-executor0 [ 1114.721196] [30645] 0 30645 17552 8217 126976 0 0 syz-executor0 [ 1114.730110] [30656] 0 30656 17553 14 118784 0 0 syz-executor1 [ 1114.739045] [30669] 0 30669 17552 8204 126976 0 0 syz-executor1 [ 1114.747991] [31423] 0 31423 5475 263 90112 0 -1000 udevd [ 1114.756219] [31424] 0 31424 5475 263 90112 0 -1000 udevd [ 1114.765127] [31443] 0 31443 17553 16 118784 0 0 syz-executor3 [ 1114.774096] [31448] 0 31448 17552 8220 126976 0 0 syz-executor3 [ 1114.783018] [31520] 0 31520 17553 15 114688 0 0 syz-executor6 [ 1114.791967] [31526] 0 31526 17552 8219 122880 0 0 syz-executor6 [ 1114.800887] [31719] 0 31719 17041 16 114688 0 0 syz-executor4 [ 1114.809756] Out of memory: Kill process 4478 (syz-fuzzer) score 63 or sacrifice child [ 1114.817798] Killed process 31443 (syz-executor3) total-vm:70212kB, anon-rss:64kB, file-rss:0kB, shmem-rss:0kB [ 1114.880631] oom_reaper: reaped process 31443 (syz-executor3), now anon-rss:0kB, file-rss:0kB, shmem-rss:0kB [ 1114.901314] syz-executor4 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 1114.915668] syz-executor4 cpuset=/ mems_allowed=0 [ 1114.920659] CPU: 1 PID: 31719 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 1114.927515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.936888] Call Trace: [ 1114.939521] dump_stack+0x185/0x1d0 [ 1114.943183] dump_header+0x2cc/0x16f0 [ 1114.947004] ? __msan_poison_alloca+0x15c/0x1d0 [ 1114.951674] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1114.957121] ? ___ratelimit+0x67f/0x760 [ 1114.961094] oom_kill_process+0x341/0x2160 [ 1114.965341] ? oom_evaluate_task+0x84a/0xb60 [ 1114.969767] out_of_memory+0x1700/0x1da0 [ 1114.973834] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1114.978427] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1114.983286] ? new_slab+0x17e1/0x1b50 [ 1114.987121] alloc_pages_current+0x6b1/0x970 [ 1114.991531] __vmalloc_node_range+0x83c/0x1170 [ 1114.996140] vmalloc_user+0xe1/0x3d0 [ 1114.999897] ? kcov_mmap+0x2a/0x120 [ 1115.003562] ? kcov_ioctl+0x1d0/0x1d0 [ 1115.007392] kcov_mmap+0x2a/0x120 [ 1115.010838] ? kcov_ioctl+0x1d0/0x1d0 [ 1115.014652] mmap_region+0x2751/0x3730 [ 1115.018563] do_mmap+0x1902/0x2010 [ 1115.022120] vm_mmap_pgoff+0x31b/0x430 [ 1115.026061] ksys_mmap_pgoff+0xa5a/0xaf0 [ 1115.030205] __x64_sys_mmap+0x1f1/0x260 [ 1115.034226] ? align_vdso_addr+0x420/0x420 [ 1115.038488] do_syscall_64+0x15b/0x230 [ 1115.042415] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1115.047611] RIP: 0033:0x455aea [ 1115.050800] RSP: 002b:00007ffd269f4438 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1115.058502] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 1115.065772] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 1115.073038] RBP: 0000000000000012 R08: 0000000000000012 R09: 0000000000000000 [ 1115.080318] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 1115.087586] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 1115.094950] Mem-Info: [ 1115.097426] active_anon:120183 inactive_anon:77 isolated_anon:0 [ 1115.097426] active_file:37 inactive_file:29 isolated_file:0 [ 1115.097426] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1115.097426] slab_reclaimable:3272 slab_unreclaimable:8864 [ 1115.097426] mapped:56877 shmem:84 pagetables:994 bounce:0 [ 1115.097426] free:18815 free_pcp:176 free_cma:0 [ 1115.130161] Node 0 active_anon:480732kB inactive_anon:308kB active_file:148kB inactive_file:116kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:227508kB dirty:0kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 237568kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1115.157825] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1115.184079] lowmem_reserve[]: 0 2817 7244 7244 [ 1115.188741] Node 0 DMA32 free:44408kB min:26224kB low:32780kB high:39336kB active_anon:223924kB inactive_anon:16kB active_file:232kB inactive_file:248kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1088kB pagetables:876kB bounce:0kB free_pcp:808kB local_pcp:68kB free_cma:0kB [ 1115.217528] lowmem_reserve[]: 0 0 4426 4426 [ 1115.221891] Node 0 Normal free:15320kB min:41208kB low:51508kB high:61808kB active_anon:256924kB inactive_anon:292kB active_file:28kB inactive_file:16kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8128kB pagetables:3100kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1115.250493] lowmem_reserve[]: 0 0 0 0 [ 1115.254350] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1115.267661] Node 0 DMA32: 777*4kB (UM) 2077*8kB (UM) 499*16kB (UME) 89*32kB (UME) 30*64kB (UME) 9*128kB (UME) 3*256kB (ME) 2*512kB (M) 3*1024kB (UME) 3*2048kB (M) 0*4096kB = 44636kB [ 1115.284124] Node 0 Normal: 790*4kB (UME) 556*8kB (UME) 175*16kB (UME) 29*32kB (UM) 1*64kB (H) 1*128kB (H) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 1*2048kB (H) 0*4096kB = 15368kB [ 1115.299984] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1115.308569] 153 total pagecache pages [ 1115.312381] 0 pages in swap cache [ 1115.315843] Swap cache stats: add 0, delete 0, find 0/0 [ 1115.321216] Free swap = 0kB [ 1115.324239] Total swap = 0kB [ 1115.327276] 1965969 pages RAM [ 1115.330390] 0 pages HighMem/MovableOnly [ 1115.334368] 106316 pages reserved [ 1115.337830] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1115.346477] [ 2270] 0 2270 5476 262 94208 0 -1000 udevd [ 1115.354645] [ 4221] 0 4221 2493 573 53248 0 0 dhclient [ 1115.363094] [ 4360] 0 4360 14250 167 118784 0 0 rsyslogd [ 1115.371541] [ 4403] 0 4403 4725 48 86016 0 0 cron [ 1115.379631] [ 4430] 0 4430 12490 153 143360 0 -1000 sshd [ 1115.387845] [ 4454] 0 4454 3694 41 77824 0 0 getty [ 1115.396038] [ 4455] 0 4455 3694 40 69632 0 0 getty [ 1115.404249] [ 4456] 0 4456 3694 39 77824 0 0 getty [ 1115.412416] [ 4457] 0 4457 3694 41 73728 0 0 getty [ 1115.420583] [ 4458] 0 4458 3694 38 77824 0 0 getty [ 1115.428752] [ 4459] 0 4459 3694 39 73728 0 0 getty [ 1115.436916] [ 4460] 0 4460 3649 41 73728 0 0 getty [ 1115.445113] [ 4476] 0 4476 17821 214 188416 0 0 sshd [ 1115.453223] [ 4478] 0 4478 244271 118050 1576960 0 0 syz-fuzzer [ 1115.461911] [ 4492] 0 4492 17553 14 114688 0 0 syz-executor2 [ 1115.470831] [ 4495] 0 4495 17553 14 114688 0 0 syz-executor7 [ 1115.479756] [ 4501] 0 4501 17552 8218 122880 0 0 syz-executor2 [ 1115.488674] [ 4502] 0 4502 17552 8218 122880 0 0 syz-executor7 [ 1115.497596] [30562] 0 30562 17553 14 118784 0 0 syz-executor5 [ 1115.506514] [30599] 0 30599 17552 8202 126976 0 0 syz-executor5 [ 1115.515432] [30642] 0 30642 17553 14 118784 0 0 syz-executor0 [ 1115.524355] [30645] 0 30645 17552 8217 126976 0 0 syz-executor0 [ 1115.533275] [30656] 0 30656 17553 14 118784 0 0 syz-executor1 [ 1115.542190] [30669] 0 30669 17552 8204 126976 0 0 syz-executor1 [ 1115.551097] [31423] 0 31423 5475 263 90112 0 -1000 udevd [ 1115.559338] [31424] 0 31424 5475 263 90112 0 -1000 udevd [ 1115.567562] [31520] 0 31520 17553 15 114688 0 0 syz-executor6 [ 1115.576475] [31526] 0 31526 17552 8219 122880 0 0 syz-executor6 [ 1115.585397] [31719] 0 31719 17041 16 114688 0 0 syz-executor4 [ 1115.594301] Out of memory: Kill process 4478 (syz-fuzzer) score 63 or sacrifice child [ 1115.603001] Killed process 31719 (syz-executor4) total-vm:68164kB, anon-rss:60kB, file-rss:4kB, shmem-rss:0kB [ 1115.821309] device bridge_slave_1 left promiscuous mode [ 1115.827225] bridge0: port 2(bridge_slave_1) entered disabled state [ 1115.843107] device bridge_slave_0 left promiscuous mode [ 1115.848680] bridge0: port 1(bridge_slave_0) entered disabled state [ 1115.870093] team0 (unregistering): Port device team_slave_0 removed [ 1115.879506] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1115.901681] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1115.928406] bond0 (unregistering): Released all slaves [ 1117.761450] IPVS: ftp: loaded support on port[0] = 21 [ 1118.449092] bridge0: port 1(bridge_slave_0) entered blocking state [ 1118.455515] bridge0: port 1(bridge_slave_0) entered disabled state [ 1118.464344] device bridge_slave_0 entered promiscuous mode [ 1118.499092] bridge0: port 2(bridge_slave_1) entered blocking state [ 1118.505513] bridge0: port 2(bridge_slave_1) entered disabled state [ 1118.512868] device bridge_slave_1 entered promiscuous mode [ 1118.546793] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1118.581445] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1118.677661] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1118.714297] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1118.864291] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1118.871699] team0: Port device team_slave_0 added [ 1118.904241] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1118.911631] team0: Port device team_slave_1 added [ 1118.945016] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1118.980720] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1119.016662] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1119.056617] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1119.385401] bridge0: port 2(bridge_slave_1) entered blocking state [ 1119.391807] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1119.398553] bridge0: port 1(bridge_slave_0) entered blocking state [ 1119.404933] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1119.412427] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1120.351393] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1120.605254] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1120.718991] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1120.858171] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1120.864947] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1120.881728] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1121.095749] 8021q: adding VLAN 0 to HW filter on device team0 17:04:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000100), 0x0) 17:04:03 executing program 2: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000180)=0x78) 17:04:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) 17:04:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:04:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:04:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020b}]}) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000000c0)) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:04:03 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:04:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @rand_addr}}}, &(0x7f0000000140)=0x80) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000001c0)={'icmp6\x00'}, &(0x7f0000000200)=0x1e) 17:04:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000100), 0x0) [ 1122.293398] device bridge_slave_1 left promiscuous mode [ 1122.299213] bridge0: port 2(bridge_slave_1) entered disabled state [ 1122.362543] device bridge_slave_0 left promiscuous mode [ 1122.368356] bridge0: port 1(bridge_slave_0) entered disabled state 17:04:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000100), 0x0) 17:04:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:04:04 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) [ 1122.543714] bond0 (unregistering): Released all slaves 17:04:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) 17:04:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$SG_GET_SG_TABLESIZE(0xffffffffffffffff, 0x227f, &(0x7f0000000040)) 17:04:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000100), 0x0) 17:04:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008d}]}) socket$packet(0x11, 0x0, 0x300) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)) 17:04:04 executing program 2: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000180)=0x78) 17:04:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000100), 0x0) 17:04:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000100), 0x0) 17:04:05 executing program 4: msgget(0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000100), 0x0) [ 1123.443739] IPVS: ftp: loaded support on port[0] = 21 [ 1123.473436] IPVS: ftp: loaded support on port[0] = 21 [ 1123.493407] IPVS: ftp: loaded support on port[0] = 21 [ 1123.506403] IPVS: ftp: loaded support on port[0] = 21 [ 1123.555119] IPVS: ftp: loaded support on port[0] = 21 17:04:05 executing program 4: msgget(0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000100), 0x0) [ 1123.584930] IPVS: ftp: loaded support on port[0] = 21 [ 1124.978108] device bridge_slave_1 left promiscuous mode [ 1124.983814] bridge0: port 2(bridge_slave_1) entered disabled state [ 1124.995822] device bridge_slave_0 left promiscuous mode [ 1125.001484] bridge0: port 1(bridge_slave_0) entered disabled state [ 1125.030489] device bridge_slave_1 left promiscuous mode [ 1125.036152] bridge0: port 2(bridge_slave_1) entered disabled state [ 1125.047885] device bridge_slave_0 left promiscuous mode [ 1125.053526] bridge0: port 1(bridge_slave_0) entered disabled state [ 1125.076642] device bridge_slave_1 left promiscuous mode [ 1125.082488] bridge0: port 2(bridge_slave_1) entered disabled state [ 1125.110969] device bridge_slave_0 left promiscuous mode [ 1125.116603] bridge0: port 1(bridge_slave_0) entered disabled state [ 1125.140657] device bridge_slave_1 left promiscuous mode [ 1125.146304] bridge0: port 2(bridge_slave_1) entered disabled state [ 1125.204188] device bridge_slave_0 left promiscuous mode [ 1125.205933] IPVS: ftp: loaded support on port[0] = 21 [ 1125.209858] bridge0: port 1(bridge_slave_0) entered disabled state [ 1125.227278] device bridge_slave_1 left promiscuous mode [ 1125.232827] bridge0: port 2(bridge_slave_1) entered disabled state [ 1125.243679] device bridge_slave_0 left promiscuous mode [ 1125.249254] bridge0: port 1(bridge_slave_0) entered disabled state [ 1125.260172] device bridge_slave_1 left promiscuous mode [ 1125.265704] bridge0: port 2(bridge_slave_1) entered disabled state [ 1125.276679] device bridge_slave_0 left promiscuous mode [ 1125.282253] bridge0: port 1(bridge_slave_0) entered disabled state [ 1125.396016] team0 (unregistering): Port device team_slave_1 removed [ 1125.405425] team0 (unregistering): Port device team_slave_0 removed [ 1125.414497] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1125.429526] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1125.453438] bond0 (unregistering): Released all slaves [ 1125.470697] team0 (unregistering): Port device team_slave_1 removed [ 1125.479914] team0 (unregistering): Port device team_slave_0 removed [ 1125.488976] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1125.507600] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1125.530428] bond0 (unregistering): Released all slaves [ 1125.551432] team0 (unregistering): Port device team_slave_1 removed [ 1125.560663] team0 (unregistering): Port device team_slave_0 removed [ 1125.569676] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1125.585639] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1125.608504] bond0 (unregistering): Released all slaves [ 1125.625735] team0 (unregistering): Port device team_slave_1 removed [ 1125.634858] team0 (unregistering): Port device team_slave_0 removed [ 1125.643995] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1125.662648] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1125.686338] bond0 (unregistering): Released all slaves [ 1125.703650] team0 (unregistering): Port device team_slave_1 removed [ 1125.712786] team0 (unregistering): Port device team_slave_0 removed [ 1125.721884] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1125.740685] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1125.770261] bond0 (unregistering): Released all slaves [ 1125.790460] team0 (unregistering): Port device team_slave_1 removed [ 1125.801880] team0 (unregistering): Port device team_slave_0 removed [ 1125.813298] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1125.880398] IPVS: ftp: loaded support on port[0] = 21 [ 1125.885773] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1125.908425] bond0 (unregistering): Released all slaves [ 1126.751797] IPVS: ftp: loaded support on port[0] = 21 [ 1126.779509] IPVS: ftp: loaded support on port[0] = 21 [ 1126.795219] IPVS: ftp: loaded support on port[0] = 21 [ 1126.802650] IPVS: ftp: loaded support on port[0] = 21 [ 1126.858945] IPVS: ftp: loaded support on port[0] = 21 [ 1128.644961] bridge0: port 1(bridge_slave_0) entered blocking state [ 1128.651437] bridge0: port 1(bridge_slave_0) entered disabled state [ 1128.683948] device bridge_slave_0 entered promiscuous mode [ 1128.710717] bridge0: port 1(bridge_slave_0) entered blocking state [ 1128.717231] bridge0: port 1(bridge_slave_0) entered disabled state [ 1128.742995] device bridge_slave_0 entered promiscuous mode [ 1128.826606] bridge0: port 2(bridge_slave_1) entered blocking state [ 1128.833105] bridge0: port 2(bridge_slave_1) entered disabled state [ 1128.859127] device bridge_slave_1 entered promiscuous mode [ 1128.878164] bridge0: port 2(bridge_slave_1) entered blocking state [ 1128.884640] bridge0: port 2(bridge_slave_1) entered disabled state [ 1128.908918] device bridge_slave_1 entered promiscuous mode [ 1128.971762] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1129.054229] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1129.130216] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1129.187200] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1129.569158] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1129.603561] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1129.724833] bridge0: port 1(bridge_slave_0) entered blocking state [ 1129.731294] bridge0: port 1(bridge_slave_0) entered disabled state [ 1129.756198] device bridge_slave_0 entered promiscuous mode [ 1129.778510] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1129.794604] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1129.890604] bridge0: port 2(bridge_slave_1) entered blocking state [ 1129.897116] bridge0: port 2(bridge_slave_1) entered disabled state [ 1129.933206] device bridge_slave_1 entered promiscuous mode [ 1129.945841] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1129.954554] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1129.970292] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1129.977263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1130.077477] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1130.099366] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1130.106345] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1130.116151] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1130.123156] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1130.247539] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1130.484503] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1130.493744] team0: Port device team_slave_0 added [ 1130.527897] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1130.551866] team0: Port device team_slave_0 added [ 1130.601870] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1130.675162] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1130.685008] IPVS: ftp: loaded support on port[0] = 21 [ 1130.691831] team0: Port device team_slave_1 added [ 1130.728399] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1130.735929] team0: Port device team_slave_1 added [ 1130.761018] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1130.821872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1130.857714] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1130.864708] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1130.877450] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1130.911255] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1130.918383] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1130.940368] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1130.947341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1130.956504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1131.014540] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1131.021552] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1131.035811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1131.069476] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1131.076455] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1131.135152] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1131.142552] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1131.155151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1131.200879] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1131.208501] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1131.217731] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1131.292452] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1131.299823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1131.313012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1131.360708] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1131.368417] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1131.382155] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1131.637162] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1131.668940] team0: Port device team_slave_0 added [ 1131.902534] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1131.937003] team0: Port device team_slave_1 added [ 1132.084976] IPVS: ftp: loaded support on port[0] = 21 [ 1132.151118] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1132.158182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1132.177825] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1132.453421] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1132.460625] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1132.471499] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1132.690560] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1132.697975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1132.712101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1132.904493] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1132.911930] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1132.925513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1133.657635] bridge0: port 2(bridge_slave_1) entered blocking state [ 1133.664122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1133.670921] bridge0: port 1(bridge_slave_0) entered blocking state [ 1133.677325] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1133.753909] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1133.839544] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1134.870289] bridge0: port 2(bridge_slave_1) entered blocking state [ 1134.876761] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1134.883570] bridge0: port 1(bridge_slave_0) entered blocking state [ 1134.890116] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1134.938904] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1134.950192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1135.067885] IPVS: ftp: loaded support on port[0] = 21 [ 1135.149508] bridge0: port 1(bridge_slave_0) entered blocking state [ 1135.155990] bridge0: port 1(bridge_slave_0) entered disabled state [ 1135.184405] device bridge_slave_0 entered promiscuous mode [ 1135.339734] bridge0: port 2(bridge_slave_1) entered blocking state [ 1135.346231] bridge0: port 2(bridge_slave_1) entered disabled state [ 1135.361905] device bridge_slave_1 entered promiscuous mode [ 1135.478202] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1135.679352] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1136.305579] IPVS: ftp: loaded support on port[0] = 21 17:04:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:04:18 executing program 4: msgget(0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000100), 0x0) 17:04:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', 'vmnet0\x00'}, &(0x7f00000000c0)='/dev/rfkill\x00', 0xc, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000200)=0x24) 17:04:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) 17:04:18 executing program 2: getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x78) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000180)=0x78) [ 1137.168440] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1137.174648] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1138.222502] device bridge_slave_1 left promiscuous mode [ 1138.228291] bridge0: port 2(bridge_slave_1) entered disabled state [ 1138.239971] device bridge_slave_0 left promiscuous mode [ 1138.245719] bridge0: port 1(bridge_slave_0) entered disabled state [ 1138.258670] device bridge_slave_1 left promiscuous mode [ 1138.264404] bridge0: port 2(bridge_slave_1) entered disabled state [ 1138.276956] device bridge_slave_0 left promiscuous mode [ 1138.282635] bridge0: port 1(bridge_slave_0) entered disabled state [ 1138.295716] device bridge_slave_1 left promiscuous mode [ 1138.301408] bridge0: port 2(bridge_slave_1) entered disabled state [ 1138.312902] device bridge_slave_0 left promiscuous mode [ 1138.318574] bridge0: port 1(bridge_slave_0) entered disabled state [ 1138.380860] bond0 (unregistering): Released all slaves [ 1138.399942] team0 (unregistering): Port device team_slave_1 removed [ 1138.411208] team0 (unregistering): Port device team_slave_0 removed [ 1138.422000] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1138.437729] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1138.466390] bond0 (unregistering): Released all slaves [ 1138.485888] team0 (unregistering): Port device team_slave_1 removed [ 1138.497220] team0 (unregistering): Port device team_slave_0 removed [ 1138.508163] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1138.523652] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1138.550756] bond0 (unregistering): Released all slaves [ 1139.047947] IPVS: ftp: loaded support on port[0] = 21 [ 1139.961357] bridge0: port 1(bridge_slave_0) entered blocking state [ 1139.967838] bridge0: port 1(bridge_slave_0) entered disabled state [ 1140.011217] device bridge_slave_0 entered promiscuous mode [ 1140.023823] IPVS: ftp: loaded support on port[0] = 21 [ 1140.169554] IPVS: ftp: loaded support on port[0] = 21 [ 1140.644615] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1141.859501] bridge0: port 1(bridge_slave_0) entered blocking state [ 1141.866012] bridge0: port 1(bridge_slave_0) entered disabled state [ 1141.874757] device bridge_slave_0 entered promiscuous mode [ 1141.941645] bridge0: port 2(bridge_slave_1) entered blocking state [ 1141.948219] bridge0: port 2(bridge_slave_1) entered disabled state [ 1141.956409] device bridge_slave_1 entered promiscuous mode [ 1142.067137] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1142.091449] bridge0: port 1(bridge_slave_0) entered blocking state [ 1142.097964] bridge0: port 1(bridge_slave_0) entered disabled state [ 1142.126291] device bridge_slave_0 entered promiscuous mode [ 1142.157971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1142.249031] bridge0: port 2(bridge_slave_1) entered blocking state [ 1142.255541] bridge0: port 2(bridge_slave_1) entered disabled state [ 1142.279505] device bridge_slave_1 entered promiscuous mode [ 1142.325093] IPVS: ftp: loaded support on port[0] = 21 [ 1142.379279] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1142.468822] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1142.492591] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1142.626891] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1142.721613] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1142.728921] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1142.839527] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1142.846546] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1142.860344] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1143.026869] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1143.352762] IPVS: ftp: loaded support on port[0] = 21 [ 1143.879916] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1144.407851] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1144.414916] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1144.519799] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1144.526017] 8021q: adding VLAN 0 to HW filter on device team0 [ 1144.820385] device bridge_slave_0 left promiscuous mode [ 1144.826254] bridge0: port 1(bridge_slave_0) entered disabled state [ 1144.865348] bond0 (unregistering): Released all slaves [ 1144.892372] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1144.899402] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1145.592891] bridge0: port 1(bridge_slave_0) entered blocking state [ 1145.599396] bridge0: port 1(bridge_slave_0) entered disabled state [ 1145.621708] device bridge_slave_0 entered promiscuous mode [ 1145.756902] bridge0: port 2(bridge_slave_1) entered blocking state [ 1145.763405] bridge0: port 2(bridge_slave_1) entered disabled state [ 1145.779781] device bridge_slave_1 entered promiscuous mode [ 1145.914440] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1145.968470] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1146.048756] IPVS: ftp: loaded support on port[0] = 21 [ 1146.239230] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1146.342972] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1146.717370] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1146.731947] team0: Port device team_slave_0 added [ 1146.829354] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1146.836639] team0: Port device team_slave_1 added [ 1146.955003] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1147.043549] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1147.050722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1147.063341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1147.136539] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1147.143979] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1147.170509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1147.213227] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1147.220665] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1147.238712] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1147.355776] bridge0: port 1(bridge_slave_0) entered blocking state [ 1147.362373] bridge0: port 1(bridge_slave_0) entered disabled state [ 1147.369898] device bridge_slave_0 entered promiscuous mode [ 1147.424403] bridge0: port 2(bridge_slave_1) entered blocking state [ 1147.430877] bridge0: port 2(bridge_slave_1) entered disabled state [ 1147.438218] device bridge_slave_1 entered promiscuous mode [ 1147.493523] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1147.548242] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1147.705628] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1147.763141] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1147.866395] bridge0: port 2(bridge_slave_1) entered blocking state [ 1147.872816] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1147.879612] bridge0: port 1(bridge_slave_0) entered blocking state [ 1147.885992] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1147.893739] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1147.956296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1148.066955] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1148.075334] team0: Port device team_slave_0 added [ 1148.128251] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1148.135868] team0: Port device team_slave_1 added [ 1148.189412] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1148.196574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1148.205500] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1148.253761] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1148.310370] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1148.319183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1148.328594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1148.374793] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1148.382188] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1148.391353] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1148.975039] bridge0: port 2(bridge_slave_1) entered blocking state [ 1148.981501] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1148.988273] bridge0: port 1(bridge_slave_0) entered blocking state [ 1148.994704] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1149.002289] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1149.983381] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1150.279376] device bridge_slave_1 left promiscuous mode [ 1150.285283] bridge0: port 2(bridge_slave_1) entered disabled state [ 1150.310294] device bridge_slave_0 left promiscuous mode [ 1150.316328] bridge0: port 1(bridge_slave_0) entered disabled state [ 1150.344919] team0 (unregistering): Port device team_slave_1 removed [ 1150.354311] team0 (unregistering): Port device team_slave_0 removed [ 1150.367339] bond0 (unregistering): Releasing backup interface bond_slave_1 17:04:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:04:32 executing program 2: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x78) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000180)=0x78) 17:04:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000080)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:04:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 17:04:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:04:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fa}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) 17:04:32 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50201}]}) socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000001d40), &(0x7f0000001d80)=0x4) [ 1150.400315] bond0 (unregistering): Releasing backup interface bond_slave_0 17:04:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50207}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:04:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) [ 1150.558155] bond0 (unregistering): Released all slaves 17:04:32 executing program 5: socket$inet6(0xa, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) [ 1150.667997] 8021q: adding VLAN 0 to HW filter on device team0 17:04:32 executing program 2: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x78) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000180)=0x78) 17:04:33 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000100), 0x0) 17:04:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:04:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 17:04:33 executing program 5: socket$inet6(0xa, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) 17:04:33 executing program 2: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x78) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000180)=0x78) [ 1151.190545] IPVS: ftp: loaded support on port[0] = 21 [ 1151.199373] audit: type=1326 audit(1529687073.197:2081): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=772 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1151.353543] IPVS: ftp: loaded support on port[0] = 21 [ 1151.371265] IPVS: ftp: loaded support on port[0] = 21 [ 1152.075170] IPVS: ftp: loaded support on port[0] = 21 [ 1152.100563] IPVS: ftp: loaded support on port[0] = 21 [ 1152.126864] IPVS: ftp: loaded support on port[0] = 21 [ 1153.190640] device bridge_slave_1 left promiscuous mode [ 1153.196419] bridge0: port 2(bridge_slave_1) entered disabled state [ 1153.225994] device bridge_slave_0 left promiscuous mode [ 1153.231751] bridge0: port 1(bridge_slave_0) entered disabled state [ 1153.246600] device bridge_slave_1 left promiscuous mode [ 1153.252330] bridge0: port 2(bridge_slave_1) entered disabled state [ 1153.281028] device bridge_slave_0 left promiscuous mode [ 1153.286775] bridge0: port 1(bridge_slave_0) entered disabled state [ 1153.369913] team0 (unregistering): Port device team_slave_1 removed [ 1153.390964] team0 (unregistering): Port device team_slave_0 removed [ 1153.411801] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1153.436576] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1153.483841] bond0 (unregistering): Released all slaves [ 1153.515408] team0 (unregistering): Port device team_slave_1 removed [ 1153.539800] team0 (unregistering): Port device team_slave_0 removed [ 1153.557728] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1153.578970] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1153.603673] bond0 (unregistering): Released all slaves [ 1155.456637] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1155.565852] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1157.354202] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 1157.360426] 8021q: adding VLAN 0 to HW filter on device team0 [ 1157.408899] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1158.040418] bond0 (unregistering): Released all slaves [ 1158.381978] IPVS: ftp: loaded support on port[0] = 21 [ 1158.489135] IPVS: ftp: loaded support on port[0] = 21 [ 1159.391569] bond0 (unregistering): Released all slaves [ 1159.420909] bond0 (unregistering): Released all slaves [ 1159.883074] IPVS: ftp: loaded support on port[0] = 21 [ 1159.899834] bridge0: port 1(bridge_slave_0) entered blocking state [ 1159.906347] bridge0: port 1(bridge_slave_0) entered disabled state [ 1159.925775] device bridge_slave_0 entered promiscuous mode [ 1160.001938] bridge0: port 1(bridge_slave_0) entered blocking state [ 1160.008508] bridge0: port 1(bridge_slave_0) entered disabled state [ 1160.017649] device bridge_slave_0 entered promiscuous mode [ 1160.053176] bridge0: port 2(bridge_slave_1) entered blocking state [ 1160.059643] bridge0: port 2(bridge_slave_1) entered disabled state [ 1160.085199] device bridge_slave_1 entered promiscuous mode [ 1160.144649] bridge0: port 2(bridge_slave_1) entered blocking state [ 1160.151144] bridge0: port 2(bridge_slave_1) entered disabled state [ 1160.193179] device bridge_slave_1 entered promiscuous mode [ 1160.222819] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1160.309340] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1160.339347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1160.439182] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1160.752472] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1160.778537] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1160.868160] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1160.879412] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1160.936242] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1160.943235] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1160.979894] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1160.986908] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1161.058645] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1161.065709] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1161.086394] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1161.093386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1161.308017] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1161.316510] team0: Port device team_slave_0 added [ 1161.331928] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1161.340773] team0: Port device team_slave_0 added [ 1161.349248] bridge0: port 1(bridge_slave_0) entered blocking state [ 1161.355701] bridge0: port 1(bridge_slave_0) entered disabled state [ 1161.367601] device bridge_slave_0 entered promiscuous mode [ 1161.381721] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1161.391279] team0: Port device team_slave_1 added [ 1161.417184] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1161.425536] team0: Port device team_slave_1 added [ 1161.475703] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1161.495879] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1161.513802] bridge0: port 2(bridge_slave_1) entered blocking state [ 1161.520276] bridge0: port 2(bridge_slave_1) entered disabled state [ 1161.528500] device bridge_slave_1 entered promiscuous mode [ 1161.544422] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1161.594336] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1161.603715] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1161.647784] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1161.655507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1161.664131] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1161.683758] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1161.695099] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1161.702743] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1161.713344] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1161.727441] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1161.734859] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1161.744039] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1161.784765] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1161.792312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1161.810536] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1161.963814] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1162.027702] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1162.086592] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1162.093712] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1162.193492] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1162.200509] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1162.423805] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1162.432150] team0: Port device team_slave_0 added [ 1162.513251] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1162.531175] team0: Port device team_slave_1 added [ 1162.631707] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1162.648004] bridge0: port 2(bridge_slave_1) entered blocking state [ 1162.654468] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1162.661301] bridge0: port 1(bridge_slave_0) entered blocking state [ 1162.669722] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1162.678218] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1162.711301] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1162.763483] bridge0: port 2(bridge_slave_1) entered blocking state [ 1162.769949] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1162.776799] bridge0: port 1(bridge_slave_0) entered blocking state [ 1162.783223] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1162.791660] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1162.803906] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1162.811685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1162.825672] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1162.903180] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1162.910605] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1162.919812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1162.936848] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1162.948449] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1163.765740] bridge0: port 2(bridge_slave_1) entered blocking state [ 1163.772206] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1163.779008] bridge0: port 1(bridge_slave_0) entered blocking state [ 1163.785418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1163.792985] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1163.943192] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1165.911884] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1165.984353] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1166.144196] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1166.330968] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1166.439713] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1166.446043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1166.455590] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1166.584557] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1166.590927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1166.607617] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1166.787307] 8021q: adding VLAN 0 to HW filter on device team0 [ 1166.846044] 8021q: adding VLAN 0 to HW filter on device team0 [ 1167.212753] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1167.438810] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1167.732727] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 1167.739123] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1167.747259] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1168.063836] 8021q: adding VLAN 0 to HW filter on device team0 17:04:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:04:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 17:04:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501f7}]}) msgget(0xffffffffffffffff, 0x0) name_to_handle_at(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x8}, &(0x7f0000000100), 0x0) 17:04:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501fc}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:04:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='eql\x00', 0x10) 17:04:51 executing program 2: r0 = socket$inet(0x2, 0x4000000000000005, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x78) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000180)=0x78) 17:04:51 executing program 5: socket$inet6(0xa, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000040)) 17:04:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:04:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) 17:04:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) 17:04:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fa}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) 17:04:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 17:04:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='eql\x00', 0x10) [ 1169.656151] device bridge_slave_1 left promiscuous mode [ 1169.661895] bridge0: port 2(bridge_slave_1) entered disabled state [ 1169.703552] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1169.714944] syz-executor0 cpuset=syz0 mems_allowed=0 [ 1169.720228] CPU: 0 PID: 1113 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 1169.727032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1169.736413] Call Trace: [ 1169.739058] dump_stack+0x185/0x1d0 [ 1169.742733] warn_alloc+0x430/0x690 [ 1169.746449] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1169.751365] ? __msan_poison_alloca+0x15c/0x1d0 [ 1169.756107] copy_process+0x778/0x9be0 [ 1169.760045] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1169.765539] ? ptep_set_access_flags+0x10e/0x1d0 [ 1169.770353] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1169.775873] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1169.780325] ? __msan_poison_alloca+0x141/0x1d0 [ 1169.785081] _do_fork+0x353/0xf60 [ 1169.788584] __x64_sys_clone+0x15e/0x1b0 [ 1169.792678] ? __ia32_sys_vfork+0x70/0x70 [ 1169.796850] do_syscall_64+0x15b/0x230 [ 1169.800777] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1169.805984] RIP: 0033:0x45414a [ 1169.809191] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1169.814553] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1169.816937] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 1169.816954] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1169.816971] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 00000000023be940 [ 1169.816997] R10: 00000000023bec10 R11: 0000000000000246 R12: 0000000000000001 [ 1169.827625] udevd cpuset= [ 1169.834833] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 1169.835337] Mem-Info: [ 1169.842189] / [ 1169.849533] active_anon:120234 inactive_anon:75 isolated_anon:0 [ 1169.849533] active_file:1603 inactive_file:1607 isolated_file:51 [ 1169.849533] unevictable:0 dirty:4 writeback:0 unstable:0 [ 1169.849533] slab_reclaimable:3238 slab_unreclaimable:7726 [ 1169.849533] mapped:31437 shmem:82 pagetables:847 bounce:0 [ 1169.849533] free:25612 free_pcp:0 free_cma:0 [ 1169.856949] mems_allowed=0 [ 1169.859560] Node 0 active_anon:480936kB inactive_anon:300kB active_file:6412kB inactive_file:6428kB unevictable:0kB isolated(anon):0kB isolated(file):204kB mapped:125748kB dirty:16kB writeback:0kB shmem:328kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 237568kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1169.859578] Node 0 [ 1169.866920] CPU: 1 PID: 763 Comm: udevd Not tainted 4.17.0+ #9 [ 1169.869424] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1169.871088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1169.871101] Call Trace: [ 1169.871203] dump_stack+0x185/0x1d0 [ 1169.903987] lowmem_reserve[]: [ 1169.906912] warn_alloc+0x430/0x690 [ 1169.906966] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1169.934970] 0 [ 1169.937219] ? __msan_poison_alloca+0x15c/0x1d0 [ 1169.937301] copy_process+0x778/0x9be0 [ 1169.943265] 2817 [ 1169.968767] ? expand_files+0x5b/0xe00 [ 1169.968806] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1169.978153] 7244 [ 1169.980732] ? expand_files+0xa6/0xe00 [ 1169.980779] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1169.984384] 7244 [ 1169.987474] ? find_next_zero_bit+0x12b/0x2f0 [ 1169.987515] ? __msan_poison_alloca+0x141/0x1d0 [ 1169.995955] _do_fork+0x353/0xf60 [ 1169.996000] __x64_sys_clone+0x15e/0x1b0 [ 1169.997784] Node 0 [ 1170.002437] ? __ia32_sys_vfork+0x70/0x70 [ 1170.002469] do_syscall_64+0x15b/0x230 [ 1170.006404] DMA32 free:45660kB min:26224kB low:32780kB high:39336kB active_anon:223596kB inactive_anon:12kB active_file:1620kB inactive_file:948kB unevictable:0kB writepending:8kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:640kB pagetables:496kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1170.008400] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1170.008430] RIP: 0033:0x7fdcc00c9f46 [ 1170.012325] lowmem_reserve[]: [ 1170.017659] RSP: 002b:00007ffd2295b3e0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1170.017686] RAX: ffffffffffffffda RBX: 00007ffd2295b3e0 RCX: 00007fdcc00c9f46 [ 1170.017711] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1170.019771] 0 [ 1170.023633] RBP: 00007ffd2295b440 R08: 00000000000002fb R09: 00000000000002fb [ 1170.023650] R10: 00007fdcc09e6a70 R11: 0000000000000246 R12: 0000000000000000 [ 1170.023675] R13: 00007ffd2295b400 R14: 0000000000000005 R15: 0000000000000005 [ 1170.029055] 0 4426 4426 [ 1170.147286] Node 0 Normal free:51472kB min:41208kB low:51508kB high:61808kB active_anon:257576kB inactive_anon:288kB active_file:4260kB inactive_file:5436kB unevictable:0kB writepending:8kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8256kB pagetables:2892kB bounce:0kB free_pcp:740kB local_pcp:0kB free_cma:0kB [ 1170.176554] lowmem_reserve[]: 0 0 0 0 [ 1170.180458] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1170.193945] Node 0 DMA32: 407*4kB (UM) 2333*8kB (UME) 601*16kB (UME) 168*32kB (UM) 127*64kB (UME) 44*128kB (UME) 9*256kB (UME) 1*512kB (M) 1*1024kB (E) 2*2048kB (MH) 0*4096kB = 56980kB [ 1170.210850] Node 0 Normal: 604*4kB (UME) 489*8kB (UME) 235*16kB (UME) 148*32kB (UME) 162*64kB (UMH) 83*128kB (UMH) 31*256kB (UMH) 4*512kB (UMH) 5*1024kB (UH) 0*2048kB 0*4096kB = 50920kB [ 1170.227849] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1170.236492] 2661 total pagecache pages [ 1170.240430] 0 pages in swap cache [ 1170.243933] Swap cache stats: add 0, delete 0, find 0/0 [ 1170.249340] Free swap = 0kB [ 1170.252400] Total swap = 0kB [ 1170.255456] 1965969 pages RAM [ 1170.258606] 0 pages HighMem/MovableOnly [ 1170.262619] 106316 pages reserved [ 1170.291491] device bridge_slave_0 left promiscuous mode [ 1170.297267] bridge0: port 1(bridge_slave_0) entered disabled state 17:04:52 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), 0x14) [ 1170.333741] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1170.369632] bond0 (unregistering): Releasing backup interface bond_slave_0 17:04:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'veth0_to_team\x00', &(0x7f0000000040)=@ethtool_eee}) [ 1170.444138] bond0 (unregistering): Released all slaves [ 1170.729260] IPVS: ftp: loaded support on port[0] = 21 [ 1170.764186] IPVS: ftp: loaded support on port[0] = 21 [ 1170.791895] IPVS: ftp: loaded support on port[0] = 21 17:04:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='eql\x00', 0x10) 17:04:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50205}]}) ioctl$KDSKBLED(0xffffffffffffffff, 0x4b65, 0x0) 17:04:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000040), &(0x7f00000000c0)=0x14) [ 1171.917550] IPVS: ftp: loaded support on port[0] = 21 [ 1171.973760] IPVS: ftp: loaded support on port[0] = 21 [ 1172.020374] IPVS: ftp: loaded support on port[0] = 21 [ 1172.986770] device bridge_slave_1 left promiscuous mode [ 1172.992697] bridge0: port 2(bridge_slave_1) entered disabled state [ 1173.018813] device bridge_slave_0 left promiscuous mode [ 1173.024629] bridge0: port 1(bridge_slave_0) entered disabled state [ 1173.048723] device bridge_slave_1 left promiscuous mode [ 1173.054492] bridge0: port 2(bridge_slave_1) entered disabled state [ 1173.072509] device bridge_slave_0 left promiscuous mode [ 1173.078247] bridge0: port 1(bridge_slave_0) entered disabled state [ 1173.090764] device bridge_slave_1 left promiscuous mode [ 1173.096544] bridge0: port 2(bridge_slave_1) entered disabled state [ 1173.108983] device bridge_slave_0 left promiscuous mode [ 1173.114664] bridge0: port 1(bridge_slave_0) entered disabled state [ 1173.127611] device bridge_slave_1 left promiscuous mode [ 1173.133343] bridge0: port 2(bridge_slave_1) entered disabled state [ 1173.146949] device bridge_slave_0 left promiscuous mode [ 1173.152619] bridge0: port 1(bridge_slave_0) entered disabled state [ 1173.252375] team0 (unregistering): Port device team_slave_1 removed [ 1173.262717] team0 (unregistering): Port device team_slave_0 removed [ 1173.273012] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1173.384181] IPVS: ftp: loaded support on port[0] = 21 [ 1173.389601] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1173.412931] bond0 (unregistering): Released all slaves [ 1173.433770] team0 (unregistering): Port device team_slave_1 removed [ 1173.443188] team0 (unregistering): Port device team_slave_0 removed [ 1173.452586] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1173.470920] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1173.496337] bond0 (unregistering): Released all slaves [ 1173.517567] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1173.532981] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1173.555322] bond0 (unregistering): Released all slaves [ 1173.572842] team0 (unregistering): Port device team_slave_1 removed [ 1173.582382] team0 (unregistering): Port device team_slave_0 removed [ 1173.592036] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1173.605976] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1173.628754] bond0 (unregistering): Released all slaves [ 1174.689925] syz-executor1: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1174.701724] syz-executor1 cpuset=/ mems_allowed=0 [ 1174.706760] CPU: 0 PID: 1889 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 1174.713536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1174.722917] Call Trace: [ 1174.725558] dump_stack+0x185/0x1d0 [ 1174.729230] warn_alloc+0x430/0x690 [ 1174.732906] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1174.737789] ? __msan_poison_alloca+0x15c/0x1d0 [ 1174.742508] copy_process+0x778/0x9be0 [ 1174.746429] ? __msan_poison_alloca+0x141/0x1d0 [ 1174.751162] _do_fork+0x353/0xf60 [ 1174.754654] __x64_sys_clone+0x15e/0x1b0 [ 1174.758729] ? __ia32_sys_vfork+0x70/0x70 [ 1174.762907] do_syscall_64+0x15b/0x230 [ 1174.766811] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1174.772000] RIP: 0033:0x41f8b9 [ 1174.775194] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1174.782909] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1174.790184] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1174.797464] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 000000000000002c [ 1174.804736] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe68 [ 1174.812004] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1174.819474] warn_alloc_show_mem: 1 callbacks suppressed [ 1174.819480] Mem-Info: [ 1174.827406] active_anon:120053 inactive_anon:74 isolated_anon:0 [ 1174.827406] active_file:3413 inactive_file:3391 isolated_file:96 [ 1174.827406] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1174.827406] slab_reclaimable:3240 slab_unreclaimable:7380 [ 1174.827406] mapped:42912 shmem:81 pagetables:929 bounce:0 [ 1174.827406] free:20218 free_pcp:269 free_cma:0 [ 1174.860565] Node 0 active_anon:480212kB inactive_anon:296kB active_file:13500kB inactive_file:13564kB unevictable:0kB isolated(anon):0kB isolated(file):256kB mapped:171648kB dirty:0kB writeback:0kB shmem:324kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 237568kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1174.888797] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1174.915154] lowmem_reserve[]: 0 2817 7244 7244 [ 1174.919849] Node 0 DMA32 free:72180kB min:26224kB low:32780kB high:39336kB active_anon:223672kB inactive_anon:0kB active_file:784kB inactive_file:1304kB unevictable:0kB writepending:36kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:832kB pagetables:612kB bounce:0kB free_pcp:116kB local_pcp:28kB free_cma:0kB [ 1174.950002] lowmem_reserve[]: 0 0 4426 4426 [ 1174.954460] Node 0 Normal free:26852kB min:41208kB low:51508kB high:61808kB active_anon:256760kB inactive_anon:296kB active_file:12720kB inactive_file:12036kB unevictable:0kB writepending:48kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:3104kB bounce:0kB free_pcp:636kB local_pcp:0kB free_cma:0kB [ 1174.983933] lowmem_reserve[]: 0 0 0 0 [ 1174.987846] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1175.001324] Node 0 DMA32: 408*4kB (UM) 2289*8kB (UME) 1943*16kB (UME) 150*32kB (UM) 37*64kB (UME) 14*128kB (UME) 7*256kB (UME) 1*512kB (M) 1*1024kB (E) 2*2048kB (MH) 0*4096kB = 67416kB [ 1175.018223] Node 0 Normal: 617*4kB (UME) 150*8kB (UME) 132*16kB (UME) 145*32kB (UME) 403*64kB (UMH) 28*128kB (UMH) 33*256kB (UMH) 9*512kB (UMH) 4*1024kB (UH) 0*2048kB 0*4096kB = 56948kB [ 1175.035210] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1175.043847] 6555 total pagecache pages [ 1175.047787] 0 pages in swap cache [ 1175.051287] Swap cache stats: add 0, delete 0, find 0/0 [ 1175.056690] Free swap = 0kB [ 1175.059745] Total swap = 0kB [ 1175.062800] 1965969 pages RAM [ 1175.065943] 0 pages HighMem/MovableOnly [ 1175.069956] 106316 pages reserved [ 1175.265770] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1175.277305] syz-executor0 cpuset=/ mems_allowed=0 [ 1175.282304] CPU: 1 PID: 1887 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 1175.289079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1175.298461] Call Trace: [ 1175.301110] dump_stack+0x185/0x1d0 [ 1175.304783] warn_alloc+0x430/0x690 [ 1175.308476] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1175.313396] ? __msan_poison_alloca+0x15c/0x1d0 [ 1175.318160] copy_process+0x778/0x9be0 [ 1175.322096] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1175.327189] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1175.332587] ? do_signal+0x49f/0x1d20 [ 1175.336440] ? __msan_poison_alloca+0x141/0x1d0 [ 1175.341172] _do_fork+0x353/0xf60 [ 1175.344699] __x64_sys_clone+0x15e/0x1b0 [ 1175.348793] ? __ia32_sys_vfork+0x70/0x70 [ 1175.352967] do_syscall_64+0x15b/0x230 [ 1175.356895] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1175.362107] RIP: 0033:0x41f8b9 [ 1175.365314] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1175.373061] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1175.380356] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1175.387783] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000043 [ 1175.395171] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 1175.402463] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1175.596978] syz-executor6 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 1175.611350] syz-executor6 cpuset=/ mems_allowed=0 [ 1175.616334] CPU: 0 PID: 1987 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1175.623108] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1175.632490] Call Trace: [ 1175.635131] dump_stack+0x185/0x1d0 [ 1175.638786] dump_header+0x2cc/0x16f0 [ 1175.642597] ? __msan_poison_alloca+0x15c/0x1d0 [ 1175.647292] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1175.652777] ? ___ratelimit+0x67f/0x760 [ 1175.656775] oom_kill_process+0x341/0x2160 [ 1175.661023] ? oom_evaluate_task+0x84a/0xb60 [ 1175.665463] out_of_memory+0x1700/0x1da0 [ 1175.669536] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1175.674234] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1175.679150] alloc_pages_current+0x6b1/0x970 [ 1175.683587] __vmalloc_node_range+0x83c/0x1170 [ 1175.688200] vmalloc_user+0xe1/0x3d0 [ 1175.691934] ? kcov_mmap+0x2a/0x120 [ 1175.695582] ? kcov_ioctl+0x1d0/0x1d0 [ 1175.699395] kcov_mmap+0x2a/0x120 [ 1175.702850] ? kcov_ioctl+0x1d0/0x1d0 [ 1175.706653] mmap_region+0x2751/0x3730 [ 1175.710569] do_mmap+0x1902/0x2010 [ 1175.714151] vm_mmap_pgoff+0x31b/0x430 [ 1175.718094] ksys_mmap_pgoff+0xa5a/0xaf0 [ 1175.722191] __x64_sys_mmap+0x1f1/0x260 [ 1175.726191] ? align_vdso_addr+0x420/0x420 [ 1175.730427] do_syscall_64+0x15b/0x230 [ 1175.734327] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1175.739515] RIP: 0033:0x455aea [ 1175.742703] RSP: 002b:00007fffded4f338 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1175.750421] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 1175.757690] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 1175.764960] RBP: 0000000000000010 R08: 0000000000000010 R09: 0000000000000000 [ 1175.772233] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 1175.779501] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 1175.786998] Mem-Info: [ 1175.789537] active_anon:120048 inactive_anon:74 isolated_anon:0 [ 1175.789537] active_file:608 inactive_file:608 isolated_file:37 [ 1175.789537] unevictable:0 dirty:0 writeback:0 unstable:0 [ 1175.789537] slab_reclaimable:3240 slab_unreclaimable:7378 [ 1175.789537] mapped:45232 shmem:81 pagetables:864 bounce:0 [ 1175.789537] free:24121 free_pcp:196 free_cma:0 [ 1175.822533] Node 0 active_anon:480192kB inactive_anon:296kB active_file:2432kB inactive_file:2432kB unevictable:0kB isolated(anon):0kB isolated(file):148kB mapped:180928kB dirty:0kB writeback:0kB shmem:324kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 237568kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1175.850627] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1175.876922] lowmem_reserve[]: 0 2817 7244 7244 [ 1175.881602] Node 0 DMA32 free:43408kB min:26224kB low:32780kB high:39336kB active_anon:223460kB inactive_anon:0kB active_file:256kB inactive_file:580kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:896kB pagetables:496kB bounce:0kB free_pcp:32kB local_pcp:4kB free_cma:0kB [ 1175.910156] lowmem_reserve[]: 0 0 4426 4426 [ 1175.914614] Node 0 Normal free:37676kB min:41208kB low:51508kB high:61808kB active_anon:256732kB inactive_anon:296kB active_file:2176kB inactive_file:1920kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7936kB pagetables:2960kB bounce:0kB free_pcp:304kB local_pcp:124kB free_cma:0kB [ 1175.944090] lowmem_reserve[]: 0 0 0 0 [ 1175.948021] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1175.961560] Node 0 DMA32: 509*4kB (UM) 2392*8kB (ME) 595*16kB (UME) 114*32kB (UM) 31*64kB (ME) 14*128kB (UME) 6*256kB (UME) 2*512kB (UM) 1*1024kB (E) 1*2048kB (H) 0*4096kB = 43748kB [ 1175.978214] Node 0 Normal: 1292*4kB (UME) 447*8kB (UME) 221*16kB (UME) 160*32kB (UME) 80*64kB (UMH) 27*128kB (UM) 17*256kB (UMH) 9*512kB (UMH) 4*1024kB (UH) 0*2048kB 0*4096kB = 39032kB [ 1175.995104] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1176.003771] 937 total pagecache pages [ 1176.007625] 0 pages in swap cache [ 1176.011148] Swap cache stats: add 0, delete 0, find 0/0 [ 1176.016591] Free swap = 0kB [ 1176.019650] Total swap = 0kB [ 1176.022730] 1965969 pages RAM [ 1176.025870] 0 pages HighMem/MovableOnly [ 1176.029904] 106316 pages reserved [ 1176.033402] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1176.042135] [ 2270] 0 2270 5476 289 94208 0 -1000 udevd [ 1176.050368] [ 4221] 0 4221 2493 573 53248 0 0 dhclient [ 1176.058880] [ 4360] 0 4360 14250 167 118784 0 0 rsyslogd [ 1176.067535] [ 4403] 0 4403 4725 48 86016 0 0 cron [ 1176.075703] [ 4430] 0 4430 12490 153 143360 0 -1000 sshd [ 1176.083859] [ 4454] 0 4454 3694 41 77824 0 0 getty [ 1176.092114] [ 4455] 0 4455 3694 40 69632 0 0 getty [ 1176.100567] [ 4456] 0 4456 3694 39 77824 0 0 getty [ 1176.108840] [ 4457] 0 4457 3694 41 73728 0 0 getty [ 1176.117096] [ 4458] 0 4458 3694 38 77824 0 0 getty [ 1176.125341] [ 4459] 0 4459 3694 39 73728 0 0 getty [ 1176.133562] [ 4460] 0 4460 3649 41 73728 0 0 getty [ 1176.141812] [ 4476] 0 4476 17821 214 188416 0 0 sshd [ 1176.149981] [ 4478] 0 4478 244271 118049 1576960 0 0 syz-fuzzer [ 1176.158663] [32533] 0 32533 5475 287 90112 0 -1000 udevd [ 1176.166876] [ 763] 0 763 5475 287 90112 0 -1000 udevd [ 1176.175304] [ 1873] 0 1873 17553 14 118784 0 0 syz-executor1 [ 1176.184421] [ 1874] 0 1874 17553 15 114688 0 0 syz-executor7 [ 1176.193688] [ 1875] 0 1875 17553 15 118784 0 0 syz-executor0 [ 1176.202791] [ 1887] 0 1887 17553 8055 118784 0 0 syz-executor0 [ 1176.211876] [ 1888] 0 1888 17553 8197 114688 0 0 syz-executor7 [ 1176.220985] [ 1889] 0 1889 17553 7991 118784 0 0 syz-executor1 [ 1176.229955] [ 1987] 0 1987 16017 17 102400 0 0 syz-executor6 [ 1176.239107] [ 1988] 0 1988 15505 17 102400 0 0 syz-executor5 [ 1176.248304] [ 1990] 0 1990 13457 16 86016 0 0 syz-executor2 [ 1176.257410] [ 1992] 0 1992 11921 18 73728 0 0 syz-executor4 [ 1176.266310] Out of memory: Kill process 4478 (syz-fuzzer) score 64 or sacrifice child [ 1176.274730] Killed process 1875 (syz-executor0) total-vm:70212kB, anon-rss:60kB, file-rss:0kB, shmem-rss:0kB [ 1176.715030] IPVS: ftp: loaded support on port[0] = 21 [ 1177.039511] IPVS: ftp: loaded support on port[0] = 21 [ 1177.093757] IPVS: ftp: loaded support on port[0] = 21 [ 1177.836274] bond0 (unregistering): Released all slaves [ 1179.953385] bridge0: port 1(bridge_slave_0) entered blocking state [ 1179.959856] bridge0: port 1(bridge_slave_0) entered disabled state [ 1180.012739] device bridge_slave_0 entered promiscuous mode [ 1180.078221] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1180.084431] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1180.175089] bridge0: port 2(bridge_slave_1) entered blocking state [ 1180.181598] bridge0: port 2(bridge_slave_1) entered disabled state [ 1180.236962] device bridge_slave_1 entered promiscuous mode [ 1180.423546] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1180.556611] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1180.606208] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1181.050196] syz-executor2: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1181.061622] syz-executor2 cpuset=/ mems_allowed=0 [ 1181.066647] CPU: 1 PID: 2008 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 1181.073428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1181.082807] Call Trace: [ 1181.085443] dump_stack+0x185/0x1d0 [ 1181.089117] warn_alloc+0x430/0x690 [ 1181.092803] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1181.097715] ? __msan_poison_alloca+0x15c/0x1d0 [ 1181.102481] copy_process+0x778/0x9be0 [ 1181.106400] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1181.111480] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1181.116873] ? do_signal+0x49f/0x1d20 [ 1181.120729] ? __msan_poison_alloca+0x141/0x1d0 [ 1181.125458] _do_fork+0x353/0xf60 [ 1181.128996] __x64_sys_clone+0x15e/0x1b0 [ 1181.133091] ? __ia32_sys_vfork+0x70/0x70 [ 1181.137267] do_syscall_64+0x15b/0x230 [ 1181.141217] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1181.146439] RIP: 0033:0x41f8b9 [ 1181.149644] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1181.157390] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1181.164683] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1181.171972] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000025 [ 1181.179419] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 1181.186712] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1181.194171] warn_alloc_show_mem: 1 callbacks suppressed [ 1181.194178] Mem-Info: [ 1181.202171] active_anon:120082 inactive_anon:74 isolated_anon:0 [ 1181.202171] active_file:2735 inactive_file:2742 isolated_file:60 [ 1181.202171] unevictable:0 dirty:19 writeback:0 unstable:0 [ 1181.202171] slab_reclaimable:3230 slab_unreclaimable:7123 [ 1181.202171] mapped:47734 shmem:81 pagetables:862 bounce:0 [ 1181.202171] free:21832 free_pcp:531 free_cma:0 [ 1181.235511] Node 0 active_anon:480328kB inactive_anon:296kB active_file:10240kB inactive_file:10064kB unevictable:0kB isolated(anon):0kB isolated(file):464kB mapped:189312kB dirty:76kB writeback:0kB shmem:324kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 237568kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1181.263813] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1181.290146] lowmem_reserve[]: 0 2817 7244 7244 [ 1181.294859] Node 0 DMA32 free:43560kB min:26224kB low:32780kB high:39336kB active_anon:223788kB inactive_anon:0kB active_file:2920kB inactive_file:1408kB unevictable:0kB writepending:0kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1024kB pagetables:584kB bounce:0kB free_pcp:892kB local_pcp:464kB free_cma:0kB [ 1181.324064] lowmem_reserve[]: 0 0 4426 4426 [ 1181.328511] Node 0 Normal free:34416kB min:41208kB low:51508kB high:61808kB active_anon:257056kB inactive_anon:296kB active_file:5112kB inactive_file:6308kB unevictable:0kB writepending:76kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8000kB pagetables:2864kB bounce:0kB free_pcp:1232kB local_pcp:588kB free_cma:0kB [ 1181.358123] lowmem_reserve[]: 0 0 0 0 [ 1181.362070] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1181.375541] Node 0 DMA32: 410*4kB (UM) 1927*8kB (UME) 592*16kB (UME) 111*32kB (UM) 31*64kB (ME) 43*128kB (UME) 7*256kB (UME) 2*512kB (UM) 1*1024kB (E) 1*2048kB (H) 0*4096kB = 43456kB [ 1181.392261] Node 0 Normal: 317*4kB (UME) 153*8kB (UME) 90*16kB (UMEH) 73*32kB (MEH) 44*64kB (MH) 57*128kB (UMH) 28*256kB (UM) 10*512kB (UMH) 8*1024kB (UMH) 0*2048kB 0*4096kB = 36860kB [ 1181.409092] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1181.417741] 2902 total pagecache pages [ 1181.421700] 0 pages in swap cache [ 1181.425216] Swap cache stats: add 0, delete 0, find 0/0 [ 1181.430636] Free swap = 0kB [ 1181.433720] Total swap = 0kB [ 1181.436793] 1965969 pages RAM [ 1181.439951] 0 pages HighMem/MovableOnly [ 1181.443986] 106316 pages reserved [ 1181.448138] syz-executor4: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1181.459513] syz-executor4 cpuset=/ mems_allowed=0 [ 1181.464485] CPU: 0 PID: 2009 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 1181.471252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1181.480624] Call Trace: [ 1181.483261] dump_stack+0x185/0x1d0 [ 1181.486931] warn_alloc+0x430/0x690 [ 1181.490631] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1181.495545] ? __msan_poison_alloca+0x15c/0x1d0 [ 1181.500302] copy_process+0x778/0x9be0 [ 1181.504235] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1181.509725] ? ptep_set_access_flags+0x10e/0x1d0 [ 1181.514520] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1181.520028] ? __msan_poison_alloca+0x141/0x1d0 [ 1181.524758] _do_fork+0x353/0xf60 [ 1181.525604] kthreadd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1181.528275] __x64_sys_clone+0x15e/0x1b0 [ 1181.528310] ? __ia32_sys_vfork+0x70/0x70 [ 1181.539171] kthreadd cpuset= [ 1181.543207] do_syscall_64+0x15b/0x230 [ 1181.543250] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1181.543279] RIP: 0033:0x41f8b9 [ 1181.547434] / [ 1181.550419] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 [ 1181.554342] mems_allowed=0 [ 1181.559470] ORIG_RAX: 0000000000000038 [ 1181.559489] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1181.559506] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1181.559531] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 000000000000001a [ 1181.598408] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe98 [ 1181.605683] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1181.612984] CPU: 1 PID: 2 Comm: kthreadd Not tainted 4.17.0+ #9 [ 1181.619072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1181.628425] Call Trace: [ 1181.631046] dump_stack+0x185/0x1d0 [ 1181.634692] warn_alloc+0x430/0x690 [ 1181.638349] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1181.643219] ? __msan_poison_alloca+0x15c/0x1d0 [ 1181.647924] copy_process+0x778/0x9be0 [ 1181.651825] ? __list_add_valid+0xb8/0x450 [ 1181.656131] ? pick_next_task_fair+0x22c9/0x2530 [ 1181.660894] ? kthread_blkcg+0xf0/0xf0 [ 1181.664786] ? __msan_poison_alloca+0x140/0x1d0 [ 1181.669465] _do_fork+0x353/0xf60 [ 1181.672935] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1181.678315] ? balance_callback+0x48/0x260 [ 1181.682572] ? kthread_blkcg+0xf0/0xf0 [ 1181.686470] kernel_thread+0xc6/0xe0 [ 1181.690189] ? kthread_blkcg+0xf0/0xf0 [ 1181.694081] kthreadd+0x5df/0x940 [ 1181.697541] ? kthread_stop+0x680/0x680 [ 1181.701521] ret_from_fork+0x35/0x40 [ 1181.706231] BUG: unable to handle kernel NULL pointer dereference at 00000000000008cc [ 1181.714213] PGD 0 P4D 0 [ 1181.716893] Oops: 0002 [#1] SMP PTI [ 1181.720515] Dumping ftrace buffer: [ 1181.724046] (ftrace buffer empty) [ 1181.727746] Modules linked in: [ 1181.730937] CPU: 1 PID: 30617 Comm: kworker/1:3 Not tainted 4.17.0+ #9 [ 1181.737593] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1181.746975] RIP: 0010:memset_erms+0x9/0x10 [ 1181.751208] RSP: 0018:ffff880192a4fa50 EFLAGS: 00010046 [ 1181.756570] RAX: 0000000000000000 RBX: ffff8800a68157c0 RCX: 0000000000000fb0 [ 1181.763834] RDX: 0000000000000fb0 RSI: 0000000000000000 RDI: 00000000000008cc [ 1181.771102] RBP: ffff880192a4fa80 R08: 0000000000000000 R09: 00000000000008cc [ 1181.778369] R10: 0000000000000000 R11: ffffffff813553c0 R12: ffff8800a6816098 [ 1181.785634] R13: 0000000000000000 R14: 0000000000000282 R15: fffffffffffffff4 [ 1181.792937] FS: 0000000000000000(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 1181.801160] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1181.807039] CR2: 00000000000000b0 CR3: 000000000ac30000 CR4: 00000000001406e0 [ 1181.814310] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1181.821576] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1181.828837] Call Trace: [ 1181.831430] ? kmsan_thread_create+0x56/0xb0 [ 1181.835845] __kthread_create_on_node+0x6ba/0x7b0 [ 1181.840701] kthread_create_on_node+0x243/0x270 [ 1181.845376] ? process_one_work+0x1fa0/0x1fa0 [ 1181.849879] create_worker+0x7c6/0x1000 [ 1181.853859] worker_thread+0x876/0x24f0 [ 1181.857842] ? __schedule+0x67e/0x770 [ 1181.861655] kthread+0x4db/0x6c0 [ 1181.865023] ? process_one_work+0x1fa0/0x1fa0 [ 1181.869524] ? kthread_blkcg+0xf0/0xf0 [ 1181.873417] ret_from_fork+0x35/0x40 [ 1181.877126] Code: 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 [ 1181.896342] RIP: memset_erms+0x9/0x10 RSP: ffff880192a4fa50 [ 1181.902085] CR2: 00000000000008cc [ 1181.905544] ---[ end trace a221e1f7661383bb ]--- [ 1181.910293] Kernel panic - not syncing: Fatal exception [ 1181.916126] Dumping ftrace buffer: [ 1181.919646] (ftrace buffer empty) [ 1181.923341] Kernel Offset: disabled [ 1181.926944] Rebooting in 86400 seconds..