[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 31.021578] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 34.704704] random: sshd: uninitialized urandom read (32 bytes read) [ 35.246287] random: sshd: uninitialized urandom read (32 bytes read) [ 36.587764] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.50' (ECDSA) to the list of known hosts. [ 42.181233] random: sshd: uninitialized urandom read (32 bytes read) 2018/06/22 22:33:46 fuzzer started [ 43.626534] random: cc1: uninitialized urandom read (8 bytes read) 2018/06/22 22:33:48 dialing manager at 10.128.0.26:37905 2018/06/22 22:33:56 syscalls: 1518 2018/06/22 22:33:56 code coverage: enabled 2018/06/22 22:33:56 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: errno 524 2018/06/22 22:33:56 setuid sandbox: enabled 2018/06/22 22:33:56 namespace sandbox: enabled 2018/06/22 22:33:56 fault injection: enabled 2018/06/22 22:33:56 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/06/22 22:33:56 net packed injection: enabled 22:34:08 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 65.821849] IPVS: ftp: loaded support on port[0] = 21 [ 65.862503] IPVS: ftp: loaded support on port[0] = 21 [ 65.881551] IPVS: ftp: loaded support on port[0] = 21 [ 65.896290] IPVS: ftp: loaded support on port[0] = 21 [ 65.923656] IPVS: ftp: loaded support on port[0] = 21 [ 65.946416] IPVS: ftp: loaded support on port[0] = 21 [ 65.954186] IPVS: ftp: loaded support on port[0] = 21 [ 65.976860] IPVS: ftp: loaded support on port[0] = 21 [ 67.954825] ip (4679) used greatest stack depth: 54536 bytes left [ 68.709900] ip (4738) used greatest stack depth: 54344 bytes left [ 68.973162] ip (4763) used greatest stack depth: 54328 bytes left [ 69.375739] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.382296] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.435196] device bridge_slave_0 entered promiscuous mode [ 69.573524] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.583277] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.637152] device bridge_slave_1 entered promiscuous mode [ 69.656386] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.662893] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.678010] device bridge_slave_0 entered promiscuous mode [ 69.695114] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.701673] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.710726] device bridge_slave_0 entered promiscuous mode [ 69.719436] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.725899] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.740660] device bridge_slave_0 entered promiscuous mode [ 69.758173] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.764711] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.782510] device bridge_slave_0 entered promiscuous mode [ 69.791325] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.798311] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.807563] device bridge_slave_0 entered promiscuous mode [ 69.818277] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.824757] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.844231] device bridge_slave_0 entered promiscuous mode [ 69.865990] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 69.874451] bridge0: port 1(bridge_slave_0) entered blocking state [ 69.881105] bridge0: port 1(bridge_slave_0) entered disabled state [ 69.905537] device bridge_slave_0 entered promiscuous mode [ 69.922819] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.929350] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.942183] device bridge_slave_1 entered promiscuous mode [ 69.951996] bridge0: port 2(bridge_slave_1) entered blocking state [ 69.958489] bridge0: port 2(bridge_slave_1) entered disabled state [ 69.984448] device bridge_slave_1 entered promiscuous mode [ 69.996865] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.003438] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.011639] device bridge_slave_1 entered promiscuous mode [ 70.026161] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.032750] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.059657] device bridge_slave_1 entered promiscuous mode [ 70.075351] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.081883] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.091964] device bridge_slave_1 entered promiscuous mode [ 70.098906] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.106570] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.113152] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.135597] device bridge_slave_1 entered promiscuous mode [ 70.153683] bridge0: port 2(bridge_slave_1) entered blocking state [ 70.160219] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.190111] device bridge_slave_1 entered promiscuous mode [ 70.210215] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.227309] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.239851] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.248449] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.296743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.327568] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.396646] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 70.411837] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.422110] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.449241] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.482839] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.505325] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.552408] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.605206] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 70.720850] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 70.985028] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 71.050186] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.087147] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.100871] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.120759] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.193977] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 71.204770] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.232262] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.246561] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.257640] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 71.275931] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 71.294538] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 71.312747] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 71.379837] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 71.488303] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 71.508679] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 71.522172] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 71.531987] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 71.539016] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.611494] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 71.618561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.699579] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 71.706784] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.722626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 71.732196] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.749462] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 71.757912] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 71.768564] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.796937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.821883] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 71.831657] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 71.840602] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.870750] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 71.912241] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 71.947012] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 71.974528] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 71.984261] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 71.991785] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.029931] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.097215] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 72.104654] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 72.119104] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 72.141974] team0: Port device team_slave_0 added [ 72.361602] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 72.387975] team0: Port device team_slave_1 added [ 72.402768] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 72.413864] team0: Port device team_slave_0 added [ 72.441354] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 72.465821] team0: Port device team_slave_0 added [ 72.475767] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 72.501697] team0: Port device team_slave_0 added [ 72.545968] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 72.562123] team0: Port device team_slave_0 added [ 72.588160] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 72.612554] team0: Port device team_slave_1 added [ 72.630397] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 72.637455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.661236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.706642] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 72.721144] team0: Port device team_slave_0 added [ 72.738575] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 72.752623] team0: Port device team_slave_1 added [ 72.764606] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 72.776289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 72.791759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 72.817615] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 72.831794] team0: Port device team_slave_1 added [ 72.846895] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 72.863941] team0: Port device team_slave_1 added [ 72.879086] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 72.886721] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 72.902569] team0: Port device team_slave_0 added [ 72.918956] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 72.931892] team0: Port device team_slave_0 added [ 72.948589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 72.968448] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 72.995457] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.018608] team0: Port device team_slave_1 added [ 73.026220] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.033191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.046883] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.065625] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 73.081368] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.098367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.122499] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.134589] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.147920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.157904] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 73.166710] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.175692] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.192904] team0: Port device team_slave_1 added [ 73.217966] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 73.235379] team0: Port device team_slave_1 added [ 73.252966] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.261891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 73.275880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.286864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.304282] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.321385] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.332341] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.344221] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 73.354308] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.363354] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 73.374749] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 73.390656] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 73.400229] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 73.407580] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 73.426396] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.439917] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.469326] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.497717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 73.507355] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.517919] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 73.527842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 73.537920] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.550022] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 73.570420] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.578465] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 73.591377] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 73.602777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.610899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.625144] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 73.636171] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 73.644946] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 73.654871] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 73.663441] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.705570] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.742752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 73.773775] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 73.795235] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.804768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 73.812747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.821279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.833277] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 73.851772] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 73.861360] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.879303] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.888288] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 73.896930] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 73.908424] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 73.922262] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 73.932159] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 73.946974] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 73.960800] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 73.968945] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 73.987625] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.021915] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.051224] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.082540] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 74.090480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 74.103413] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 74.118019] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.129503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.147539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.173120] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.198962] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.212289] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.234394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.272766] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.312419] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.381098] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 74.388820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 74.402618] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 74.442233] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.457127] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.501380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 74.625599] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 74.633344] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 74.651498] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 75.887675] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.894176] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.901068] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.907502] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.982843] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 75.989438] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.249287] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.255776] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.262631] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.269095] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.344996] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 76.362535] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.369001] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.375839] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.382266] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.416254] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 76.454569] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.461128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.467956] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.474401] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.517946] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 76.530487] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.536972] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.543822] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.550254] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.568970] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 76.725579] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.732108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.738921] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.745373] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.756646] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 76.788790] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.795332] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.802214] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.808658] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.821421] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 77.024444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.041890] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.061446] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.080637] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.089683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.097975] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 77.339395] bridge0: port 2(bridge_slave_1) entered blocking state [ 77.345976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 77.352841] bridge0: port 1(bridge_slave_0) entered blocking state [ 77.359296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 77.433197] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 78.050193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.798568] ip (5873) used greatest stack depth: 54096 bytes left [ 84.733523] 8021q: adding VLAN 0 to HW filter on device bond0 [ 84.853556] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.005274] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.058105] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.098451] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.334685] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.365658] 8021q: adding VLAN 0 to HW filter on device bond0 [ 85.611363] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 85.681583] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 85.760175] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 85.821830] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 85.874659] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 85.981352] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.110016] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.158259] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.413860] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 86.420264] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.431897] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.477741] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 86.486388] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.502323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.628896] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 86.635311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.650411] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.683921] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 86.691896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.705699] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.716207] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 86.727380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.748345] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 86.768969] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 86.980267] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 86.986665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 86.996885] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.027859] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.041173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.076279] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.318461] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.375395] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.399579] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.550736] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.611359] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.658011] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 87.664440] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 87.677102] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 87.812484] 8021q: adding VLAN 0 to HW filter on device team0 [ 87.844721] 8021q: adding VLAN 0 to HW filter on device team0 [ 88.419553] 8021q: adding VLAN 0 to HW filter on device team0 22:34:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:38 executing program 0: socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x50220}]}) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:38 executing program 5: arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:38 executing program 0: socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x50220}]}) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:38 executing program 5: arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:38 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:38 executing program 0: socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:38 executing program 5: arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x50220}]}) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:38 executing program 6: getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:38 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:38 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:38 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:38 executing program 6: getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:38 executing program 1: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:39 executing program 7: getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:39 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:39 executing program 4: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:39 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:39 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:39 executing program 6: getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:39 executing program 3: socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:39 executing program 4: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:39 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:39 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:39 executing program 7: getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:39 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:39 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:39 executing program 3: socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:39 executing program 4: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:39 executing program 7: getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:39 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:39 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:39 executing program 3: socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:39 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:40 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:40 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:40 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:40 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:40 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:40 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000180)}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 97.421154] audit: type=1326 audit(1529706881.418:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7013 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') [ 97.652706] audit: type=1326 audit(1529706881.651:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7036 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) [ 97.750176] audit: type=1326 audit(1529706881.694:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7042 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 97.770035] audit: type=1326 audit(1529706881.709:6): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7044 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 97.894564] audit: type=1326 audit(1529706881.792:7): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7048 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) [ 98.298393] audit: type=1326 audit(1529706882.297:8): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7060 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) [ 98.350228] audit: type=1326 audit(1529706882.348:9): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7066 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 98.425108] audit: type=1326 audit(1529706882.423:10): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7071 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 98.453206] audit: type=1326 audit(1529706882.450:11): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7072 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:42 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) [ 98.625861] audit: type=1326 audit(1529706882.624:12): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7080 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffff9c, &(0x7f0000004440), 0x8, 0x0) 22:34:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:43 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bridge\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) 22:34:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 22:34:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 22:34:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') 22:34:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(0xffffffffffffffff, 0x127d, &(0x7f0000000280)) 22:34:44 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d1}]}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, &(0x7f0000000080)) 22:34:44 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d1}]}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) seccomp(0x0, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000000c0)}) 22:34:44 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d1}]}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:44 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:44 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d1}]}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:44 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:44 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:44 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:45 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:45 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:45 executing program 5: arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:45 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:45 executing program 5: arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:45 executing program 5: arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:45 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d1}]}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:45 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d1}]}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:46 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d1}]}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:46 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:46 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:46 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:46 executing program 6: getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:46 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:46 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:46 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:46 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:46 executing program 6: getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:46 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:46 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:46 executing program 1: socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:46 executing program 0: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:46 executing program 6: getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:46 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:47 executing program 0: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:47 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:47 executing program 1: socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:47 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d1}]}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:47 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:47 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:47 executing program 0: ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:47 executing program 1: socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:47 executing program 4: semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:47 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:47 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d1}]}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:47 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:47 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:47 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:47 executing program 4: semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:47 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:47 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:47 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:47 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d1}]}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:47 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:47 executing program 3: socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:47 executing program 4: semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:47 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:47 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:47 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:48 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:48 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) [ 104.144526] kauditd_printk_skb: 14 callbacks suppressed [ 104.144548] audit: type=1326 audit(1529706888.143:27): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7457 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:48 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:48 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:48 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:48 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:48 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:48 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:49 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:49 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:49 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:49 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) [ 105.014152] random: crng init done 22:34:49 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50218}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) [ 105.114461] audit: type=1326 audit(1529706889.113:28): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7530 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:49 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:49 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50218}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:49 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:49 executing program 5: seccomp(0x8000000000001, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000240)) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140), 0x0) 22:34:49 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50218}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) [ 106.079411] audit: type=1326 audit(1529706890.078:29): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7579 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:50 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:50 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50341}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:50 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) [ 106.247542] audit: type=1326 audit(1529706890.241:30): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7591 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) [ 106.340812] audit: type=1326 audit(1529706890.321:31): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7598 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50341}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:50 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:50 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50341}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 107.023951] audit: type=1326 audit(1529706891.022:32): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7623 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:51 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) [ 107.148211] audit: type=1326 audit(1529706891.146:33): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7636 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:51 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) [ 107.268243] audit: type=1326 audit(1529706891.266:34): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7643 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) [ 107.333354] audit: type=1326 audit(1529706891.293:35): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7645 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 107.353108] audit: type=1326 audit(1529706891.304:36): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7650 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:51 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:52 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x4b3b, &(0x7f00000002c0)) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000400)=""/67, 0x43, 0x0, &(0x7f0000000480)={0x77359400}) 22:34:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) getpgrp(0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 22:34:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:52 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:52 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:52 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:52 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000100)) 22:34:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:53 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, @local}, &(0x7f0000000480)=0x10) 22:34:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) 22:34:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) [ 109.238524] kauditd_printk_skb: 11 callbacks suppressed [ 109.238548] audit: type=1326 audit(1529706893.237:48): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7745 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f0000001f80)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 22:34:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000000040)=""/23) 22:34:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) [ 109.420676] audit: type=1326 audit(1529706893.419:49): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7755 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) [ 109.482253] audit: type=1326 audit(1529706893.480:50): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7762 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) [ 110.166205] audit: type=1326 audit(1529706894.164:51): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7800 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) getrusage(0x0, &(0x7f00000001c0)) 22:34:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:54 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) getrusage(0x0, &(0x7f00000001c0)) 22:34:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:55 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:55 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) getrusage(0x0, &(0x7f00000001c0)) [ 111.166000] audit: type=1326 audit(1529706895.164:52): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7870 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:55 executing program 6: syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:55 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) flock(0xffffffffffffffff, 0x0) 22:34:55 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:55 executing program 6: syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) 22:34:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:56 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:56 executing program 6: syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) flock(0xffffffffffffffff, 0x0) 22:34:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:56 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) [ 112.158495] audit: type=1326 audit(1529706896.157:53): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=7919 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) flock(0xffffffffffffffff, 0x0) 22:34:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:56 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:57 executing program 2: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:57 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:57 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:57 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:34:57 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:57 executing program 2: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:57 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:57 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:34:57 executing program 2: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:57 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:57 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:57 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:57 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:34:57 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:57 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:57 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:57 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:57 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:58 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:34:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:58 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:58 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:58 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) clock_getres(0x0, &(0x7f00000002c0)) 22:34:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:58 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) clock_getres(0x0, &(0x7f00000002c0)) 22:34:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:58 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 114.878263] audit: type=1326 audit(1529706898.876:54): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8125 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) [ 114.961260] audit: type=1326 audit(1529706898.903:55): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8129 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) clock_getres(0x0, &(0x7f00000002c0)) 22:34:59 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:34:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:34:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) 22:34:59 executing program 5: socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:34:59 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:34:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:34:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) [ 115.823951] audit: type=1326 audit(1529706899.822:56): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8188 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:34:59 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:34:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) [ 115.903034] audit: type=1326 audit(1529706899.862:57): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8194 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 115.922897] audit: type=1326 audit(1529706899.864:58): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8183 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:34:59 executing program 5: socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:34:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:35:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:35:00 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:35:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) [ 116.223418] audit: type=1326 audit(1529706900.222:59): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8221 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, &(0x7f00000001c0)) 22:35:00 executing program 5: socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:35:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:35:00 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:35:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:35:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:35:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') getrusage(0x0, &(0x7f00000001c0)) [ 116.825404] audit: type=1326 audit(1529706900.823:60): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8236 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:00 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:35:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:35:00 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:35:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) [ 116.911901] audit: type=1326 audit(1529706900.888:61): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8232 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 116.931765] audit: type=1326 audit(1529706900.888:62): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8243 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:01 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:35:01 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) [ 117.081464] audit: type=1326 audit(1529706900.992:63): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8249 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:01 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:35:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:35:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:35:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:35:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) flock(0xffffffffffffffff, 0x0) 22:35:01 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:35:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:35:01 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:35:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:35:02 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:35:02 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) clock_adjtime(0x0, &(0x7f0000000280)) 22:35:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:35:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:35:02 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:35:02 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 22:35:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 22:35:02 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:03 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) faccessat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) 22:35:03 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:03 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:03 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:03 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:35:03 executing program 6: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:03 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:03 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:03 executing program 6: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:04 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:04 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:04 executing program 6: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:04 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:04 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$nl_route(0x10, 0x3, 0x0) clock_getres(0x0, &(0x7f00000002c0)) 22:35:04 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:04 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:04 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) [ 120.674193] kauditd_printk_skb: 13 callbacks suppressed [ 120.674217] audit: type=1326 audit(1529706904.671:77): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8465 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:04 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:04 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:04 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:04 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:05 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:05 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/37, 0x25, 0x0, &(0x7f0000000340)=@abs, 0x6e) 22:35:05 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:05 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:05 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/37, 0x25, 0x0, &(0x7f0000000340)=@abs, 0x6e) 22:35:05 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:06 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:06 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) recvfrom$unix(0xffffffffffffffff, &(0x7f00000001c0)=""/37, 0x25, 0x0, &(0x7f0000000340)=@abs, 0x6e) 22:35:06 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:06 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:06 executing program 7: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:06 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:06 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:06 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:06 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:06 executing program 7: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:06 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:06 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:06 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:06 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) [ 122.841839] audit: type=1326 audit(1529706906.840:78): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8614 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:06 executing program 7: socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:07 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:07 executing program 4: syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:07 executing program 3: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) [ 123.173184] audit: type=1326 audit(1529706907.169:79): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8647 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:07 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:07 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) [ 123.797528] audit: type=1326 audit(1529706907.796:80): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8675 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:07 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:08 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) [ 124.190730] audit: type=1326 audit(1529706908.189:81): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8710 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:08 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:08 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:08 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, &(0x7f0000000180)={'syzkaller0\x00'}) 22:35:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) [ 124.749533] audit: type=1326 audit(1529706908.747:82): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8732 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) [ 124.879142] audit: type=1326 audit(1529706908.877:83): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8736 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000040)=0xc) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 22:35:09 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50346}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:09 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) [ 125.147829] audit: type=1326 audit(1529706909.146:84): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8763 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:09 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50346}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:09 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:09 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:09 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) [ 125.924252] audit: type=1326 audit(1529706909.922:85): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8792 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 125.959389] audit: type=1326 audit(1529706909.950:86): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8797 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50346}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) [ 126.276782] audit: type=1326 audit(1529706910.275:87): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8822 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) semop(0x0, &(0x7f0000000140), 0x0) 22:35:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:10 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 126.856743] audit: type=1326 audit(1529706910.855:88): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8848 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) [ 126.934372] audit: type=1326 audit(1529706910.918:89): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8851 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) [ 127.021355] audit: type=1326 audit(1529706910.962:90): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8858 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) [ 127.155308] audit: type=1326 audit(1529706911.153:91): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8870 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) [ 127.316725] audit: type=1326 audit(1529706911.315:92): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8883 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:11 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) 22:35:11 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) [ 127.999018] audit: type=1326 audit(1529706911.993:93): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8908 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:12 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:12 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) [ 128.109516] audit: type=1326 audit(1529706912.086:94): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=8909 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000000)) 22:35:12 executing program 6: accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:12 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:12 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:12 executing program 6: accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(0xffffffffffffffff, 0x4040534e, &(0x7f00000001c0)) 22:35:12 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:12 executing program 6: accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:12 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 22:35:13 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:13 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:13 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:13 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:13 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000000c0)) 22:35:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000000c0)) 22:35:13 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:13 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 22:35:13 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 22:35:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:14 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000000c0)) 22:35:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:14 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 22:35:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:14 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 22:35:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:15 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023b}]}) socket$can_raw(0x1d, 0x3, 0x1) 22:35:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023b}]}) socket$can_raw(0x1d, 0x3, 0x1) 22:35:15 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:15 executing program 1: add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023b}]}) socket$can_raw(0x1d, 0x3, 0x1) 22:35:15 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) [ 131.765419] kauditd_printk_skb: 7 callbacks suppressed [ 131.765443] audit: type=1326 audit(1529706915.764:102): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9138 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:15 executing program 1: add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:16 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:16 executing program 1: add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:16 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) [ 132.040737] audit: type=1326 audit(1529706916.033:103): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9161 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:16 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:16 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:16 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 22:35:16 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) [ 132.736642] audit: type=1326 audit(1529706916.735:104): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9206 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:16 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 22:35:16 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:16 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:16 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:16 executing program 7: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:17 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 133.018563] audit: type=1326 audit(1529706917.014:105): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9228 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:17 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 22:35:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000540)=""/168, &(0x7f0000000280)=0x1e4) 22:35:17 executing program 7: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:17 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:17 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:17 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 22:35:17 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 133.683801] audit: type=1326 audit(1529706917.682:106): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9244 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140), 0x10) 22:35:17 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:17 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:17 executing program 7: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:17 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 22:35:17 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) [ 134.002470] audit: type=1326 audit(1529706918.000:107): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9278 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:18 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:18 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:18 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:18 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 22:35:18 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:18 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:18 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:18 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50341}]}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:18 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) [ 134.937932] audit: type=1326 audit(1529706918.936:108): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9323 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:19 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 22:35:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50341}]}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:19 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50341}]}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:19 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:19 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 22:35:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:19 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:19 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) [ 135.856664] audit: type=1326 audit(1529706919.855:109): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9370 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 135.907712] audit: type=1326 audit(1529706919.906:110): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9377 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023b}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) 22:35:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:20 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:20 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) [ 136.263376] audit: type=1326 audit(1529706920.262:111): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9406 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:20 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:20 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@multicast1=0xe0000001, @multicast2=0xe0000002}, 0x8) 22:35:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:20 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:20 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) [ 136.835185] audit: type=1326 audit(1529706920.833:112): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9425 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) [ 136.924219] audit: type=1326 audit(1529706920.921:113): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9434 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:21 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:21 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:21 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) [ 137.326196] audit: type=1326 audit(1529706921.324:114): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9464 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:21 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) [ 137.766883] audit: type=1326 audit(1529706921.765:115): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9474 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key(&(0x7f0000000440)='trusted\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) bind$can_raw(0xffffffffffffffff, &(0x7f0000000180)={0x1d}, 0x10) 22:35:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) [ 137.877714] audit: type=1326 audit(1529706921.875:116): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9480 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:21 executing program 0: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) [ 137.923863] audit: type=1326 audit(1529706921.906:117): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9483 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 137.943643] audit: type=1326 audit(1529706921.920:118): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9488 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:22 executing program 0: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:22 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:22 executing program 0: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:22 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) [ 138.315342] audit: type=1326 audit(1529706922.314:119): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9514 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:22 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:22 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) [ 138.721491] audit: type=1326 audit(1529706922.720:120): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9529 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:22 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:22 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:22 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) [ 138.885120] audit: type=1326 audit(1529706922.876:121): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9536 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:22 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:23 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:23 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:23 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'vlan0\x00', @ifru_mtu}) 22:35:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:23 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) 22:35:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:23 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000140), &(0x7f0000000180)=0x8) 22:35:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:23 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:24 executing program 2: accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:24 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:24 executing program 2: accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:24 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:24 executing program 2: accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50341}]}) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x4) 22:35:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:25 executing program 1: syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:25 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:25 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:25 executing program 1: syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:26 executing program 3: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:26 executing program 1: syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000180)) 22:35:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:26 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:26 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) [ 142.690822] kauditd_printk_skb: 7 callbacks suppressed [ 142.690846] audit: type=1326 audit(1529706926.689:129): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9752 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:26 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) [ 142.773374] audit: type=1326 audit(1529706926.716:130): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9751 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000580), &(0x7f00000005c0), &(0x7f0000000640), 0x8) 22:35:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) [ 143.659702] audit: type=1326 audit(1529706927.658:131): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9799 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:27 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:27 executing program 5: accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000002c0)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:28 executing program 5: accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:28 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:28 executing program 4: accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') [ 144.577379] audit: type=1326 audit(1529706928.576:132): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9853 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:28 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:28 executing program 4: accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:28 executing program 5: accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:28 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:28 executing program 4: accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:29 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) 22:35:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:29 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) [ 145.538126] audit: type=1326 audit(1529706929.535:133): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9918 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) [ 145.610026] audit: type=1326 audit(1529706929.599:134): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9932 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) [ 145.787990] audit: type=1326 audit(1529706929.719:135): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9938 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000180)) [ 146.553370] audit: type=1326 audit(1529706930.551:136): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9970 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:30 executing program 6: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) [ 146.645326] audit: type=1326 audit(1529706930.592:137): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9983 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) [ 146.818858] audit: type=1326 audit(1529706930.800:138): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=9999 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:30 executing program 6: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000b00)) 22:35:31 executing program 6: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$EVIOCGBITSND(0xffffffffffffffff, 0x80404532, &(0x7f0000000240)=""/254) 22:35:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:31 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:31 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) [ 147.792620] kauditd_printk_skb: 1 callbacks suppressed [ 147.792644] audit: type=1326 audit(1529706931.791:140): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10051 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:31 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:31 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) [ 147.879481] audit: type=1326 audit(1529706931.833:141): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10058 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 148.016229] audit: type=1326 audit(1529706931.968:142): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10062 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:32 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:32 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) [ 148.486738] audit: type=1326 audit(1529706932.485:143): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10086 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:32 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f00000000c0)) 22:35:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') [ 148.801337] audit: type=1326 audit(1529706932.800:144): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10103 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:32 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f00000000c0)) 22:35:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) [ 149.053890] audit: type=1326 audit(1529706933.052:145): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10122 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:33 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f00000000c0)) 22:35:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) [ 149.536106] audit: type=1326 audit(1529706933.533:146): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10149 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) sched_setscheduler(0x0, 0x0, &(0x7f0000001240)) 22:35:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:33 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) [ 149.730473] audit: type=1326 audit(1529706933.729:147): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10160 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000180)=0x1c, 0x0) getsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000080), &(0x7f0000000100)=0x4) 22:35:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:33 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:33 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) [ 149.950861] audit: type=1326 audit(1529706933.949:148): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10170 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:34 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000080)=0x14) delete_module(&(0x7f00000000c0)='++vboxnet0mime_typebdev%vboxnet1:-\x00', 0x0) 22:35:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:34 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) [ 150.445755] audit: type=1326 audit(1529706934.444:149): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10192 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:34 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:35 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:35 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:35 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:36 executing program 3: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:36 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003500), 0x0, 0x0, 0x0) 22:35:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:36 executing program 1: dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:36 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:36 executing program 1: dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:36 executing program 1: dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:36 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f0000003780)='+vmnet0\x00') 22:35:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:37 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:37 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:37 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) [ 153.581130] kauditd_printk_skb: 6 callbacks suppressed [ 153.581152] audit: type=1326 audit(1529706937.577:156): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10386 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:37 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:37 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:37 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:37 executing program 5: arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:37 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:37 executing program 7: openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:37 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) [ 153.849208] audit: type=1326 audit(1529706937.847:157): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10407 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:38 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:38 executing program 5: arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:38 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) symlinkat(&(0x7f0000000200)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 22:35:38 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) 22:35:38 executing program 5: arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:38 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50219}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:38 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) [ 154.810871] audit: type=1326 audit(1529706938.809:158): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10454 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50219}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:39 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:39 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:39 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50219}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:39 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:39 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50239}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) [ 155.745577] audit: type=1326 audit(1529706939.744:159): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10505 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50219}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:39 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50239}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:40 executing program 6: arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:40 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50219}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:40 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50239}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:40 executing program 6: arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) [ 156.736543] audit: type=1326 audit(1529706940.735:160): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10569 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50219}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:40 executing program 6: arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:40 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50239}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) [ 157.007382] audit: type=1326 audit(1529706941.001:161): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10586 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:41 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 22:35:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50219}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:41 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50239}]}) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) [ 157.723741] audit: type=1326 audit(1529706941.722:162): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10615 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) [ 157.810237] audit: type=1326 audit(1529706941.801:163): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10622 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:41 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:41 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50239}]}) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:42 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) [ 157.988654] audit: type=1326 audit(1529706941.987:164): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10637 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 158.069271] audit: type=1326 audit(1529706942.055:165): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10643 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:42 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:42 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50239}]}) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:42 executing program 0: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) [ 158.770345] audit: type=1326 audit(1529706942.767:166): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10666 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:42 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) [ 158.880350] audit: type=1326 audit(1529706942.847:167): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10674 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) dup(0xffffffffffffffff) mq_open(&(0x7f00000001c0)='\x00', 0x0, 0x0, &(0x7f0000000200)) 22:35:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50219}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:43 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) [ 159.059402] audit: type=1326 audit(1529706943.058:168): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10687 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:43 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) [ 159.124922] audit: type=1326 audit(1529706943.104:169): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10699 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50219}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50219}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)="2f70726f5839e0531e05deef4c29343f632f7379732f6e65697076340c767317616d5f64726f707261746500000077c1d144cbaf7e2f5073d73d05ef62ce992dd2e2d1429d03f50abc1d9b8c878a8fd1ea", 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f00000000c0)={'ah\x00'}, &(0x7f0000000140)=0x1e) 22:35:43 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50239}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) [ 159.709161] audit: type=1326 audit(1529706943.707:170): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10725 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 159.796379] audit: type=1326 audit(1529706943.794:171): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10733 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/56) 22:35:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:44 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50239}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) [ 160.042156] audit: type=1326 audit(1529706944.040:172): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10742 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:44 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50239}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) [ 160.218583] audit: type=1326 audit(1529706944.217:173): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10759 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) [ 160.648105] audit: type=1326 audit(1529706944.645:174): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10777 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:44 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50219}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50219}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:45 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50239}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) [ 161.269885] audit: type=1326 audit(1529706945.266:175): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10820 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:45 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50239}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50219}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:45 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:45 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:45 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50239}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000340)=""/228) 22:35:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:46 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:46 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:46 executing program 1: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:46 executing program 1: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:47 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:47 executing program 1: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:47 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:47 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:47 executing program 5: arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) keyctl$clear(0x7, 0x0) 22:35:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) 22:35:47 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:47 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ce}]}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:48 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000300)={0x15, 0x110, 0xfa00, {0xffffffff, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1=0xe0000001}, @in6={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x118) 22:35:48 executing program 5: arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) keyctl$clear(0x7, 0x0) 22:35:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ce}]}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:48 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:48 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) [ 164.134474] kauditd_printk_skb: 6 callbacks suppressed [ 164.134494] audit: type=1326 audit(1529706948.133:182): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=10980 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:48 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ce}]}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:48 executing program 5: arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:48 executing program 7: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) keyctl$clear(0x7, 0x0) 22:35:48 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:48 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:48 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) [ 164.611538] audit: type=1326 audit(1529706948.608:183): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11007 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:49 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:49 executing program 7: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:49 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:49 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:49 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:49 executing program 7: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:49 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:49 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) [ 165.605923] audit: type=1326 audit(1529706949.604:184): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11077 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:49 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:49 executing program 6: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:49 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) [ 165.974339] audit: type=1326 audit(1529706949.973:185): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11105 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:50 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000140)) 22:35:50 executing program 6: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) [ 166.553222] audit: type=1326 audit(1529706950.551:186): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11116 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:50 executing program 6: perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) inotify_init1(0x0) 22:35:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:50 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:50 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) [ 167.041285] audit: type=1326 audit(1529706951.040:187): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11160 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) inotify_init1(0x0) 22:35:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:51 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:51 executing program 0: pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:51 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:51 executing program 0: pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:51 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) inotify_init1(0x0) 22:35:51 executing program 0: pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:51 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000480)={0x0, @in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, &(0x7f0000000540)=0x90) 22:35:51 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:51 executing program 2: arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) [ 167.989711] audit: type=1326 audit(1529706951.988:188): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11212 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) [ 168.053972] audit: type=1326 audit(1529706952.051:189): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11222 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:52 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:52 executing program 2: arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:52 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:52 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) [ 168.358175] audit: type=1326 audit(1529706952.356:190): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11248 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:52 executing program 2: arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:52 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:52 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) [ 168.949932] audit: type=1326 audit(1529706952.948:191): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11267 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:53 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:53 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:53 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) setgroups(0x0, &(0x7f0000000040)) 22:35:53 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) [ 169.171232] audit: type=1326 audit(1529706953.169:192): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11288 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:53 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:53 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5021a}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:53 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) setgroups(0x0, &(0x7f0000000040)) 22:35:53 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:53 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) [ 169.419007] audit: type=1326 audit(1529706953.416:193): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11307 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) [ 169.554659] audit: type=1326 audit(1529706953.553:194): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11315 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)) 22:35:53 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:53 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) setgroups(0x0, &(0x7f0000000040)) 22:35:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) [ 169.929325] audit: type=1326 audit(1529706953.928:195): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11335 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) [ 170.110258] audit: type=1326 audit(1529706954.108:196): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11343 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:54 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) keyctl$clear(0x7, 0x0) 22:35:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) [ 170.395932] audit: type=1326 audit(1529706954.394:197): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11365 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:54 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) [ 170.546816] audit: type=1326 audit(1529706954.545:198): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11372 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:54 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) [ 170.874582] audit: type=1326 audit(1529706954.873:199): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11382 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f00000002c0)={0x0, 0x0, 0x0, {0x0, 0x1c9c380}}) 22:35:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:55 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:55 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) [ 171.113250] audit: type=1326 audit(1529706955.109:200): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11403 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:55 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:55 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) [ 171.341665] audit: type=1326 audit(1529706955.340:201): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11414 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, &(0x7f0000000180), 0x0, 0x0) 22:35:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:55 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:55 executing program 1: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:55 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:56 executing program 1: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:56 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:56 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:56 executing program 1: syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:56 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:56 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:56 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:56 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:56 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f0000000080), 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f000000c080)={@mcast2={0xff, 0x2, [], 0x1}}) 22:35:56 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:56 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:56 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) inotify_init1(0x0) 22:35:57 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:57 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:57 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:57 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:57 executing program 4: syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:57 executing program 4: syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:57 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:57 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:58 executing program 4: syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:58 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:58 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:58 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:58 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:58 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:58 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) [ 174.360487] kauditd_printk_skb: 7 callbacks suppressed [ 174.360510] audit: type=1326 audit(1529706958.359:209): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11585 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:58 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) setgroups(0x0, &(0x7f0000000040)) 22:35:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:35:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x20006, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:35:58 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50222}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:35:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) [ 174.861170] audit: type=1326 audit(1529706958.859:210): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11615 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ce}]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) 22:35:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) [ 175.018991] audit: type=1326 audit(1529706959.017:211): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11626 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:59 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:35:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x20006, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:35:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:35:59 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50222}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:35:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ce}]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) [ 175.335646] audit: type=1326 audit(1529706959.334:212): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11647 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:35:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:35:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ce}]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x20006, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:35:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:35:59 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50222}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:35:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50240}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:35:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:35:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) tgkill(0x0, 0x0, 0x0) [ 175.937708] audit: type=1326 audit(1529706959.936:213): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11673 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) [ 176.081413] audit: type=1326 audit(1529706960.080:214): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11683 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:00 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000040)) 22:36:00 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50222}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x20006, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50240}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) tgkill(0x0, 0x0, 0x0) 22:36:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5000f}]}) setfsgid(0x0) [ 176.301739] audit: type=1326 audit(1529706960.299:215): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11700 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50240}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5000f}]}) setfsgid(0x0) 22:36:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) tgkill(0x0, 0x0, 0x0) 22:36:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x20006, 0x0, 0x0, 0x501d0}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:00 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50222}]}) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:00 executing program 7: arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:36:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x20006, 0x0, 0x0, 0x501d0}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50240}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) [ 176.887101] audit: type=1326 audit(1529706960.885:216): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11732 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000300)=""/4096, 0x1000) [ 176.997148] audit: type=1326 audit(1529706960.995:217): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11737 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x20006, 0x0, 0x0, 0x501d0}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5000f}]}) setfsgid(0x0) 22:36:01 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50222}]}) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:01 executing program 7: arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50240}]}) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:01 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:01 executing program 7: arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:01 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50240}]}) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:01 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50222}]}) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:01 executing program 6: arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(0xffffffffffffffff, 0x40405514, &(0x7f0000000080)) 22:36:01 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:01 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) [ 177.821543] audit: type=1326 audit(1529706961.820:218): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11783 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:01 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:01 executing program 6: arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50240}]}) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:01 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:01 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:02 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:02 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:02 executing program 3: syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:02 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:02 executing program 6: arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:02 executing program 0: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:02 executing program 3: syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:02 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x20006, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:02 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:02 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:02 executing program 3: syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:02 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:02 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50222}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:02 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x20006, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:02 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50240}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:03 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x20006, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:03 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50222}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:03 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50240}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:03 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50222}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:03 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50240}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:03 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:03 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:03 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:03 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:04 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:04 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:04 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) [ 180.344928] audit: type=1326 audit(1529706964.343:219): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=11982 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:04 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50222}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:04 executing program 5: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50240}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:04 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:04 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50222}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:04 executing program 5: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:04 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50240}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) [ 180.761480] audit: type=1326 audit(1529706964.760:220): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12019 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:05 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:05 executing program 5: socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:05 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50222}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x20006}]}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50240}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:05 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) [ 181.254440] audit: type=1326 audit(1529706965.252:221): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12035 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:05 executing program 4: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) [ 181.339040] audit: type=1326 audit(1529706965.296:222): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12041 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:05 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) [ 181.479244] audit: type=1326 audit(1529706965.477:223): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12057 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:05 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) [ 181.540438] audit: type=1326 audit(1529706965.513:224): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12062 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) [ 181.711384] audit: type=1326 audit(1529706965.709:225): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12073 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) tgkill(0x0, 0x0, 0x0) 22:36:06 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:06 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x20006}]}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) [ 182.234280] audit: type=1326 audit(1529706966.233:226): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12090 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:06 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) [ 182.355649] audit: type=1326 audit(1529706966.354:227): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12100 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:06 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) [ 182.555594] audit: type=1326 audit(1529706966.554:228): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12114 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000240)={0x1, &(0x7f0000000200)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) setfsgid(0x0) 22:36:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:07 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x20006}]}) arch_prctl(0x0, &(0x7f0000000140)) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000140)=""/134, 0x86, 0x0, 0x0, 0x0) 22:36:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:07 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00') 22:36:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080), 0x4) 22:36:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:08 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:09 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000040), 0x0) 22:36:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:09 executing program 7: syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) [ 185.354512] kauditd_printk_skb: 11 callbacks suppressed [ 185.354532] audit: type=1326 audit(1529706969.353:240): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12270 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:09 executing program 7: syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:09 executing program 2: prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000180), 0x4) 22:36:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) [ 185.746438] audit: type=1326 audit(1529706969.730:241): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12292 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) fsync(0xffffffffffffffff) 22:36:10 executing program 2: prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:10 executing program 7: syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 22:36:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:10 executing program 2: prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:10 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) fsync(0xffffffffffffffff) 22:36:10 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) [ 186.344891] audit: type=1326 audit(1529706970.343:242): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12317 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:10 executing program 6: creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:10 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) fsync(0xffffffffffffffff) 22:36:10 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:10 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:10 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:11 executing program 0: pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:11 executing program 6: creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:11 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:11 executing program 0: pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:11 executing program 6: creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:11 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:11 executing program 0: pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:11 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:11 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501ef}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:11 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:11 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:12 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501ef}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:12 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:12 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:12 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501ef}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:12 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:12 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:12 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:12 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:12 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) [ 188.640198] audit: type=1326 audit(1529706972.638:243): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12496 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:12 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50346}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:12 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:12 executing program 5: removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:12 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:13 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) [ 189.128310] audit: type=1326 audit(1529706973.127:244): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12535 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:13 executing program 5: removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ce}]}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:13 executing program 1: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:13 executing program 4: accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ce}]}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) [ 189.621189] audit: type=1326 audit(1529706973.619:245): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12563 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:13 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:13 executing program 4: accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:13 executing program 5: removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ce}]}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) [ 190.068281] audit: type=1326 audit(1529706974.064:246): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12595 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) openat$cgroup(0xffffffffffffffff, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) 22:36:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50346}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:14 executing program 4: accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:14 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:14 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) [ 190.568705] audit: type=1326 audit(1529706974.567:247): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12604 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50346}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:14 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:14 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:14 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) [ 190.616000] audit: type=1326 audit(1529706974.589:248): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12608 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 190.635989] audit: type=1326 audit(1529706974.599:249): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12612 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50346}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:14 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x0, 0x0) 22:36:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) [ 191.005117] audit: type=1326 audit(1529706975.003:250): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12640 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 191.029965] audit: type=1326 audit(1529706975.024:251): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12643 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:15 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) 22:36:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) [ 191.560858] audit: type=1326 audit(1529706975.557:252): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12651 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:15 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) [ 191.625280] audit: type=1326 audit(1529706975.597:253): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12655 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:15 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:15 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) [ 192.031623] audit: type=1326 audit(1529706976.030:254): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12695 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe2(&(0x7f00000001c0), 0x0) fsync(0xffffffffffffffff) 22:36:16 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:16 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000003580)='./file0\x00', 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000000c0)) [ 192.539154] audit: type=1326 audit(1529706976.537:255): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12708 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:16 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) [ 192.617491] audit: type=1326 audit(1529706976.575:256): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12714 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:16 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:16 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:16 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:17 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/4096) 22:36:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x7}}, 0x14}, 0x1}, 0x0) 22:36:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:17 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x7}}, 0x14}, 0x1}, 0x0) 22:36:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:17 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:17 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:18 executing program 2: creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)={0x14, 0x0, 0x0, 0x0, 0x0, {0x7}}, 0x14}, 0x1}, 0x0) 22:36:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f00000001c0)) 22:36:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:18 executing program 7: socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:18 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='security.capability\x00') setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@mcast1={0xff, 0x1, [], 0x1}}, 0x20) 22:36:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:18 executing program 7: socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:19 executing program 7: socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:19 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000001100)) sched_setscheduler(0x0, 0x0, &(0x7f00000010c0)) 22:36:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:19 executing program 6: open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:19 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) [ 195.887688] kauditd_printk_skb: 9 callbacks suppressed [ 195.887712] audit: type=1326 audit(1529706979.886:266): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12904 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:19 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) socket$unix(0x1, 0x0, 0x0) 22:36:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:19 executing program 6: open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:19 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501ef}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) socket$unix(0x1, 0x0, 0x0) 22:36:20 executing program 6: open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:20 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:20 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:20 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) socket$unix(0x1, 0x0, 0x0) 22:36:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501ef}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50341}]}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x501ef}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:20 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:20 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:20 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50341}]}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:21 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:21 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:21 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:21 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) [ 197.268814] audit: type=1326 audit(1529706981.267:267): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=12999 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50341}]}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:21 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:21 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:21 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:21 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50341}]}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:22 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:22 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:22 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50341}]}) eventfd2(0x0, 0x0) [ 198.248156] audit: type=1326 audit(1529706982.246:268): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13072 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:22 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:22 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50226}]}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50341}]}) eventfd2(0x0, 0x0) 22:36:22 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000180)=""/242) 22:36:23 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:23 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50341}]}) eventfd2(0x0, 0x0) 22:36:23 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:23 executing program 5: utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:23 executing program 1: getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) [ 199.198876] audit: type=1326 audit(1529706983.197:269): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13111 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:23 executing program 1: getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:23 executing program 5: utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) [ 199.298626] audit: type=1326 audit(1529706983.229:270): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13122 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:23 executing program 4: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:23 executing program 1: getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) [ 199.435333] audit: type=1326 audit(1529706983.375:271): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13132 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:24 executing program 5: utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:24 executing program 4: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:24 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) [ 200.196913] audit: type=1326 audit(1529706984.193:272): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13167 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:24 executing program 4: perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:24 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:24 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50341}]}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) [ 200.454251] audit: type=1326 audit(1529706984.452:273): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13187 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:24 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:24 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:25 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket(0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 22:36:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50341}]}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:25 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) [ 201.180528] audit: type=1326 audit(1529706985.179:274): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13232 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000200)) 22:36:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50341}]}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:25 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50235}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) [ 201.404905] audit: type=1326 audit(1529706985.403:275): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13242 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:25 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) [ 201.475449] audit: type=1326 audit(1529706985.440:276): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13253 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:26 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:26 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50218}]}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) [ 202.128577] audit: type=1326 audit(1529706986.126:277): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13271 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:26 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50218}]}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:26 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:26 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50218}]}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) [ 202.440444] audit: type=1326 audit(1529706986.439:278): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13302 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:26 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) [ 202.554588] audit: type=1326 audit(1529706986.553:279): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13308 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50341}]}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:27 executing program 2: fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) [ 203.062621] audit: type=1326 audit(1529706987.061:280): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13320 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50341}]}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:27 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in6=@remote}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000100)=0xe8) 22:36:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:27 executing program 2: fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50341}]}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) [ 203.386592] audit: type=1326 audit(1529706987.385:281): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13344 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:27 executing program 2: fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:27 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) [ 203.587517] audit: type=1326 audit(1529706987.585:282): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13362 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 203.623038] audit: type=1326 audit(1529706987.621:283): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13366 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socket$unix(0x1, 0x0, 0x0) 22:36:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:28 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:28 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:28 executing program 7: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:28 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) utime(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001040)={&(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380), 0x0, &(0x7f0000000f80)}, 0x0) 22:36:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:28 executing program 7: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:29 executing program 7: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:29 executing program 6: arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:29 executing program 6: arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:29 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) getpgrp(0xffffffffffffffff) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000180)) 22:36:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:29 executing program 6: arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:29 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 22:36:30 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:30 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:30 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:30 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) [ 206.921882] kauditd_printk_skb: 8 callbacks suppressed [ 206.921903] audit: type=1326 audit(1529706990.920:292): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13537 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:31 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:31 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) fstat(0xffffffffffffffff, &(0x7f0000000240)) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:31 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:31 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:31 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:31 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) [ 207.917294] audit: type=1326 audit(1529706991.915:293): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13615 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:31 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:32 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) [ 208.104592] audit: type=1326 audit(1529706992.103:294): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13627 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:32 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x5000f}]}) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:32 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:32 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:32 executing program 5: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:32 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x5000f}]}) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:32 executing program 5: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) [ 209.013158] audit: type=1326 audit(1529706993.011:295): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13666 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:33 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x5000f}]}) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) [ 209.181517] audit: type=1326 audit(1529706993.177:296): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13686 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:33 executing program 5: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:33 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:33 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:33 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) [ 209.962933] audit: type=1326 audit(1529706993.961:297): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13730 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@ipv4={[], [], @multicast2}, @in=@rand_addr}}, {{@in=@remote}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000240)={'lo\x00', {0x2}}) 22:36:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:34 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:34 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:34 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:34 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) [ 210.183934] audit: type=1326 audit(1529706994.182:298): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13749 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:34 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:34 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @rand_addr}, {0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x0, {0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 'bond_slave_1\x00'}) 22:36:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) socket$inet(0x2, 0x0, 0x0) 22:36:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) [ 210.914846] audit: type=1326 audit(1529706994.913:299): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13780 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:35 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:35 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) socket$inet(0x2, 0x0, 0x0) 22:36:35 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:35 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:35 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) socket$inet(0x2, 0x0, 0x0) [ 211.320929] audit: type=1326 audit(1529706995.319:300): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13808 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:35 executing program 2: openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:35 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:35 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x50216}]}) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:35 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:36 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:36 executing program 2: openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:36 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) [ 212.316895] audit: type=1326 audit(1529706996.315:301): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13872 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:36 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) [ 212.366659] audit: type=1326 audit(1529706996.336:302): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13880 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:36 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:36 executing program 2: openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) [ 212.519456] audit: type=1326 audit(1529706996.518:303): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13892 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:36 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:36 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000004240), 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000004380)={'filter\x00'}, &(0x7f0000004400)=0x78) 22:36:37 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:37 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50233}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:37 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) [ 213.285873] audit: type=1326 audit(1529706997.284:304): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13921 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:37 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) [ 213.350702] audit: type=1326 audit(1529706997.340:305): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13933 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:37 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:37 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) [ 213.468834] audit: type=1326 audit(1529706997.467:306): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13940 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:37 executing program 7: socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) [ 213.580310] audit: type=1326 audit(1529706997.498:307): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13943 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 213.600346] audit: type=1326 audit(1529706997.547:308): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13948 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:37 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000011c0)='./file0\x00', 0x0) 22:36:38 executing program 7: socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50216}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:38 executing program 7: socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) [ 214.243369] audit: type=1326 audit(1529706998.242:309): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=13981 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:38 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:38 executing program 6: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)) 22:36:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50216}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:38 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) [ 214.506555] audit: type=1326 audit(1529706998.505:310): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14000 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:38 executing program 6: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:38 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50216}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50216}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:39 executing program 6: dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:39 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:39 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:39 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'ip6gretap0\x00'}) 22:36:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50216}]}) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50216}]}) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:39 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x4000000000000006}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000005c0)={0x10}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=ANY=[]}, 0x1}, 0x0) 22:36:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x200005009c}]}) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000580)) 22:36:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50216}]}) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:39 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:40 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:40 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:40 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:40 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:40 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:40 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:40 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50216}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:41 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50216}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:41 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) [ 217.768705] kauditd_printk_skb: 6 callbacks suppressed [ 217.768724] audit: type=1326 audit(1529707001.767:317): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14214 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:41 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50216}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:41 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) [ 217.890909] audit: type=1326 audit(1529707001.883:318): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14218 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:42 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) [ 218.124207] audit: type=1326 audit(1529707002.122:319): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14238 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:42 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) 22:36:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) [ 218.760159] audit: type=1326 audit(1529707002.758:320): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14264 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:42 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) [ 218.960585] audit: type=1326 audit(1529707002.959:321): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14276 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:43 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6_udplite(0xa, 0x2, 0x88) clock_adjtime(0x0, &(0x7f0000000180)) 22:36:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50216}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:43 executing program 1: fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:43 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:43 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) [ 219.190123] audit: type=1326 audit(1529707003.188:322): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14294 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50216}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:43 executing program 1: fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:43 executing program 5: accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:43 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:43 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000080)) 22:36:43 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50216}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:43 executing program 1: fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) [ 219.965663] audit: type=1326 audit(1529707003.963:323): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14335 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:44 executing program 5: accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:44 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:44 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:44 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) [ 220.129707] audit: type=1326 audit(1529707004.128:324): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14349 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:44 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:44 executing program 5: accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:44 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:44 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:44 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:44 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ce}]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) [ 221.098480] audit: type=1326 audit(1529707005.097:325): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14397 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:45 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:45 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) [ 221.280184] audit: type=1326 audit(1529707005.278:326): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14419 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000580)=0x1c) 22:36:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ce}]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:46 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ce}]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ce}]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:46 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:47 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) 22:36:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:47 executing program 7: modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:47 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:47 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) [ 223.334671] kauditd_printk_skb: 2 callbacks suppressed [ 223.334696] audit: type=1326 audit(1529707007.333:329): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14521 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:47 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 223.440587] audit: type=1326 audit(1529707007.374:330): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14531 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:47 executing program 7: modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:47 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) [ 223.559163] audit: type=1326 audit(1529707007.557:331): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14544 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:47 executing program 6: pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) [ 223.638631] audit: type=1326 audit(1529707007.601:332): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14545 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:47 executing program 6: pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:47 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:48 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:48 executing program 7: modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:48 executing program 6: pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:48 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:48 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 224.332899] audit: type=1326 audit(1529707008.330:333): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14581 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:48 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) sched_getscheduler(0x0) 22:36:48 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) [ 224.682388] audit: type=1326 audit(1529707008.681:334): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14607 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) [ 224.739771] audit: type=1326 audit(1529707008.701:335): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14608 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:48 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) sched_getscheduler(0x0) 22:36:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) fsetxattr(0xffffffffffffffff, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f00000000c0)='/dev/ptmx\x00', 0xa, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 22:36:49 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:49 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) sched_getscheduler(0x0) [ 225.280844] audit: type=1326 audit(1529707009.279:336): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14642 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000180)=0x1c, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000080)='/dev/md0\x00', 0x0, 0x0) 22:36:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000002c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 22:36:49 executing program 3: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) [ 225.629077] audit: type=1326 audit(1529707009.627:337): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14655 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) [ 225.720544] audit: type=1326 audit(1529707009.718:338): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14663 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:49 executing program 3: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x5009f}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:50 executing program 3: accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x1c) 22:36:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:50 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:50 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:50 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:50 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x500ea}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:51 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50218}]}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:51 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:51 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:51 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:51 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000002c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00'}, 0x10) 22:36:52 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) keyctl$session_to_parent(0x12) 22:36:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) 22:36:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) [ 228.492978] kauditd_printk_skb: 5 callbacks suppressed [ 228.493000] audit: type=1326 audit(1529707012.491:344): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14823 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:52 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50218}]}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) [ 228.586310] audit: type=1326 audit(1529707012.530:345): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14829 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) keyctl$session_to_parent(0x12) 22:36:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:52 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50218}]}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) modify_ldt$write2(0x11, &(0x7f0000000400), 0x10) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000440)=""/4096) 22:36:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) keyctl$session_to_parent(0x12) [ 229.075157] audit: type=1326 audit(1529707013.073:346): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14865 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:53 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50218}]}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:53 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:53 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f0000000200), 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080)={0x0, @multicast2=0xe0000002, 0x0, 0x0, 'sh\x00'}, 0x2c) [ 229.475590] audit: type=1326 audit(1529707013.474:347): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14876 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:53 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:53 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:53 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:53 executing program 5: open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) [ 229.716167] audit: type=1326 audit(1529707013.709:348): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14896 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:53 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:53 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:53 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:54 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:54 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:54 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:54 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50344}]}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:36:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:54 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:54 executing program 1: openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) [ 230.643095] audit: type=1326 audit(1529707014.641:349): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14962 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:54 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) [ 230.703535] audit: type=1326 audit(1529707014.680:350): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=14970 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:54 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50344}]}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:36:54 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:55 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50344}]}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:36:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:55 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) accept4(0xffffffffffffff9c, &(0x7f0000000400)=@nl, &(0x7f0000000480)=0x80, 0x0) sched_getscheduler(0x0) 22:36:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) [ 231.643918] audit: type=1326 audit(1529707015.642:351): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15006 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:55 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) [ 231.718414] audit: type=1326 audit(1529707015.664:352): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15021 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:55 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50344}]}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:36:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:55 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000080)) 22:36:56 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50344}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:36:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50349}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:56 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) [ 232.600983] audit: type=1326 audit(1529707016.599:353): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15066 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:56 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:56 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50344}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:36:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:57 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5009e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:36:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50344}]}) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:36:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:57 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:57 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:57 executing program 6: pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:36:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5009e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) [ 233.813634] kauditd_printk_skb: 2 callbacks suppressed [ 233.813659] audit: type=1326 audit(1529707017.812:356): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15137 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:57 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) [ 233.966475] audit: type=1326 audit(1529707017.959:357): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15147 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:58 executing program 6: pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:36:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5009e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) [ 234.179869] audit: type=1326 audit(1529707018.178:358): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15163 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:58 executing program 6: pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:36:58 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000380)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000200)}, 0x20) 22:36:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) [ 234.757559] audit: type=1326 audit(1529707018.756:359): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15189 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000280)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) 22:36:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:58 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50344}]}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:36:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5009e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:36:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) [ 234.932850] audit: type=1326 audit(1529707018.930:360): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15203 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:59 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50344}]}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:36:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:36:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5009e}]}) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:36:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) [ 235.213630] audit: type=1326 audit(1529707019.212:361): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15224 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:59 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:59 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50344}]}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:36:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:36:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5009e}]}) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:36:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:36:59 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:36:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:36:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) [ 235.873383] audit: type=1326 audit(1529707019.872:362): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15250 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:36:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:36:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:37:00 executing program 3: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:37:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000400)) 22:37:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5009e}]}) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:37:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:37:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:37:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) [ 236.271020] audit: type=1326 audit(1529707020.269:363): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15281 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:37:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:37:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50344}]}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:37:00 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:37:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:37:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) [ 236.815238] audit: type=1326 audit(1529707020.813:364): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15303 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:00 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) [ 236.884408] audit: type=1326 audit(1529707020.842:365): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15314 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:01 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:37:01 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:37:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50344}]}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:37:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:37:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5009e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:37:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, &(0x7f0000000140)=""/121, &(0x7f00000001c0)=0x79) 22:37:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5009e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:37:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:37:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:37:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50344}]}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:37:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:37:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5009e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:37:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:37:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:37:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:37:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:37:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:02 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x320, &(0x7f0000000180)}) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/191) 22:37:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x0, &(0x7f0000000040)=""/134) 22:37:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:37:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:37:02 executing program 4: memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:37:03 executing program 5: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:03 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50238}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x320, &(0x7f0000000180)}) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240)=""/191) 22:37:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:37:03 executing program 4: memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) [ 239.097477] kauditd_printk_skb: 4 callbacks suppressed [ 239.097566] audit: type=1326 audit(1529707023.096:370): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15438 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:03 executing program 5: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:37:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5009e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) [ 239.288924] audit: type=1326 audit(1529707023.287:371): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15454 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:03 executing program 4: memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:03 executing program 5: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:03 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5009e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:37:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$KDGETKEYCODE(0xffffffffffffffff, 0x4b4c, &(0x7f0000000100)) 22:37:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) 22:37:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5009e}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:37:03 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) [ 240.043592] audit: type=1326 audit(1529707024.038:372): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15501 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:37:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:04 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:04 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:37:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) [ 240.232318] audit: type=1326 audit(1529707024.230:373): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15511 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) [ 240.310244] audit: type=1326 audit(1529707024.282:374): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15519 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) 22:37:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000280)}) 22:37:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) 22:37:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:05 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) 22:37:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000280)}) 22:37:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) [ 241.309248] audit: type=1326 audit(1529707025.307:375): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15576 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000080)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) [ 241.359546] audit: type=1326 audit(1529707025.337:376): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15571 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000280)}) 22:37:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) 22:37:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000280)}) 22:37:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:06 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) 22:37:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) 22:37:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) migrate_pages(0x0, 0x0, &(0x7f0000000040), &(0x7f00000000c0)) 22:37:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501d0}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:06 executing program 2: getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) 22:37:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000280)}) [ 242.380471] audit: type=1326 audit(1529707026.379:377): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15629 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:06 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) 22:37:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:06 executing program 2: getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:06 executing program 7: accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) 22:37:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000280)}) [ 242.706430] audit: type=1326 audit(1529707026.705:378): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15656 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d3}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:06 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) [ 242.793549] audit: type=1326 audit(1529707026.731:379): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15658 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:07 executing program 7: accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) 22:37:07 executing program 2: getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000280)}) 22:37:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:07 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) 22:37:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000080)) 22:37:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:07 executing program 7: accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) 22:37:07 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000280)}) 22:37:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:07 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) 22:37:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000080)) 22:37:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:07 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000280)}) 22:37:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) 22:37:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') 22:37:07 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000280)}) 22:37:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) 22:37:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) 22:37:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000080)) 22:37:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:08 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000280)}) 22:37:08 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) [ 244.301410] kauditd_printk_skb: 3 callbacks suppressed [ 244.301434] audit: type=1326 audit(1529707028.299:383): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15751 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) memfd_create(&(0x7f0000000140)='veth1\x00', 0x0) accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) 22:37:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) 22:37:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:08 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000280)}) 22:37:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000080)) 22:37:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50226}]}) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) 22:37:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f00000016c0)='syzkaller\x00', &(0x7f0000001700)='system_u:object_r:semanage_trans_lock_t:s0\x00') [ 244.692973] audit: type=1326 audit(1529707028.691:384): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15768 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:08 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d0}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000440)={0x0, &(0x7f0000000280)}) 22:37:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000140)}) getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) [ 244.750594] audit: type=1326 audit(1529707028.727:385): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15774 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 22:37:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) [ 244.945073] ================================================================== [ 244.952537] BUG: KMSAN: uninit-value in sock_rfree+0x21e/0x2a0 [ 244.958520] CPU: 0 PID: 4514 Comm: syz-fuzzer Not tainted 4.17.0+ #9 [ 244.965020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 244.974382] Call Trace: [ 244.976985] dump_stack+0x185/0x1d0 [ 244.980621] kmsan_report+0x188/0x2a0 [ 244.984432] __msan_warning_32+0x70/0xc0 [ 244.988500] sock_rfree+0x21e/0x2a0 [ 244.992133] ? sock_efree+0x1d0/0x1d0 [ 244.995938] skb_release_head_state+0x2f1/0x520 [ 245.000616] __kfree_skb+0x57/0x280 [ 245.004253] tcp_recvmsg+0x2b50/0x40b0 [ 245.008159] ? sock_read_iter+0x40a/0x480 [ 245.012321] ? tcp_peek_len+0x400/0x400 [ 245.016308] inet_recvmsg+0x4e3/0x610 [ 245.020125] ? security_socket_recvmsg+0xa4/0x220 [ 245.024993] ? inet_sendpage+0x8f0/0x8f0 [ 245.029069] sock_read_iter+0x40a/0x480 [ 245.033066] ? kernel_sock_ip_overhead+0x340/0x340 [ 245.038001] __vfs_read+0x775/0x9d0 [ 245.041632] vfs_read+0x36c/0x6b0 [ 245.045092] __x64_sys_read+0x1bf/0x3e0 [ 245.049089] ? ksys_read+0x360/0x360 [ 245.052802] do_syscall_64+0x15b/0x230 [ 245.056676] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 245.061872] RIP: 0033:0x47fc44 [ 245.065047] RSP: 002b:000000c4201bb998 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 245.072750] RAX: ffffffffffffffda RBX: 000000c420028700 RCX: 000000000047fc44 [ 245.080027] RDX: 0000000000001000 RSI: 000000c4200b5000 RDI: 0000000000000003 [ 245.087293] RBP: 000000c4201bb9e8 R08: 0000000000000000 R09: 0000000000000000 [ 245.094555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 245.101826] R13: 0000000000000020 R14: 0000000000000013 R15: 000000c43a3e9960 [ 245.109095] [ 245.110715] Uninit was stored to memory at: [ 245.115035] kmsan_internal_chain_origin+0x12b/0x210 [ 245.120132] __msan_chain_origin+0x69/0xc0 [ 245.124350] __sk_mem_reclaim+0x127/0x140 [ 245.128480] tcp_event_data_recv+0x1410/0x17b0 [ 245.133055] tcp_data_queue+0x169d/0xa3c0 [ 245.137206] tcp_rcv_established+0x196e/0x2bb0 [ 245.141783] tcp_v4_do_rcv+0x6d2/0xd90 [ 245.145651] tcp_v4_rcv+0x676e/0x6cd0 [ 245.149434] ip_local_deliver_finish+0x887/0xed0 [ 245.154183] ip_local_deliver+0x43c/0x4e0 [ 245.158322] ip_rcv_finish+0xa1b/0x1d10 [ 245.162287] ip_rcv+0x1168/0x16a0 [ 245.165737] __netif_receive_skb_core+0x47f3/0x4aa0 [ 245.170745] netif_receive_skb_internal+0x49d/0x630 [ 245.175769] napi_gro_receive+0x6a7/0xb60 [ 245.179903] receive_buf+0x4c96/0x6ae0 [ 245.183796] virtnet_poll+0x8ff/0x1420 [ 245.187685] net_rx_action+0x766/0x1a80 [ 245.191646] __do_softirq+0x592/0x979 [ 245.195424] [ 245.197042] Uninit was stored to memory at: [ 245.201375] kmsan_internal_chain_origin+0x12b/0x210 [ 245.206463] __msan_chain_origin+0x69/0xc0 [ 245.210684] tcp_queue_rcv+0xfe1/0x1200 [ 245.214645] tcp_data_queue+0x1510/0xa3c0 [ 245.218778] tcp_rcv_established+0x196e/0x2bb0 [ 245.223343] tcp_v4_do_rcv+0x6d2/0xd90 [ 245.227217] tcp_v4_rcv+0x676e/0x6cd0 [ 245.231008] ip_local_deliver_finish+0x887/0xed0 [ 245.235754] ip_local_deliver+0x43c/0x4e0 [ 245.239902] ip_rcv_finish+0xa1b/0x1d10 22:37:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sched_getattr(0x0, &(0x7f00000000c0), 0x30, 0x0) 22:37:09 executing program 3: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000080)) 22:37:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x501ef}]}) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f0000000080)) 22:37:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50220}]}) getpgrp(0xffffffffffffffff) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 22:37:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) [ 245.243861] ip_rcv+0x1168/0x16a0 [ 245.247298] __netif_receive_skb_core+0x47f3/0x4aa0 [ 245.252310] netif_receive_skb_internal+0x49d/0x630 [ 245.257321] napi_gro_receive+0x6a7/0xb60 [ 245.261471] receive_buf+0x4c96/0x6ae0 [ 245.265355] virtnet_poll+0x8ff/0x1420 [ 245.269240] net_rx_action+0x766/0x1a80 [ 245.273214] __do_softirq+0x592/0x979 [ 245.276999] [ 245.278613] Uninit was stored to memory at: [ 245.282953] kmsan_internal_chain_origin+0x12b/0x210 [ 245.288069] __msan_chain_origin+0x69/0xc0 [ 245.292323] sk_forced_mem_schedule+0x1de/0x2d0 [ 245.297028] tcp_data_queue+0x13f6/0xa3c0 [ 245.301187] tcp_rcv_established+0x196e/0x2bb0 [ 245.305784] tcp_v4_do_rcv+0x6d2/0xd90 [ 245.309685] tcp_v4_rcv+0x676e/0x6cd0 [ 245.313506] ip_local_deliver_finish+0x887/0xed0 [ 245.318277] ip_local_deliver+0x43c/0x4e0 [ 245.322426] ip_rcv_finish+0xa1b/0x1d10 [ 245.326408] ip_rcv+0x1168/0x16a0 [ 245.329891] __netif_receive_skb_core+0x47f3/0x4aa0 [ 245.334918] netif_receive_skb_internal+0x49d/0x630 [ 245.339944] napi_gro_receive+0x6a7/0xb60 [ 245.344099] receive_buf+0x4c96/0x6ae0 [ 245.347994] virtnet_poll+0x8ff/0x1420 [ 245.351884] net_rx_action+0x766/0x1a80 [ 245.355861] __do_softirq+0x592/0x979 [ 245.359649] [ 245.361271] Uninit was created at: [ 245.364816] kmsan_internal_poison_shadow+0xb8/0x1b0 [ 245.369927] kmsan_kmalloc+0x94/0x100 [ 245.373729] kmem_cache_alloc+0xa97/0xb70 [ 245.377889] __napi_alloc_skb+0x27c/0xa10 [ 245.382053] page_to_skb+0x141/0x1190 [ 245.385864] receive_buf+0xc98/0x6ae0 [ 245.389665] virtnet_poll+0x8ff/0x1420 22:37:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=0x1c, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000300)) [ 245.393556] net_rx_action+0x766/0x1a80 [ 245.397531] __do_softirq+0x592/0x979 [ 245.401321] ================================================================== [ 245.408673] Disabling lock debugging due to kernel taint [ 245.414126] Kernel panic - not syncing: panic_on_warn set ... [ 245.414126] [ 245.421499] CPU: 0 PID: 4514 Comm: syz-fuzzer Tainted: G B 4.17.0+ #9 [ 245.429378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.438741] Call Trace: [ 245.441350] dump_stack+0x185/0x1d0 [ 245.444993] panic+0x3d0/0x990 [ 245.448202] kmsan_report+0x29e/0x2a0 [ 245.452013] __msan_warning_32+0x70/0xc0 [ 245.456086] sock_rfree+0x21e/0x2a0 [ 245.459725] ? sock_efree+0x1d0/0x1d0 [ 245.463545] skb_release_head_state+0x2f1/0x520 [ 245.468229] __kfree_skb+0x57/0x280 [ 245.471868] tcp_recvmsg+0x2b50/0x40b0 [ 245.475781] ? sock_read_iter+0x40a/0x480 [ 245.479940] ? tcp_peek_len+0x400/0x400 [ 245.483923] inet_recvmsg+0x4e3/0x610 [ 245.487746] ? security_socket_recvmsg+0xa4/0x220 [ 245.492621] ? inet_sendpage+0x8f0/0x8f0 [ 245.496698] sock_read_iter+0x40a/0x480 [ 245.500692] ? kernel_sock_ip_overhead+0x340/0x340 [ 245.505640] __vfs_read+0x775/0x9d0 [ 245.509285] vfs_read+0x36c/0x6b0 [ 245.512767] __x64_sys_read+0x1bf/0x3e0 [ 245.516764] ? ksys_read+0x360/0x360 [ 245.520486] do_syscall_64+0x15b/0x230 [ 245.524381] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 245.529560] RIP: 0033:0x47fc44 [ 245.532735] RSP: 002b:000000c4201bb998 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 245.540437] RAX: ffffffffffffffda RBX: 000000c420028700 RCX: 000000000047fc44 [ 245.547694] RDX: 0000000000001000 RSI: 000000c4200b5000 RDI: 0000000000000003 [ 245.554948] RBP: 000000c4201bb9e8 R08: 0000000000000000 R09: 0000000000000000 [ 245.562201] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 245.569453] R13: 0000000000000020 R14: 0000000000000013 R15: 000000c43a3e9960 [ 245.577189] Dumping ftrace buffer: [ 245.580709] (ftrace buffer empty) [ 245.584396] Kernel Offset: disabled [ 245.588001] Rebooting in 86400 seconds..