, 0x0) 19:27:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 19:27:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:27:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) 19:27:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100), 0x0) 19:27:51 executing program 4: gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) 19:27:51 executing program 4: gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) 19:27:51 executing program 4: gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) 19:27:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) 19:27:51 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) 19:27:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) 19:27:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) 19:27:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) [ 781.704261] kauditd_printk_skb: 6 callbacks suppressed [ 781.704284] audit: type=1326 audit(1529695671.701:1700): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16717 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000040)) recvfrom(0xffffffffffffffff, &(0x7f00000000c0)=""/22, 0x16, 0x0, &(0x7f0000000140)=@in={0x2}, 0x80) 19:27:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) [ 781.870263] audit: type=1326 audit(1529695671.868:1701): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16729 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) pkey_alloc(0x0, 0x0) 19:27:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) [ 782.160597] audit: type=1326 audit(1529695672.159:1702): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16736 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'osx.', 'ppp0vmnet1\x00'}) fremovexattr(0xffffffffffffffff, &(0x7f0000000100)=@random={'security.', '-\x00'}) 19:27:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) 19:27:52 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:27:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100), 0x0) 19:27:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) set_robust_list(&(0x7f0000000180)={&(0x7f0000000080)={&(0x7f0000000040)}, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)}}, 0x18) [ 782.357453] audit: type=1326 audit(1529695672.356:1703): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16748 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 782.388443] audit: type=1326 audit(1529695672.385:1704): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16752 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) 19:27:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000001b00)={&(0x7f0000000400)={0x10}, 0xc, &(0x7f0000001ac0)={&(0x7f0000000540)={0x14}, 0x14}, 0x1}, 0x0) 19:27:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) 19:27:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 19:27:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a}, &(0x7f0000000280)='\x00', 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000880)=""/7) 19:27:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) [ 782.791192] audit: type=1326 audit(1529695672.789:1705): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16779 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) 19:27:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 19:27:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) pkey_alloc(0x0, 0x0) [ 783.114527] audit: type=1326 audit(1529695673.112:1706): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16800 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100), 0x0) 19:27:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 19:27:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) [ 783.382710] audit: type=1326 audit(1529695673.381:1707): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16818 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) 19:27:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) socketpair(0x0, 0x0, 0x0, &(0x7f00000000c0)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:27:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) [ 783.774757] audit: type=1326 audit(1529695673.773:1708): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16847 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:54 executing program 5: io_submit(0x0, 0xfffffffffffffe3b, &(0x7f0000000340)) 19:27:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x2c) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:27:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socket$inet6(0xa, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x2c) 19:27:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) gettid() keyctl$join(0x1, &(0x7f0000000100)={0x73, 0x79, 0x7a}) 19:27:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:54 executing program 3: io_submit(0x0, 0x5, &(0x7f0000000800)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)="ee5f5fe605addc0fa02a0b68acd55545229e23ec27d0495b2f9459362be498924d3e2a3c76a560feb0aae98ae610ce886964ba60b17eec93c8c8c05902ec940f2c2816bde42b50d74980cf35b5b36f6b11ce38466b960c1859db7aae008e8c9267ab99a4fa6acdbaf22d326405430a3bf20953fc511452deaa9e20acf7ea8152817782d8c46d5e60ec6c8533e9f52188b1c2c77ee51b87d4866af79697e0899d5b569954b74ce5552e77fc", 0xab, 0xfffffffffffffef5, 0x0, 0x1}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x9, 0x9, 0xffffffffffffffff, &(0x7f0000000200)="1c27beda07fd0622b026f8a92cfeb26c8658aed309cc3f807f1aa6f7412cc7b3ebbcb9ef0b6513c74b03d54f9c960442a244330a234148096bcb69e4a876875d8fb4473c5782ecb900558fab", 0x4c, 0x5}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x8, 0x100, 0xffffffffffffffff, &(0x7f0000000340)="3f53c2701bf07d2421d3284b60286069d6fcef83e84c75f754fb94e46fd3c73d4063c4838f51c56da2f45feb909e15d4ab5a4d893f4e9964a68734bd959a8b6923442b73583ebb2445563aed1ce5e189d70f76e7582d496c7f1093f6c13a354757ad7f2a948d7ee27215fe896463e1d0a564bac919745a4dc36e1e8d11aa65ea04259909c70e49720bd9017e16b5ad4cde3660bb42d580de36426df791155a85be1bc2f303a2d298307acc6e0ee20db749f28676955826bc7dec1dcb9c1e81fedb58bbbc58074731234fd3beffe67196fcc882ddff652344a4ab649d38014280fc2563075bdc", 0xe6, 0x2}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x8, 0x1, 0xffffffffffffffff, &(0x7f00000005c0)="6d3e344850705d5dd8bfc794f2e0f6091b8d353e234e96fdba9c9a4ff3a3445ae1a25f722dce2ea59b2dc8c92e813b786e84ce3028d054a2a3356fe5826b35cc8d3176782cf27e7209ba11295679cde339dad05f804cd7bbe52fe3846b3a22ec3129857d60b392afc33ae798c854cbfb01f4398ec6880384d1805f7dbd3bc372f6e754b92e533558dd232711f61ce328e6cc72db7304110abccecbdae874480442", 0xa1, 0x5}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x1, 0x4000000, 0xffffffffffffffff, &(0x7f0000000740)="bf7637916ccddb192a5196f0fecbb19fb72251a630f887366ece3e7f94e4cca82e284fc858a153afcb4419f23b5c3de20b389d4494421dd0b53b49b29e599775b8d62a3fc0", 0x45, 0x12d1}]) 19:27:54 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) [ 784.762715] audit: type=1326 audit(1529695674.761:1709): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16908 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:54 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:54 executing program 0: pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:54 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:54 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:55 executing program 0: pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:55 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:55 executing program 0: pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:55 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:55 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:55 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:27:55 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:55 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:55 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:55 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:27:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:56 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:56 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:56 executing program 6: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:56 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:27:56 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:56 executing program 6: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:56 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:56 executing program 6: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:27:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:56 executing program 5: pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:56 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:27:56 executing program 5: pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:57 executing program 5: pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:57 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:57 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:27:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:57 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:57 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:57 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:27:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:57 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:57 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:57 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:57 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:27:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:57 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:58 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:27:58 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) [ 788.218833] audit: type=1326 audit(1529695678.217:1710): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17184 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:58 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:27:58 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) [ 788.454895] audit: type=1326 audit(1529695678.453:1711): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17202 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) [ 788.562663] audit: type=1326 audit(1529695678.526:1712): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17209 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:58 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:27:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:58 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:27:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:59 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:27:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) [ 789.192217] audit: type=1326 audit(1529695679.190:1713): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17248 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:27:59 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:27:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:27:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:27:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:27:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:27:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:27:59 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) [ 789.426559] audit: type=1326 audit(1529695679.424:1714): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17261 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 789.541487] audit: type=1326 audit(1529695679.535:1715): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17264 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:27:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) [ 789.617876] audit: type=1326 audit(1529695679.563:1716): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17271 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:28:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:28:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:28:00 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:28:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) [ 790.129965] audit: type=1326 audit(1529695680.125:1717): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17287 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) [ 790.195269] audit: type=1326 audit(1529695680.193:1718): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17294 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) 19:28:00 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:28:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:28:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:28:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:28:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}}, 0x20) 19:28:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) [ 790.458282] audit: type=1326 audit(1529695680.456:1719): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17311 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:28:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:28:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:28:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:28:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:28:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:28:01 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) getgid() getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f0000000100)=0x54) 19:28:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 19:28:01 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:28:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 19:28:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:01 executing program 1: io_submit(0x0, 0x1ffffffffffffd25, &(0x7f0000000340)) 19:28:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)) 19:28:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 19:28:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140), 0x2b3) 19:28:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000000)) 19:28:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140), 0x2b3) 19:28:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:28:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:28:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f00000000c0), 0x4) 19:28:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:02 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000180), 0x4) 19:28:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140), 0x2b3) 19:28:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f0000000140), 0x2b3) 19:28:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:02 executing program 1: io_submit(0x0, 0x1fffffffffffffc8, &(0x7f00000000c0)) 19:28:02 executing program 2: pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/46, 0x2e) 19:28:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000080)=""/210) 19:28:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) [ 793.240861] kauditd_printk_skb: 13 callbacks suppressed [ 793.240889] audit: type=1326 audit(1529695683.239:1733): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17458 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:03 executing program 2: pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$TIOCSPGRP(0xffffffffffffffff, 0x5410, &(0x7f0000000080)) 19:28:03 executing program 7: r0 = socket(0x200000000010, 0x2, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000000)={0x303, 0x33}, 0x4) 19:28:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:03 executing program 2: pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:04 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ee}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) readv(0xffffffffffffffff, &(0x7f0000000300), 0x0) 19:28:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:04 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ee}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 19:28:04 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:04 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:04 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ee}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:05 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:05 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) getgid() setgid(0x0) 19:28:05 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ee}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:05 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:05 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:05 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:05 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ee}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:05 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:05 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ee}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:06 executing program 1: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:06 executing program 7: socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:06 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ee}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:06 executing program 7: socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:06 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:06 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:06 executing program 7: socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:06 executing program 5: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:06 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:06 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) [ 796.874899] audit: type=1326 audit(1529695686.873:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17718 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:06 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:07 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:07 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:07 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:07 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ee}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) [ 797.822736] audit: type=1326 audit(1529695687.821:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17784 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:07 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ee}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:07 executing program 4: memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ee}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:08 executing program 4: memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, &(0x7f00000000c0)) 19:28:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) [ 798.775969] audit: type=1326 audit(1529695688.774:1736): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17823 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:08 executing program 4: memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) [ 798.845211] audit: type=1326 audit(1529695688.818:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17833 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) [ 798.995670] audit: type=1326 audit(1529695688.977:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17839 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) [ 799.782990] audit: type=1326 audit(1529695689.781:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17873 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ee}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) [ 799.866316] audit: type=1326 audit(1529695689.852:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17872 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:09 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ee}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) [ 800.067242] audit: type=1326 audit(1529695690.065:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17898 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501ee}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000640)='/dev/autofs\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:28:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) [ 800.761412] audit: type=1326 audit(1529695690.759:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17925 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) [ 800.812301] audit: type=1326 audit(1529695690.796:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17924 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 800.832326] audit: type=1326 audit(1529695690.809:1744): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17935 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000180)={'irlan0\x00', {0x2, 0x0, @rand_addr}}) 19:28:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) [ 801.065059] audit: type=1326 audit(1529695691.063:1745): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17945 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000040)) 19:28:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:28:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:11 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:11 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) seccomp(0x0, 0x0, &(0x7f0000000240)={0x0, &(0x7f0000000200)}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000001c0), 0x14) 19:28:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:12 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:12 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:12 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:12 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) clock_nanosleep(0x0, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000280)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000300)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 19:28:12 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:12 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:12 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x2c) keyctl$get_keyring_id(0x0, 0x0, 0x0) 19:28:12 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) 19:28:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) 19:28:13 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000003c0)) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000400)) 19:28:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:13 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x0) 19:28:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:13 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000240)=""/160, 0xa0, 0x0, &(0x7f0000000300)=@file={0x0, './file0/file0\x00'}, 0x6e) 19:28:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:14 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050099}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) truncate(&(0x7f0000000080)='./file0\x00', 0x0) [ 804.263572] kauditd_printk_skb: 12 callbacks suppressed [ 804.263594] audit: type=1326 audit(1529695694.262:1758): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18129 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:14 executing program 6: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050099}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:14 executing program 4: io_submit(0x0, 0x1fffffffffffffaf, &(0x7f0000000000)) 19:28:14 executing program 6: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050099}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:14 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:15 executing program 6: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:15 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050099}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) [ 805.247584] audit: type=1326 audit(1529695695.246:1759): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18199 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:15 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:15 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050099}]}) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:15 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000004c0)) 19:28:16 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:16 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050099}]}) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:16 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) [ 806.222496] audit: type=1326 audit(1529695696.221:1760): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18251 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:16 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:16 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050099}]}) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:16 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:16 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:17 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:17 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:17 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:17 executing program 5: memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:17 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:17 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:17 executing program 5: memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:17 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:17 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:17 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:17 executing program 5: memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:17 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:17 executing program 7: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:17 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050099}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:17 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:17 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:17 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050099}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:18 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:18 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:18 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:18 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:18 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050099}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:18 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:18 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) [ 808.487347] audit: type=1326 audit(1529695698.486:1761): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18417 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) [ 808.576563] audit: type=1326 audit(1529695698.534:1762): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18419 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:19 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:19 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) [ 809.477772] audit: type=1326 audit(1529695699.476:1763): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18475 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) [ 809.539866] audit: type=1326 audit(1529695699.513:1764): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18484 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050099}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:19 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) [ 809.605296] audit: type=1326 audit(1529695699.592:1765): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18482 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050099}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:20 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000140)) 19:28:20 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050099}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x0) 19:28:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) [ 810.419720] audit: type=1326 audit(1529695700.418:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18525 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) [ 810.529706] audit: type=1326 audit(1529695700.459:1767): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18532 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 810.549584] audit: type=1326 audit(1529695700.485:1768): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18540 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 810.621208] audit: type=1326 audit(1529695700.599:1769): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18542 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) [ 810.709604] audit: type=1326 audit(1529695700.686:1770): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18554 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) [ 810.772010] audit: type=1326 audit(1529695700.770:1771): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18558 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:21 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000000)) 19:28:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) [ 811.449312] audit: type=1326 audit(1529695701.447:1772): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18578 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) 19:28:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)={'filter\x00'}, &(0x7f0000000080)=0x44) 19:28:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f00000047c0), 0x8) 19:28:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x0) 19:28:23 executing program 6: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:23 executing program 1: memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:23 executing program 1: memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:23 executing program 6: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:23 executing program 1: memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:23 executing program 6: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:23 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:23 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:24 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:24 executing program 0: socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000000)) 19:28:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:24 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:24 executing program 0: socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) [ 814.776020] kauditd_printk_skb: 11 callbacks suppressed [ 814.776046] audit: type=1326 audit(1529695704.774:1784): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18794 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:24 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:24 executing program 0: socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:25 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:25 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) times(&(0x7f0000000080)) 19:28:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:25 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:25 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) times(&(0x7f0000000080)) 19:28:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:26 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:26 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:26 executing program 7: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) times(&(0x7f0000000080)) 19:28:26 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) [ 816.453663] audit: type=1326 audit(1529695706.452:1785): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18906 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:26 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:26 executing program 3: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) [ 816.560349] audit: type=1326 audit(1529695706.527:1786): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18914 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:26 executing program 7: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:26 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:26 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:26 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:26 executing program 3: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:26 executing program 7: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:26 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') 19:28:27 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:27 executing program 3: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) 19:28:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) [ 817.380521] audit: type=1326 audit(1529695707.379:1787): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18964 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:27 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) [ 817.486987] audit: type=1326 audit(1529695707.485:1788): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18980 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:27 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) 19:28:27 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0), 0x0, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') [ 818.321337] audit: type=1326 audit(1529695708.319:1789): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19021 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 19:28:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:28 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) 19:28:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:28 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) [ 818.485022] audit: type=1326 audit(1529695708.483:1790): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19038 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:28 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:28 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:29 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:29 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) [ 819.451803] audit: type=1326 audit(1529695709.449:1791): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19088 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:29 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:29 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:30 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:30 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) [ 820.386647] audit: type=1326 audit(1529695710.385:1792): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19147 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) [ 820.462252] audit: type=1326 audit(1529695710.453:1793): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19154 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:30 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) [ 820.571262] audit: type=1326 audit(1529695710.569:1794): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19163 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:30 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) [ 820.784013] audit: type=1326 audit(1529695710.782:1795): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19177 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 820.902679] audit: type=1326 audit(1529695710.901:1796): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19184 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000040)={'mangle\x00', 0x2, [{}, {}]}, 0x48) 19:28:31 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) [ 821.388792] audit: type=1326 audit(1529695711.386:1797): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19195 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) [ 821.448789] audit: type=1326 audit(1529695711.411:1798): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19193 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) [ 821.560699] audit: type=1326 audit(1529695711.559:1799): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19207 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:31 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:31 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) [ 821.831992] audit: type=1326 audit(1529695711.828:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19228 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) [ 821.945224] audit: type=1326 audit(1529695711.943:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19237 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:32 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:32 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) times(&(0x7f0000000080)) 19:28:32 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f0000000140)) 19:28:32 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:32 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000280)) ioctl$PPPIOCSFLAGS(0xffffffffffffffff, 0x40047459, &(0x7f0000000180)) 19:28:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:32 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:32 executing program 7: seccomp(0x8000000000000001, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) 19:28:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:32 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:33 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:34 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:28:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:34 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:35 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:35 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet(0x2, 0x0, 0x0) 19:28:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:35 executing program 4: memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:35 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 826.011350] kauditd_printk_skb: 8 callbacks suppressed [ 826.011371] audit: type=1326 audit(1529695716.009:1810): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19478 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:36 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:36 executing program 4: memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet(0x2, 0x0, 0x0) 19:28:36 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:36 executing program 4: memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:36 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) [ 826.314503] audit: type=1326 audit(1529695716.312:1811): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19506 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet(0x2, 0x0, 0x0) 19:28:36 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:36 executing program 5: dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:36 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) [ 827.116289] audit: type=1326 audit(1529695717.110:1812): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19536 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000001880)={0x0, 0x1, 0x6, @random="e6f0ac0e9cb1"}, 0x10) 19:28:37 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:37 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) [ 827.425461] audit: type=1326 audit(1529695717.420:1813): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19555 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:37 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000080)=0x14) 19:28:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:37 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) [ 828.090891] audit: type=1326 audit(1529695718.088:1814): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19593 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) bpf$MAP_CREATE(0x0, &(0x7f00000000c0), 0x2c) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000240)) 19:28:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:38 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:39 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 829.270228] audit: type=1326 audit(1529695719.267:1815): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19659 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:39 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:39 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:39 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:40 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:40 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 830.165835] audit: type=1326 audit(1529695720.165:1816): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19724 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) [ 830.249072] audit: type=1326 audit(1529695720.237:1817): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19736 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:40 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) socket$netlink(0x10, 0x3, 0x0) 19:28:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) [ 830.361422] audit: type=1326 audit(1529695720.309:1818): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19740 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 830.579456] audit: type=1326 audit(1529695720.577:1819): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19760 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$KDENABIO(0xffffffffffffffff, 0x4b36) 19:28:41 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) socket$netlink(0x10, 0x3, 0x0) 19:28:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:41 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) [ 831.151251] audit: type=1326 audit(1529695721.149:1820): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19773 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) [ 831.228730] audit: type=1326 audit(1529695721.187:1821): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19777 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:41 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) socket$netlink(0x10, 0x3, 0x0) [ 831.336174] audit: type=1326 audit(1529695721.283:1822): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19789 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:41 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) [ 831.581748] audit: type=1326 audit(1529695721.580:1823): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19811 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:42 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) memfd_create(&(0x7f0000000000)="f073656c6676626f786e6574316b657972696e677b00", 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00'}) 19:28:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, &(0x7f0000000100)) 19:28:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:42 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') [ 832.299244] audit: type=1326 audit(1529695722.297:1824): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19844 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 832.415968] audit: type=1326 audit(1529695722.395:1825): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19854 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)) readlinkat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/225, 0xe1) 19:28:42 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:42 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) [ 832.592000] audit: type=1326 audit(1529695722.590:1826): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19870 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:42 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) [ 832.670479] audit: type=1326 audit(1529695722.667:1827): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19876 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:42 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) [ 832.760563] audit: type=1326 audit(1529695722.694:1828): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19879 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:42 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) init_module(&(0x7f0000000000)='loGPL)selfeth0{mime_type\x00', 0x19, &(0x7f0000000040)='!\x00') 19:28:43 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x0, 0x0) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000080)) 19:28:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) init_module(&(0x7f0000000000)='loGPL)selfeth0{mime_type\x00', 0x19, &(0x7f0000000040)='!\x00') 19:28:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000040)=""/57, &(0x7f0000000080)=0x39) [ 833.713945] audit: type=1326 audit(1529695723.712:1829): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19940 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) init_module(&(0x7f0000000000)='loGPL)selfeth0{mime_type\x00', 0x19, &(0x7f0000000040)='!\x00') 19:28:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x0, 0x0) 19:28:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) init_module(&(0x7f0000000000)='loGPL)selfeth0{mime_type\x00', 0x19, &(0x7f0000000040)='!\x00') 19:28:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet(0x2, 0x0, 0x0) 19:28:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:44 executing program 4: io_submit(0x0, 0x1ffffffffffffe12, &(0x7f0000000040)) 19:28:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='./file0\x00') 19:28:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:44 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:45 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:45 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:45 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$packet(0x11, 0x0, 0x300) 19:28:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:46 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:46 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$packet(0x11, 0x0, 0x300) 19:28:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) [ 836.222468] kauditd_printk_skb: 6 callbacks suppressed [ 836.222490] audit: type=1326 audit(1529695726.220:1836): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20097 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:46 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$packet(0x11, 0x0, 0x300) 19:28:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:46 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/39) 19:28:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) [ 836.980680] audit: type=1326 audit(1529695726.979:1837): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20137 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:47 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:47 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) socket$netlink(0x10, 0x3, 0x0) 19:28:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) getpriority(0x0, 0x0) 19:28:47 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) [ 837.190206] audit: type=1326 audit(1529695727.188:1838): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20160 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:47 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) getpriority(0x0, 0x0) 19:28:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:47 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:47 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) getpriority(0x0, 0x0) 19:28:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:48 executing program 1: 19:28:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:48 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:48 executing program 7: ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:48 executing program 7: ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:48 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:48 executing program 1: 19:28:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:48 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:48 executing program 7: ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:48 executing program 1: 19:28:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:48 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:48 executing program 1: 19:28:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:48 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:48 executing program 1: [ 838.916552] audit: type=1326 audit(1529695728.915:1839): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20280 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:49 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:49 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:49 executing program 1: 19:28:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:49 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) [ 839.374376] audit: type=1326 audit(1529695729.373:1840): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20319 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:49 executing program 1: 19:28:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:49 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) [ 839.862305] audit: type=1326 audit(1529695729.860:1841): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20333 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:49 executing program 1: 19:28:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:50 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) [ 840.356442] audit: type=1326 audit(1529695730.355:1842): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20373 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000040)=""/65) 19:28:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:50 executing program 6: memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:50 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) [ 840.859057] audit: type=1326 audit(1529695730.857:1843): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20392 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:50 executing program 6: memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:50 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) [ 841.020036] audit: type=1326 audit(1529695731.018:1844): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20397 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f0000000040)) 19:28:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:51 executing program 6: memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 841.300277] audit: type=1326 audit(1529695731.298:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20426 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:51 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:51 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000000)) 19:28:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:51 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:51 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) [ 841.940154] audit: type=1326 audit(1529695731.937:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20448 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 842.055069] audit: type=1326 audit(1529695732.010:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20454 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 842.075076] audit: type=1326 audit(1529695732.018:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20450 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:52 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) [ 842.094865] audit: type=1326 audit(1529695732.037:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20455 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:52 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:52 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:52 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:52 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) [ 842.862672] audit: type=1326 audit(1529695732.861:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20503 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) 19:28:52 executing program 1: socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:52 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) [ 842.915242] audit: type=1326 audit(1529695732.913:1851): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20506 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 843.022724] audit: type=1326 audit(1529695733.017:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20518 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:53 executing program 1: socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:53 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 843.099149] audit: type=1326 audit(1529695733.086:1853): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20522 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:53 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:53 executing program 1: socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, &(0x7f0000000080)) getpriority(0x0, 0x0) 19:28:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) 19:28:53 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:53 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) [ 843.871049] audit: type=1326 audit(1529695733.869:1854): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20566 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x4}, 0x68) 19:28:54 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:54 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:54 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:54 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:54 executing program 5: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:54 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:54 executing program 5: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:54 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:54 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:54 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:54 executing program 5: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:54 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:28:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:55 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:55 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) shutdown(0xffffffffffffffff, 0x0) 19:28:55 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:28:55 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:55 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f00000000c0)='/dev/full\x00', 0x0) sync_file_range(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:28:55 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x0) 19:28:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:28:55 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:55 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:56 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:56 executing program 3: pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:56 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:28:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x0) 19:28:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:28:56 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:56 executing program 3: pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:56 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x0) 19:28:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:28:57 executing program 3: pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:57 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) listen(0xffffffffffffffff, 0x0) 19:28:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:28:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:28:57 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:57 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:28:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:28:57 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:57 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:28:57 executing program 2: uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:57 executing program 7: socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:28:57 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:28:57 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:28:57 executing program 2: uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:58 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) [ 847.959166] kauditd_printk_skb: 5 callbacks suppressed [ 847.959189] audit: type=1326 audit(1529695737.956:1860): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20835 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:58 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:58 executing program 7: socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:28:58 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 848.097218] audit: type=1326 audit(1529695738.095:1861): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20848 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:58 executing program 2: uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) [ 848.179979] audit: type=1326 audit(1529695738.134:1862): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20849 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:58 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:58 executing program 7: socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:28:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:28:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:28:58 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) [ 848.873332] audit: type=1326 audit(1529695738.871:1863): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20895 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:59 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) 19:28:59 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:28:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:28:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:28:59 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:59 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) [ 849.040507] audit: type=1326 audit(1529695739.038:1864): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20908 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:59 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) [ 849.134904] audit: type=1326 audit(1529695739.124:1865): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20921 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:28:59 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:28:59 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:28:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:28:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:28:59 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:28:59 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) [ 849.808752] audit: type=1326 audit(1529695739.807:1866): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20956 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:28:59 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x0, &(0x7f00000001c0)) [ 849.963609] audit: type=1326 audit(1529695739.962:1867): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20963 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:00 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000340)) 19:29:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:29:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:29:00 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:29:00 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) [ 850.044749] audit: type=1326 audit(1529695740.043:1868): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20965 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:29:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) [ 850.111675] audit: type=1326 audit(1529695740.075:1869): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20971 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:00 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:29:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:29:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:29:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:29:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:29:00 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:29:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:29:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:29:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:00 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:29:01 executing program 1: 19:29:01 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:29:01 executing program 0: 19:29:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:29:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:29:01 executing program 0: 19:29:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:29:01 executing program 1: 19:29:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:29:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:01 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:29:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:29:02 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) pipe(&(0x7f0000000000)) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000040)={'filter\x00'}, &(0x7f0000000080)=0x24) 19:29:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:29:02 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:29:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:02 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:29:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:02 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:29:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:29:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:03 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) uname(&(0x7f0000000040)=""/175) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00'}, 0x10) 19:29:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:03 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) [ 853.153486] kauditd_printk_skb: 7 callbacks suppressed [ 853.153510] audit: type=1326 audit(1529695743.152:1877): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21153 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:03 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:29:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x0, 'dh\x00'}, {@remote={0xac, 0x14, 0x14, 0xbb}}}, 0x44) 19:29:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:03 executing program 5: socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) [ 853.556803] audit: type=1326 audit(1529695743.555:1878): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21193 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:03 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) [ 853.624190] audit: type=1326 audit(1529695743.622:1879): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21188 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:04 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:04 executing program 5: socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000000)) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)={'raw\x00'}, &(0x7f00000000c0)=0x54) 19:29:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:04 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:04 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:04 executing program 5: socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) [ 854.252414] audit: type=1326 audit(1529695744.251:1880): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21227 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000080)) 19:29:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 19:29:04 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:04 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) [ 854.550110] audit: type=1326 audit(1529695744.548:1881): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21248 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:04 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:04 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) 19:29:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:05 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) [ 855.247930] audit: type=1326 audit(1529695745.246:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21298 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:05 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:05 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:05 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 19:29:06 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:06 executing program 3: memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) [ 856.227587] audit: type=1326 audit(1529695746.226:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21368 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:06 executing program 3: memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:06 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:07 executing program 3: memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:07 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:07 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:07 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:07 executing program 7: socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:07 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:07 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) 19:29:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:07 executing program 7: socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:07 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) [ 857.659236] audit: type=1326 audit(1529695747.657:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21456 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) [ 857.786249] audit: type=1326 audit(1529695747.784:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21467 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:07 executing program 7: socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) [ 857.948657] audit: type=1326 audit(1529695747.947:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21482 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:08 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:08 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:08 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:08 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:08 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:08 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) [ 858.585972] audit: type=1326 audit(1529695748.584:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21522 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:08 executing program 6: socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:08 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) [ 858.722458] audit: type=1326 audit(1529695748.720:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21536 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:08 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:08 executing program 6: socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) [ 858.978948] audit: type=1326 audit(1529695748.977:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21558 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:09 executing program 6: socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:09 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getpeername$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000200)=0x38f) [ 859.527606] audit: type=1326 audit(1529695749.526:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21582 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000280)=0x14) 19:29:09 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:09 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) [ 859.688629] audit: type=1326 audit(1529695749.687:1891): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21596 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000080)) 19:29:09 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:09 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) [ 859.904635] audit: type=1326 audit(1529695749.903:1892): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21608 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:10 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) [ 859.985922] audit: type=1326 audit(1529695749.954:1893): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21617 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:10 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:10 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:10 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:10 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:10 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:10 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) [ 860.903215] audit: type=1326 audit(1529695750.901:1894): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21678 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:11 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:11 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000000)) 19:29:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:11 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:11 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) [ 861.867696] audit: type=1326 audit(1529695751.866:1895): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21734 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) [ 861.966427] audit: type=1326 audit(1529695751.927:1896): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21747 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:12 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:12 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:12 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:12 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:12 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:13 executing program 1: pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:13 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:13 executing program 1: pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000180)) 19:29:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:13 executing program 1: pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:13 executing program 0: socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) [ 863.847736] kauditd_printk_skb: 5 callbacks suppressed [ 863.847759] audit: type=1326 audit(1529695753.846:1902): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21849 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:13 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:13 executing program 5: socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:14 executing program 0: socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) [ 864.075036] audit: type=1326 audit(1529695754.073:1903): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21868 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:29:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:14 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:14 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:14 executing program 5: socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) [ 864.170740] audit: type=1326 audit(1529695754.169:1904): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21875 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:14 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:14 executing program 0: socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) [ 864.244377] audit: type=1326 audit(1529695754.230:1905): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21881 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:14 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:14 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:14 executing program 5: socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:14 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:14 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:14 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) 19:29:15 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:15 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:15 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000000000)) 19:29:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) [ 865.256175] audit: type=1326 audit(1529695755.254:1906): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21944 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:15 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:15 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) [ 865.363475] audit: type=1326 audit(1529695755.301:1907): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21945 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:15 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:15 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:15 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:15 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:16 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:16 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:16 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:16 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:16 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:16 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:16 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) [ 866.402503] audit: type=1326 audit(1529695756.401:1908): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22031 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:16 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:16 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:16 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:16 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:16 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:17 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:17 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:17 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) [ 867.370448] audit: type=1326 audit(1529695757.369:1909): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22110 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:17 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:17 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket(0x0, 0x0, 0x0) 19:29:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:17 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:17 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:18 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000000c0)=0x78) 19:29:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket(0x0, 0x0, 0x0) 19:29:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:18 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) [ 868.322808] audit: type=1326 audit(1529695758.321:1910): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22156 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:18 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) [ 868.394739] audit: type=1326 audit(1529695758.346:1911): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22155 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:18 executing program 2: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket(0x0, 0x0, 0x0) 19:29:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:18 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:18 executing program 6: socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:19 executing program 4: socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:19 executing program 2: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:19 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:19 executing program 6: socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_RMID(0x0, 0x0) [ 869.245941] kauditd_printk_skb: 1 callbacks suppressed [ 869.245963] audit: type=1326 audit(1529695759.244:1913): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22207 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 869.326948] audit: type=1326 audit(1529695759.325:1914): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22218 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:19 executing program 2: ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) [ 869.387072] audit: type=1326 audit(1529695759.346:1915): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22217 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:19 executing program 6: socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:19 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:19 executing program 4: socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:19 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) 19:29:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000000c0)}, 0x12) 19:29:20 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:20 executing program 4: socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:20 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 870.253837] audit: type=1326 audit(1529695760.252:1916): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22272 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:20 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) [ 870.327673] audit: type=1326 audit(1529695760.277:1917): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22276 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) [ 870.415626] audit: type=1326 audit(1529695760.366:1918): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22289 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:20 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:20 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:20 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:21 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:21 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:21 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x24) 19:29:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:21 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:21 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) [ 871.224521] audit: type=1326 audit(1529695761.223:1919): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22335 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 871.333025] audit: type=1326 audit(1529695761.331:1920): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22350 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:21 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:21 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:21 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:21 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) [ 872.160301] audit: type=1326 audit(1529695762.158:1921): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22402 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:22 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:22 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) [ 872.290960] audit: type=1326 audit(1529695762.289:1922): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22409 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:22 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:22 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:22 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:22 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:23 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) preadv(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x0) 19:29:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:23 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:23 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:23 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:23 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:24 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:24 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:24 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:24 executing program 0: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000040)) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 19:29:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:24 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:24 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:24 executing program 0: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:24 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:24 executing program 5: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) [ 874.447014] kauditd_printk_skb: 3 callbacks suppressed [ 874.447038] audit: type=1326 audit(1529695764.444:1926): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22557 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:24 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:24 executing program 0: socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:24 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:24 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:24 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) [ 874.736423] audit: type=1326 audit(1529695764.735:1927): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22579 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:24 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:25 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:25 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:25 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:25 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) [ 875.354596] audit: type=1326 audit(1529695765.353:1928): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22601 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:25 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:25 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f00000000c0)) 19:29:25 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:25 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) [ 875.784071] audit: type=1326 audit(1529695765.782:1929): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22643 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:26 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:26 executing program 3: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:26 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:26 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) [ 876.324867] audit: type=1326 audit(1529695766.323:1930): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22658 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:26 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) [ 876.414014] audit: type=1326 audit(1529695766.405:1931): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22670 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:26 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:26 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:27 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) socket(0x0, 0x0, 0x0) 19:29:27 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:27 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) [ 877.354496] audit: type=1326 audit(1529695767.353:1932): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22723 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:27 executing program 7: set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) [ 877.438246] audit: type=1326 audit(1529695767.406:1933): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22729 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:27 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:27 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:27 executing program 7: set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) [ 877.814491] audit: type=1326 audit(1529695767.813:1934): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22758 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:28 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000100)={{0x0, @broadcast=0xffffffff, 0x0, 0x0, 'dh\x00'}, {@multicast1=0xe0000001}}, 0x44) 19:29:28 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:28 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:28 executing program 7: set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:28 executing program 2: socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:28 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) [ 878.363148] audit: type=1326 audit(1529695768.361:1935): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22768 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:28 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:28 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:28 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:28 executing program 2: socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:28 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:28 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:28 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:29 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:29 executing program 7: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:29 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:29 executing program 2: socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:29 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:29 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:29 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:29 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) [ 879.566005] kauditd_printk_skb: 1 callbacks suppressed [ 879.566028] audit: type=1326 audit(1529695769.564:1937): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22861 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:29 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) [ 879.805978] audit: type=1326 audit(1529695769.804:1938): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22871 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x0, 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, @multicast1}, &(0x7f00000001c0)=0x10) 19:29:29 executing program 6: eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:29 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) [ 879.931287] audit: type=1326 audit(1529695769.928:1939): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22888 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:30 executing program 6: eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:30 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:30 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:30 executing program 6: eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:30 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) [ 880.508355] audit: type=1326 audit(1529695770.506:1940): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22920 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:30 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) [ 880.728750] audit: type=1326 audit(1529695770.726:1941): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22930 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:30 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:30 executing program 4: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:30 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:31 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:31 executing program 4: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000280)={{{@in6}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}}, 0xe8) 19:29:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:31 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) [ 881.435761] audit: type=1326 audit(1529695771.434:1942): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22975 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 881.490718] audit: type=1326 audit(1529695771.486:1943): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22979 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:31 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0) 19:29:31 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:31 executing program 4: dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:31 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) [ 881.711450] audit: type=1326 audit(1529695771.709:1944): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22984 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:31 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:31 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:31 executing program 1: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:32 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:32 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:32 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:32 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:32 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) [ 882.695519] audit: type=1326 audit(1529695772.694:1945): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23042 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:32 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:32 executing program 1: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:32 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:32 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:33 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) [ 883.003778] audit: type=1326 audit(1529695773.002:1946): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23073 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:33 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) set_tid_address(&(0x7f0000000040)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 19:29:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:33 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:33 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:33 executing program 1: socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:33 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:33 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:33 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:33 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:34 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:34 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:34 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) [ 884.604285] kauditd_printk_skb: 4 callbacks suppressed [ 884.604306] audit: type=1326 audit(1529695774.599:1951): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23155 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:34 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:34 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:29:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:35 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) [ 885.053748] audit: type=1326 audit(1529695775.052:1952): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23180 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) [ 885.172878] audit: type=1326 audit(1529695775.156:1953): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23189 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) eventfd(0x0) ioctl$EVIOCSABS20(0xffffffffffffffff, 0x401845e0, &(0x7f0000000100)) 19:29:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:35 executing program 0: recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:35 executing program 3: socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) [ 885.572472] audit: type=1326 audit(1529695775.571:1954): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23210 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:35 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:35 executing program 0: recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:35 executing program 3: socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:35 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:35 executing program 0: recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:36 executing program 3: socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:36 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(0xffffffffffffffff, 0x0, 0x488, &(0x7f0000000300)={{0x0, @multicast2=0xe0000002, 0x0, 0x0, 'ovf\x00'}, {@broadcast=0xffffffff}}, 0x44) 19:29:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) [ 886.258546] audit: type=1326 audit(1529695776.257:1955): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23253 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:36 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:36 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) [ 886.514918] audit: type=1326 audit(1529695776.513:1956): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23259 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:36 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:36 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:36 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:36 executing program 7: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:37 executing program 7: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:37 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000200)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 887.444285] audit: type=1326 audit(1529695777.442:1957): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23324 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:37 executing program 7: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f00000000c0)) 19:29:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:37 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:37 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:38 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x4) 19:29:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:38 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) [ 888.408824] audit: type=1326 audit(1529695778.407:1958): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23381 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:38 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:39 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:39 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) [ 889.334352] audit: type=1326 audit(1529695779.333:1959): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23427 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:39 executing program 6: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:39 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:39 executing program 6: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:39 executing program 6: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) [ 889.719250] audit: type=1326 audit(1529695779.717:1960): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23466 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:40 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) [ 890.283148] audit: type=1326 audit(1529695780.281:1961): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23488 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:40 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:40 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) 19:29:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) [ 890.721857] audit: type=1326 audit(1529695780.720:1962): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23525 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 890.775168] audit: type=1326 audit(1529695780.773:1963): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23527 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:41 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/181, 0xb5, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000180)={0x0, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x0, @loopback=0x7f000001}, {0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)='irlan0\x00'}) 19:29:41 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:41 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) [ 891.272518] audit: type=1326 audit(1529695781.252:1964): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23537 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:41 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:41 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) [ 891.677802] audit: type=1326 audit(1529695781.676:1965): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23569 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 891.770680] audit: type=1326 audit(1529695781.768:1966): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23579 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000004400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000004440)=0x14) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 19:29:42 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:42 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:42 executing program 5: timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) getsockname$packet(0xffffffffffffff9c, &(0x7f0000004400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000004440)=0x14) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000100)) 19:29:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ptrace$getregs(0x0, 0x0, 0x0, &(0x7f0000001340)=""/13) 19:29:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:42 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000040)) [ 892.756859] audit: type=1326 audit(1529695782.755:1967): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23633 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:43 executing program 5: timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000140)) 19:29:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) [ 893.065915] audit: type=1326 audit(1529695783.064:1968): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23640 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:43 executing program 5: timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) [ 893.109421] audit: type=1326 audit(1529695783.100:1969): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23642 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:43 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000080), 0x4) 19:29:43 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:43 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:43 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) 19:29:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000140)) rt_sigsuspend(&(0x7f0000000280), 0x8) 19:29:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000040), 0x4) 19:29:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}, {{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) [ 895.015913] kauditd_printk_skb: 5 callbacks suppressed [ 895.015935] audit: type=1326 audit(1529695785.014:1975): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23741 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x501ea}]}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) [ 895.079461] audit: type=1326 audit(1529695785.064:1976): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23743 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 895.099343] audit: type=1326 audit(1529695785.065:1977): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23744 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 895.119322] audit: type=1326 audit(1529695785.065:1978): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23746 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) [ 895.165866] audit: type=1326 audit(1529695785.144:1979): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23753 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x501ea}]}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x501ea}]}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:46 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x501ea}]}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000200)) 19:29:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) [ 896.167897] audit: type=1326 audit(1529695786.166:1980): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23809 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x501ea}]}) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:46 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) [ 896.253537] audit: type=1326 audit(1529695786.196:1981): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23811 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x501ea}]}) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:46 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) timerfd_create(0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f00000001c0)) 19:29:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x501ea}]}) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:47 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:47 executing program 4: r0 = socket(0x10, 0x2, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0), 0x4) [ 897.128650] audit: type=1326 audit(1529695787.127:1982): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23864 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:47 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:47 executing program 7: timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:47 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:47 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:48 executing program 3: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:48 executing program 7: timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:48 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:48 executing program 7: timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:48 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x501ea}]}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:48 executing program 2: socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) [ 898.445880] audit: type=1326 audit(1529695788.444:1983): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23957 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:48 executing program 1: uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:48 executing program 6: socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x501ea}]}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:48 executing program 2: socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:48 executing program 1: uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:48 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:48 executing program 6: socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:49 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x10006, 0x0, 0x0, 0x501ea}]}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:49 executing program 2: socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:49 executing program 1: uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:49 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:49 executing program 6: socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) [ 899.412762] audit: type=1326 audit(1529695789.411:1984): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24035 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:49 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:49 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:49 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:49 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:50 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000100)) 19:29:50 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:50 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:50 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:50 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) [ 900.397868] audit: type=1326 audit(1529695790.396:1985): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24090 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:50 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:50 executing program 5: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:50 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:50 executing program 6: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:50 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:50 executing program 5: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:51 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:51 executing program 5: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:51 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) [ 901.561661] audit: type=1326 audit(1529695791.560:1986): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24160 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:51 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:51 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x10006}]}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:51 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:51 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) [ 901.828666] audit: type=1326 audit(1529695791.827:1987): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24185 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:51 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:52 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:52 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:52 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) [ 902.525711] audit: type=1326 audit(1529695792.524:1988): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24226 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:52 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x10006}]}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:52 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:52 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:52 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) [ 902.838998] audit: type=1326 audit(1529695792.837:1989): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24254 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 902.919697] audit: type=1326 audit(1529695792.865:1990): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24260 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 19:29:53 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:53 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:53 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) [ 903.451464] audit: type=1326 audit(1529695793.450:1991): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24274 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:53 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) [ 903.527321] audit: type=1326 audit(1529695793.488:1992): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24278 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:53 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x10006}]}) timerfd_create(0x0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000ffa000/0x3000)=nil, 0x3000}) 19:29:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:53 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:53 executing program 0: socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') [ 903.818315] audit: type=1326 audit(1529695793.816:1993): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24304 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:53 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) [ 903.882616] audit: type=1326 audit(1529695793.881:1994): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24312 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)) ptrace$setopts(0x0, 0x0, 0x0, 0x0) 19:29:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:54 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:54 executing program 0: socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:54 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:54 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:54 executing program 0: socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:54 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:54 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:54 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) uname(&(0x7f0000000040)=""/175) renameat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00') 19:29:54 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:55 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:55 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:55 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:55 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:55 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x0, &(0x7f0000000000)) 19:29:55 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) [ 905.427006] kauditd_printk_skb: 7 callbacks suppressed [ 905.427030] audit: type=1326 audit(1529695795.425:2002): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24411 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:55 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) [ 905.480239] audit: type=1326 audit(1529695795.460:2003): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24414 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 905.554147] audit: type=1326 audit(1529695795.534:2004): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24421 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)={{{@in=@dev, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000000ac0)=0xe8) 19:29:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000280)) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) [ 905.838035] audit: type=1326 audit(1529695795.836:2005): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24433 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) set_tid_address(&(0x7f0000000040)) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f00000004c0)) 19:29:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004ac0)={&(0x7f0000000180)=@kern={0x10}, 0xc, &(0x7f0000004a00)}, 0x0) 19:29:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:56 executing program 1: [ 906.415505] audit: type=1326 audit(1529695796.414:2006): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24462 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:56 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:56 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000100)) 19:29:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) seccomp(0x0, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f00000000c0)={0x7}) 19:29:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:56 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) [ 906.599502] audit: type=1326 audit(1529695796.598:2007): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24474 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 906.682204] audit: type=1326 audit(1529695796.644:2008): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24478 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000000)=0x68) 19:29:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:56 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:29:56 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:29:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:57 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:29:57 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:29:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:29:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:29:57 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) mknod(&(0x7f0000000080)='./file1\x00', 0x0, 0x0) 19:29:57 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:29:57 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:57 executing program 7: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:57 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:29:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:29:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:29:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001580)={'nr0\x00'}) [ 907.518351] audit: type=1326 audit(1529695797.517:2009): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24528 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:29:57 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:57 executing program 7: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:57 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:29:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:29:57 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:29:57 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:29:57 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) creat(&(0x7f0000000000)='./file0\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000a80)=@nat={'nat\x00', 0x19, 0x2, 0x90, [0x20000700, 0x0, 0x0, 0x200008d8, 0x20000908], 0x0, &(0x7f0000000040), &(0x7f0000000700)=[{}, {0x0, '\x00', 0x1}, {0x0, '\x00', 0x1}]}, 0x108) 19:29:57 executing program 7: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:29:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:29:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:58 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:29:58 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:58 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:29:58 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:29:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:29:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:58 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:29:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:58 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:29:58 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:29:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:29:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:29:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:29:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:58 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:29:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:58 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:29:58 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:29:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:29:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:29:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:29:59 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:29:59 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:59 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:29:59 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:29:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:29:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:29:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:29:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:59 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:29:59 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:29:59 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:29:59 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:29:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:29:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:29:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:59 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:29:59 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:29:59 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:29:59 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:29:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:29:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:29:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:29:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:29:59 executing program 4: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:29:59 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:29:59 executing program 6: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:30:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:30:00 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:30:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:30:00 executing program 4: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:30:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:30:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:30:00 executing program 2: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:30:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:30:00 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:30:00 executing program 0: prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:30:00 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:00 executing program 4: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:30:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:30:00 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:30:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:30:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:30:00 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:30:00 executing program 0: prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:30:00 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:30:00 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:30:00 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:00 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:30:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:30:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:30:00 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:30:00 executing program 0: prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) [ 910.858659] audit: type=1326 audit(1529695800.857:2010): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24803 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:00 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:30:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:30:01 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:01 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:30:01 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) [ 910.981802] audit: type=1326 audit(1529695800.924:2011): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24811 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:01 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:30:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:30:01 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:30:01 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:30:01 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:30:01 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:30:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) [ 911.755138] audit: type=1326 audit(1529695801.753:2012): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24858 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:30:01 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:30:01 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:30:01 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:30:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:30:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:30:01 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:01 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) [ 911.905482] audit: type=1326 audit(1529695801.903:2013): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24874 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:30:02 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:30:02 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:02 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:30:02 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) [ 912.005350] audit: type=1326 audit(1529695802.001:2014): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24877 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:30:02 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:30:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) io_submit(0x0, 0x0, &(0x7f00000018c0)) 19:30:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) [ 912.701773] audit: type=1326 audit(1529695802.700:2015): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24908 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) write$evdev(0xffffffffffffffff, &(0x7f0000000000), 0x0) 19:30:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:30:02 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:30:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:02 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:30:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) [ 912.871822] audit: type=1326 audit(1529695802.870:2016): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24917 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:30:02 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:30:02 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:30:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 912.936786] audit: type=1326 audit(1529695802.910:2017): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24923 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 913.046259] audit: type=1326 audit(1529695803.044:2018): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24930 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:30:03 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:30:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) [ 913.131575] audit: type=1326 audit(1529695803.076:2019): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24937 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:30:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:03 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:30:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:03 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:30:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:30:04 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), &(0x7f0000000280)=0x4) 19:30:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:30:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:30:04 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:30:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:04 executing program 2: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000040)) 19:30:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:04 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x25}, [], {0x95}}, &(0x7f0000003ff6)='GPL\x00', 0x0, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 19:30:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:05 executing program 7: socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) 19:30:05 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f00000004c0)}, 0x0) 19:30:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:05 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:05 executing program 7: socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:05 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:05 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:05 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000040)=0x2, 0x4) 19:30:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:05 executing program 7: socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:06 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) [ 915.967154] kauditd_printk_skb: 12 callbacks suppressed [ 915.967178] audit: type=1326 audit(1529695805.965:2032): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25095 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) prctl$seccomp(0x16, 0x0, &(0x7f0000000040)) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x0) [ 916.173732] audit: type=1326 audit(1529695806.172:2033): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25115 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:06 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:06 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:06 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000280)) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, &(0x7f0000000040)) 19:30:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:06 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:06 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:06 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:06 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:06 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:07 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$sock_inet_SIOCGIFDSTADDR(0xffffffffffffffff, 0x8917, &(0x7f0000000180)={'dummy0\x00', {0x2, 0x0, @multicast2=0xe0000002}}) 19:30:07 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:07 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:07 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:07 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:07 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:07 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f00000001c0)) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)) 19:30:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:07 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:07 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:07 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:07 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:07 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:07 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:07 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:08 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:08 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:08 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:08 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:08 executing program 6: pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:08 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) [ 918.419065] audit: type=1326 audit(1529695808.417:2034): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25293 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:08 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:08 executing program 6: pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:08 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:08 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:08 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:08 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:09 executing program 6: pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:09 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:09 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:09 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:09 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 919.369637] audit: type=1326 audit(1529695809.368:2035): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25368 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:09 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:09 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:09 executing program 5: creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:09 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:09 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 919.645375] audit: type=1326 audit(1529695809.643:2036): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25390 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) 19:30:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:10 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:10 executing program 5: creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:10 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 920.335679] audit: type=1326 audit(1529695810.331:2037): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25415 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:10 executing program 5: creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:10 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:10 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:10 executing program 0: creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:10 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:10 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) [ 920.672168] audit: type=1326 audit(1529695810.669:2038): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25438 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:11 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:11 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:11 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:11 executing program 0: creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) [ 921.293561] audit: type=1326 audit(1529695811.292:2039): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25454 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:11 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:11 executing program 0: creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50244}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:11 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) 19:30:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:11 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) [ 921.719597] audit: type=1326 audit(1529695811.718:2040): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25495 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 921.789832] audit: type=1326 audit(1529695811.788:2041): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25499 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:12 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:12 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f6}]}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) [ 922.249326] audit: type=1326 audit(1529695812.248:2042): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25509 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:12 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) [ 922.468954] audit: type=1326 audit(1529695812.466:2043): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25529 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:12 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) [ 922.784287] audit: type=1326 audit(1529695812.782:2044): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25552 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:13 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000100)) 19:30:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) [ 923.193327] audit: type=1326 audit(1529695813.192:2045): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25561 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) [ 923.322477] audit: type=1326 audit(1529695813.321:2046): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25577 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:13 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') [ 923.392783] audit: type=1326 audit(1529695813.363:2047): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25576 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) [ 923.482830] audit: type=1326 audit(1529695813.476:2048): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25590 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$TCSBRK(0xffffffffffffffff, 0x5409, 0x0) 19:30:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:14 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:14 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:14 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe2(&(0x7f0000000040), 0x0) seccomp(0x0, 0x0, &(0x7f0000000100)) 19:30:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:14 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:14 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:14 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:14 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000001c0), &(0x7f0000000200)=0x8) 19:30:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000200), &(0x7f0000000240)=0x8) 19:30:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:15 executing program 7: syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:15 executing program 7: syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:15 executing program 7: syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:16 executing program 1: socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:16 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000001380)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)}, &(0x7f0000000180)=0x10) 19:30:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) [ 926.543586] kauditd_printk_skb: 8 callbacks suppressed [ 926.543609] audit: type=1326 audit(1529695816.541:2057): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25761 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:16 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:16 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:16 executing program 1: socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) [ 926.971541] audit: type=1326 audit(1529695816.970:2058): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25796 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:17 executing program 2: dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:17 executing program 1: socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:17 executing program 2: dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:17 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:17 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:17 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:17 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:17 executing program 2: dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) [ 928.020698] audit: type=1326 audit(1529695818.018:2059): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25874 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:18 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000000380)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x84) 19:30:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:18 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:18 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:18 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) [ 929.003750] audit: type=1326 audit(1529695819.002:2060): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25930 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:19 executing program 6: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:19 executing program 4: pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) [ 929.177171] audit: type=1326 audit(1529695819.175:2061): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25938 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:19 executing program 5: ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:19 executing program 4: pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) accept4$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e, 0x0) 19:30:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:20 executing program 5: ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:20 executing program 4: pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:20 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) syz_open_dev$sndmidi(&(0x7f0000000180)='/dev/snd/midiC#D#\x00', 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) [ 930.289711] audit: type=1326 audit(1529695820.287:2062): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26000 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:20 executing program 5: ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:20 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:20 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:20 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') 19:30:21 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000000)) time(&(0x7f0000000300)) 19:30:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:21 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:21 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) [ 931.284695] audit: type=1326 audit(1529695821.275:2063): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26062 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:21 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:21 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:21 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) [ 931.402839] audit: type=1326 audit(1529695821.385:2064): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26067 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:21 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) [ 931.557205] audit: type=1326 audit(1529695821.453:2065): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26076 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) [ 932.542901] audit: type=1326 audit(1529695822.541:2066): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26129 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) [ 932.639198] audit: type=1326 audit(1529695822.569:2067): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26131 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 932.659186] audit: type=1326 audit(1529695822.577:2068): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26133 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:22 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) dup(0xffffffffffffffff) ioctl$VHOST_SET_VRING_KICK(0xffffffffffffffff, 0x4008af20, &(0x7f0000000040)) 19:30:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000005140)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000006200), &(0x7f0000006240)=0x8) 19:30:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) [ 933.449523] audit: type=1326 audit(1529695823.447:2069): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26182 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 933.540823] audit: type=1326 audit(1529695823.539:2070): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26194 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:23 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) [ 933.610635] audit: type=1326 audit(1529695823.593:2071): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26199 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) [ 933.701621] audit: type=1326 audit(1529695823.700:2072): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26204 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 933.772349] audit: type=1326 audit(1529695823.741:2073): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26203 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 933.792533] audit: type=1326 audit(1529695823.755:2074): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26208 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:24 executing program 3: pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:24 executing program 2: io_submit(0x0, 0x1ffffffffffffc78, &(0x7f0000000000)) 19:30:24 executing program 3: pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:24 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) getrandom(&(0x7f0000000040)=""/144, 0x90, 0x0) 19:30:24 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001800)={&(0x7f0000000040)=@llc={0x1a}, 0x80, &(0x7f0000001640), 0x0, &(0x7f0000001700)}, 0x0) 19:30:24 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:24 executing program 3: pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:24 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:24 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:24 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:24 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:24 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:25 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:25 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000040)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c, &(0x7f0000000180), 0x0, &(0x7f00000001c0)}, 0x0) 19:30:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$RDS_CONG_MONITOR(0xffffffffffffffff, 0x114, 0x6, &(0x7f00000001c0), 0x4) 19:30:25 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) accept4(0xffffffffffffffff, &(0x7f0000000340)=@can, &(0x7f00000003c0)=0x80, 0x0) 19:30:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:25 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(0xffffffffffffffff, 0xc04c5349, &(0x7f0000000180)) 19:30:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:25 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5023d}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000080)) accept4(0xffffffffffffffff, &(0x7f0000000340)=@can, &(0x7f00000003c0)=0x80, 0x0) 19:30:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) seccomp(0x0, 0x0, &(0x7f00000002c0)={0x0, &(0x7f0000000280)}) getpeername$netlink(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 19:30:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f00000006c0)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:26 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f0000000180), 0x4) 19:30:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) [ 936.859815] kauditd_printk_skb: 7 callbacks suppressed [ 936.859837] audit: type=1326 audit(1529695826.858:2082): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26382 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000200), 0x263) 19:30:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:27 executing program 6: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:27 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023d}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:27 executing program 6: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:27 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000200), 0x263) 19:30:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:27 executing program 6: openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:27 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000200), 0x263) 19:30:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) [ 937.772850] audit: type=1326 audit(1529695827.771:2083): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26448 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 937.848898] audit: type=1326 audit(1529695827.844:2084): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26460 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:27 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000200), 0x263) 19:30:28 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:28 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000000)) syz_fuse_mount(&(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) 19:30:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:28 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:28 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:28 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) [ 938.797299] audit: type=1326 audit(1529695828.795:2085): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26498 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:28 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 938.853524] audit: type=1326 audit(1529695828.830:2086): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26509 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:29 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:29 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:29 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000006c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000400)) 19:30:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000001c0)=""/112, &(0x7f0000000040)=0x70) [ 939.777203] audit: type=1326 audit(1529695829.774:2087): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26547 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:29 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:29 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:29 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:30 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:30 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:30 executing program 4: openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:30 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:30 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:30 executing program 0: socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:30 executing program 0: socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:30 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:30 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:30 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:30 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:30 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:30 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:30 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:30 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:30 executing program 0: socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) [ 940.937645] audit: type=1326 audit(1529695830.936:2088): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26642 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:31 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:31 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:31 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) [ 941.054898] audit: type=1326 audit(1529695831.021:2089): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26641 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:31 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:31 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:31 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:31 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:31 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:31 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:31 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:31 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) [ 941.902999] audit: type=1326 audit(1529695831.901:2090): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26703 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:32 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) [ 941.988641] audit: type=1326 audit(1529695831.967:2091): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26714 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:32 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:32 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:32 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 19:30:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x11}}, 0x14}, 0x1}, 0x0) 19:30:32 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:32 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050096}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) [ 942.829650] audit: type=1326 audit(1529695832.828:2092): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26754 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:33 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) [ 942.959498] audit: type=1326 audit(1529695832.957:2093): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26771 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:33 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:33 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) [ 943.092899] audit: type=1326 audit(1529695833.091:2094): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26780 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:33 executing program 7: socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:33 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:33 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:33 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:33 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:33 executing program 7: socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) [ 943.890488] audit: type=1326 audit(1529695833.889:2095): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26820 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:34 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:34 executing program 7: socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) [ 944.185042] audit: type=1326 audit(1529695834.179:2096): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26848 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:34 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:34 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:34 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:34 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:34 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) [ 944.892733] audit: type=1326 audit(1529695834.891:2097): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26897 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0xfffffffffffffd5b, 0x0) 19:30:35 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:35 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:35 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:35 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 945.122554] audit: type=1326 audit(1529695835.121:2098): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26913 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:35 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) [ 945.196081] audit: type=1326 audit(1529695835.163:2099): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26921 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:35 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) ioctl$TUNSETOWNER(0xffffffffffffffff, 0x400454cc, 0x0) 19:30:35 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) msgget$private(0x0, 0x0) 19:30:35 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) msgget$private(0x0, 0x0) 19:30:36 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:36 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) msgget$private(0x0, 0x0) 19:30:36 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:36 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet(0x2, 0x0, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) 19:30:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:37 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:37 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:37 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 947.123923] kauditd_printk_skb: 4 callbacks suppressed [ 947.123946] audit: type=1326 audit(1529695837.122:2104): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27025 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:37 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000040)) 19:30:37 executing program 2: openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) [ 947.227279] audit: type=1326 audit(1529695837.215:2105): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27020 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:37 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) [ 947.303218] audit: type=1326 audit(1529695837.301:2106): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27038 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:37 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:37 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:37 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) [ 948.298288] audit: type=1326 audit(1529695838.296:2107): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27077 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) 19:30:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:38 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:38 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:38 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) 19:30:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:38 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:38 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:38 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:39 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 19:30:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000000c0)) 19:30:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:39 executing program 4: eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:39 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:39 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) [ 949.310990] audit: type=1326 audit(1529695839.309:2108): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27133 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:39 executing program 4: eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) [ 949.425457] audit: type=1326 audit(1529695839.400:2109): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27146 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:39 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:39 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:39 executing program 4: eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:40 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:40 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:40 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:40 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) 19:30:40 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:40 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023a}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:40 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) [ 950.343352] audit: type=1326 audit(1529695840.342:2110): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27190 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:40 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:40 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:40 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:40 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) [ 950.543967] audit: type=1326 audit(1529695840.542:2111): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27203 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:40 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000180), 0x4) 19:30:40 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:41 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {0x2}}, 0x14}, 0x1}, 0x0) 19:30:41 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501cd}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:41 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) [ 951.337639] audit: type=1326 audit(1529695841.336:2112): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27247 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:41 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:41 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:41 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000080)}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) [ 951.574015] audit: type=1326 audit(1529695841.572:2113): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27263 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:41 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:42 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:30:42 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:42 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) 19:30:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:30:42 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501fe}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) [ 952.655708] kauditd_printk_skb: 1 callbacks suppressed [ 952.655730] audit: type=1326 audit(1529695842.654:2115): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27328 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:42 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 952.758869] audit: type=1326 audit(1529695842.755:2116): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27330 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:42 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) [ 952.903011] audit: type=1326 audit(1529695842.899:2117): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27336 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:43 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:43 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) msgget$private(0x0, 0x0) 19:30:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:30:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:43 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050093}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) [ 953.625059] audit: type=1326 audit(1529695843.623:2118): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27367 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050093}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) [ 953.915257] audit: type=1326 audit(1529695843.913:2119): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27397 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) [ 954.084018] audit: type=1326 audit(1529695844.082:2120): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27406 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050093}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:44 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:44 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:44 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:44 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000080)=[{0x6}]}) eventfd(0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:30:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050093}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:44 executing program 3: socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) [ 954.980055] audit: type=1326 audit(1529695844.978:2121): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27454 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:45 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050093}]}) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) [ 955.153230] audit: type=1326 audit(1529695845.151:2122): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27464 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:45 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) [ 955.379932] audit: type=1326 audit(1529695845.378:2123): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27480 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050093}]}) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:45 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:45 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)) 19:30:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:30:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050093}]}) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet(0x2, 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e6fc344db6881e1b5004bd9636cc86569a68d98403c85668e8306ad6fc254445de849041bd0d7fa9efa30c237dd0de24f954ddd1b86c558ebefccb920bae90a7", "632bb745c3a1bd869bba1d0cc7c82000f9edcc04165b1923ee3f8737c6ecd72bb7d1c231a931b9174644212413ffb2b9e1c5c5eaef410344c2e83cec86dc5dc5", "81c3b73d50b41e10a4dd805ef1f1abc7872a1f2d12c0038fe5215f2d6a8a06e3"}) [ 956.188371] audit: type=1326 audit(1529695846.186:2124): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27522 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:46 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:46 executing program 6: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:46 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:46 executing program 6: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:47 executing program 7: getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:47 executing program 6: open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:47 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:47 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f00000002c0)=ANY=[]) 19:30:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050093}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:47 executing program 7: getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:47 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:47 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:47 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:47 executing program 7: getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050093}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:47 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050093}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) [ 958.078266] kauditd_printk_skb: 3 callbacks suppressed [ 958.078337] audit: type=1326 audit(1529695848.076:2128): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27629 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 958.118651] audit: type=1326 audit(1529695848.107:2129): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27630 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:48 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:48 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:48 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:48 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:48 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(0xffffffffffffffff, 0x10e, 0x5, &(0x7f0000000000), 0x4) 19:30:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:49 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:49 executing program 7: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:49 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050093}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) [ 959.088058] audit: type=1326 audit(1529695849.086:2130): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27694 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) [ 959.155855] audit: type=1326 audit(1529695849.123:2131): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27693 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:49 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050093}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:49 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0), 0xc) 19:30:50 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050093}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) msgget$private(0x0, 0x0) 19:30:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:50 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) [ 960.055199] audit: type=1326 audit(1529695850.053:2132): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27740 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:50 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) msgget$private(0x0, 0x0) 19:30:50 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) [ 960.268893] audit: type=1326 audit(1529695850.267:2133): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27754 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:50 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) msgget$private(0x0, 0x0) 19:30:50 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:50 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:51 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:51 executing program 1: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) [ 961.180144] audit: type=1326 audit(1529695851.178:2134): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27797 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) [ 961.307784] audit: type=1326 audit(1529695851.245:2135): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27806 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:51 executing program 1: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) [ 961.412448] audit: type=1326 audit(1529695851.363:2136): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27812 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:51 executing program 1: getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) ioctl$BLKDISCARD(0xffffffffffffffff, 0x1277, &(0x7f00000001c0)) 19:30:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) [ 962.276653] audit: type=1326 audit(1529695852.275:2137): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27864 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:52 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(0xffffffffffffffff, 0x80045400, &(0x7f0000000000)) 19:30:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f00000002c0), &(0x7f00000000c0), &(0x7f0000000100)) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000b00)={0x0, 0x0, 0x0, &(0x7f0000000880)}) 19:30:53 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) socket$inet6(0xa, 0x0, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) [ 963.281737] kauditd_printk_skb: 2 callbacks suppressed [ 963.281761] audit: type=1326 audit(1529695853.280:2140): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27922 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:53 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) [ 963.358998] audit: type=1326 audit(1529695853.307:2141): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27920 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) [ 963.468241] audit: type=1326 audit(1529695853.443:2142): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27934 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:53 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:53 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) [ 963.649168] audit: type=1326 audit(1529695853.647:2143): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27952 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:54 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:54 executing program 0: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:54 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000100)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 19:30:54 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:54 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:54 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) 19:30:54 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:54 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) [ 964.568809] audit: type=1326 audit(1529695854.561:2144): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27990 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) 19:30:54 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:54 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:54 executing program 0: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) [ 964.773817] audit: type=1326 audit(1529695854.772:2145): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28010 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:30:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:55 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:55 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f0000000740)=0x1c, 0x0) [ 965.491478] audit: type=1326 audit(1529695855.490:2146): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28048 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:30:55 executing program 3: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:55 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000040)) [ 965.743538] audit: type=1326 audit(1529695855.742:2147): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28068 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) [ 965.834397] audit: type=1326 audit(1529695855.780:2148): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28065 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:55 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:30:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:56 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:30:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:56 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:30:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:30:56 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:56 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50241}]}) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) [ 966.870921] audit: type=1326 audit(1529695856.869:2149): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28128 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:30:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:57 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:57 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:30:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50241}]}) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) 19:30:57 executing program 6: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:30:57 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) getresgid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) msgget$private(0x0, 0x0) 19:30:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50241}]}) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) 19:30:57 executing program 7: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:30:57 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:57 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:30:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50241}]}) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) 19:30:58 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:30:58 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:58 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) [ 968.418458] device bridge_slave_1 left promiscuous mode [ 968.424239] bridge0: port 2(bridge_slave_1) entered disabled state [ 968.435244] device bridge_slave_0 left promiscuous mode [ 968.440976] bridge0: port 1(bridge_slave_0) entered disabled state [ 968.477904] team0 (unregistering): Port device team_slave_1 removed [ 968.487711] team0 (unregistering): Port device team_slave_0 removed [ 968.499473] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 968.514255] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 968.539286] bond0 (unregistering): Released all slaves 19:30:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:30:58 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:58 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50241}]}) keyctl$unlink(0x9, 0x0, 0x0) 19:30:58 executing program 2: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:30:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 19:30:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6(0xa, 0x0, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:30:58 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:30:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:30:58 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50241}]}) keyctl$unlink(0x9, 0x0, 0x0) 19:30:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) [ 969.054662] kauditd_printk_skb: 3 callbacks suppressed [ 969.054686] audit: type=1326 audit(1529695859.053:2153): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28255 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:30:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6(0xa, 0x0, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:30:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:59 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:30:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50241}]}) keyctl$unlink(0x9, 0x0, 0x0) 19:30:59 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5023c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:30:59 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:30:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:30:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6(0xa, 0x0, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) [ 969.604595] IPVS: ftp: loaded support on port[0] = 21 [ 970.518844] bridge0: port 1(bridge_slave_0) entered blocking state [ 970.525286] bridge0: port 1(bridge_slave_0) entered disabled state [ 970.532771] device bridge_slave_0 entered promiscuous mode [ 970.569126] bridge0: port 2(bridge_slave_1) entered blocking state [ 970.575529] bridge0: port 2(bridge_slave_1) entered disabled state [ 970.582898] device bridge_slave_1 entered promiscuous mode [ 970.618298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 970.653832] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 970.754756] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 970.792579] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 970.952709] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 970.959951] team0: Port device team_slave_0 added [ 970.994668] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 971.001912] team0: Port device team_slave_1 added [ 971.036629] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 971.071981] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 971.109743] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 971.147606] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready 19:31:01 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:31:01 executing program 2: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:31:01 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:31:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50212}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:31:01 executing program 5: perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) 19:31:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6(0xa, 0x0, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:31:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=""/209, 0xe0}) 19:31:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) semget$private(0x0, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000140)=""/242) [ 971.357676] audit: type=1326 audit(1529695861.356:2155): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28363 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:31:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50212}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:31:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) [ 971.415578] audit: type=1326 audit(1529695861.356:2154): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28364 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:31:01 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:31:01 executing program 5: perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) [ 971.483030] device bridge_slave_1 left promiscuous mode [ 971.488805] bridge0: port 2(bridge_slave_1) entered disabled state 19:31:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) capget(&(0x7f0000000100), &(0x7f0000000180)) [ 971.555757] device bridge_slave_0 left promiscuous mode [ 971.561600] bridge0: port 1(bridge_slave_0) entered disabled state 19:31:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:31:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50212}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:31:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:31:01 executing program 5: perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) [ 971.681515] team0 (unregistering): Port device team_slave_1 removed 19:31:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) [ 971.766928] team0 (unregistering): Port device team_slave_0 removed [ 971.821961] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 971.845890] audit: type=1326 audit(1529695861.844:2156): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28406 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 971.882274] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 971.990246] bond0 (unregistering): Released all slaves [ 972.078702] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 972.090491] syz-executor0 cpuset=/ mems_allowed=0 [ 972.095514] CPU: 0 PID: 28375 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 972.102376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 972.111776] Call Trace: [ 972.114418] dump_stack+0x185/0x1d0 [ 972.118088] warn_alloc+0x430/0x690 [ 972.121775] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 972.126691] ? __msan_poison_alloca+0x15c/0x1d0 [ 972.131438] copy_process+0x778/0x9be0 [ 972.135376] ? __msan_poison_alloca+0x15c/0x1d0 [ 972.140094] ? handle_mm_fault+0x74eb/0x7ed0 [ 972.144552] ? handle_mm_fault+0x74eb/0x7ed0 [ 972.149005] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 972.154450] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 972.160478] ? handle_mm_fault+0x1eb0/0x7ed0 [ 972.164926] ? __msan_poison_alloca+0x141/0x1d0 [ 972.169654] _do_fork+0x353/0xf60 [ 972.173159] __x64_sys_clone+0x15e/0x1b0 [ 972.177257] ? __ia32_sys_vfork+0x70/0x70 [ 972.181430] do_syscall_64+0x15b/0x230 [ 972.185353] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 972.190567] RIP: 0033:0x458429 [ 972.193771] RSP: 002b:00007ffc3a0132d8 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 972.201519] RAX: ffffffffffffffda RBX: 00007ffc3a013390 RCX: 0000000000458429 [ 972.208809] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 972.216118] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 972.223411] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 972.230701] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 972.238449] Mem-Info: [ 972.241010] active_anon:145664 inactive_anon:73 isolated_anon:0 [ 972.241010] active_file:772 inactive_file:782 isolated_file:0 [ 972.241010] unevictable:0 dirty:35 writeback:0 unstable:0 [ 972.241010] slab_reclaimable:3347 slab_unreclaimable:9343 [ 972.241010] mapped:66640 shmem:84 pagetables:1257 bounce:0 [ 972.241010] free:31713 free_pcp:292 free_cma:0 [ 972.274259] Node 0 active_anon:582656kB inactive_anon:292kB active_file:2784kB inactive_file:3524kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:265980kB dirty:140kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 239616kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 972.302421] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 972.328941] lowmem_reserve[]: 0 2817 7244 7244 [ 972.333684] Node 0 DMA32 free:60472kB min:26224kB low:32780kB high:39336kB active_anon:243220kB inactive_anon:16kB active_file:1780kB inactive_file:1128kB unevictable:0kB writepending:116kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2432kB pagetables:2044kB bounce:0kB free_pcp:672kB local_pcp:12kB free_cma:0kB [ 972.363311] lowmem_reserve[]: 0 0 4426 4426 [ 972.367927] Node 0 Normal free:53500kB min:41208kB low:51508kB high:61808kB active_anon:339436kB inactive_anon:276kB active_file:1048kB inactive_file:1620kB unevictable:0kB writepending:24kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7360kB pagetables:2984kB bounce:0kB free_pcp:372kB local_pcp:0kB free_cma:0kB [ 972.397411] lowmem_reserve[]: 0 0 0 0 [ 972.401490] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 972.414955] Node 0 DMA32: 696*4kB (UM) 4154*8kB (UM) 569*16kB (UM) 46*32kB (UM) 2*64kB (U) 2*128kB (U) 0*256kB 0*512kB 0*1024kB 3*2048kB (H) 2*4096kB (H) = 61312kB [ 972.430189] Node 0 Normal: 838*4kB (UMEH) 513*8kB (UMEH) 274*16kB (UMEH) 117*32kB (UMEH) 85*64kB (UMH) 50*128kB (UM) 4*256kB (M) 2*512kB (M) 1*1024kB (M) 3*2048kB (UM) 4*4096kB (UMH) = 53024kB [ 972.447939] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 972.456749] 1331 total pagecache pages [ 972.460765] 0 pages in swap cache [ 972.464487] Swap cache stats: add 0, delete 0, find 0/0 [ 972.470256] Free swap = 0kB [ 972.473516] Total swap = 0kB [ 972.476615] 1965969 pages RAM [ 972.479974] 0 pages HighMem/MovableOnly [ 972.484170] 106316 pages reserved [ 972.589165] audit: type=1326 audit(1529695862.587:2157): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28414 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:31:02 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) 19:31:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:31:02 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50241}]}) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) 19:31:02 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:31:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) [ 974.957205] IPVS: ftp: loaded support on port[0] = 21 [ 975.797559] bridge0: port 1(bridge_slave_0) entered blocking state [ 975.804030] bridge0: port 1(bridge_slave_0) entered disabled state [ 975.812378] device bridge_slave_0 entered promiscuous mode [ 975.850117] bridge0: port 2(bridge_slave_1) entered blocking state [ 975.856563] bridge0: port 2(bridge_slave_1) entered disabled state [ 975.863950] device bridge_slave_1 entered promiscuous mode [ 975.900534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 975.937577] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 976.042992] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 976.082801] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 976.249599] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 976.256844] team0: Port device team_slave_0 added [ 976.344709] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 976.355348] syz-executor0 cpuset=syz0 mems_allowed=0 [ 976.360495] CPU: 0 PID: 28495 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 976.367330] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 976.376676] Call Trace: [ 976.379281] dump_stack+0x185/0x1d0 [ 976.382912] warn_alloc+0x430/0x690 [ 976.386549] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 976.391417] ? kernel_poison_pages+0x40/0x360 [ 976.395915] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 976.401368] ? __jbd2_journal_temp_unlink_buffer+0x814/0x920 [ 976.407183] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 976.412213] ? kmsan_set_origin_inline+0x6b/0x120 [ 976.417059] ? __msan_poison_alloca+0x15c/0x1d0 [ 976.421836] kmsan_alloc_page+0x82/0xe0 [ 976.425825] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 976.430582] ? kmsan_set_origin_inline+0x6b/0x120 [ 976.435423] ? __msan_poison_alloca+0x15c/0x1d0 [ 976.440089] ? __should_failslab+0x278/0x2a0 [ 976.444496] ? should_fail+0x57/0xab0 [ 976.448289] ? __should_failslab+0x278/0x2a0 [ 976.452701] ? kmsan_set_origin_inline+0x6b/0x120 [ 976.457551] ? __msan_poison_alloca+0x15c/0x1d0 [ 976.462228] ? kmsan_set_origin+0x9e/0x160 [ 976.466472] alloc_pages_vma+0x1555/0x17f0 [ 976.470711] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 976.475827] handle_mm_fault+0x44ca/0x7ed0 [ 976.480064] ? kmsan_set_origin_inline+0x6b/0x120 [ 976.484922] __do_page_fault+0xec6/0x1a10 [ 976.489080] do_page_fault+0xb7/0x250 [ 976.492878] ? page_fault+0x8/0x30 [ 976.496415] page_fault+0x1e/0x30 [ 976.499866] RIP: 0033:0x4075fa [ 976.503052] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 976.509019] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 976.516284] RDX: 2890357a17eee192 RSI: 0000000000000000 RDI: 0000000001873848 [ 976.523555] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 976.530830] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ee8f7 [ 976.538096] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 976.545369] Mem-Info: [ 976.547797] active_anon:142806 inactive_anon:78 isolated_anon:0 [ 976.547797] active_file:1608 inactive_file:1641 isolated_file:0 [ 976.547797] unevictable:0 dirty:43 writeback:0 unstable:0 [ 976.547797] slab_reclaimable:3338 slab_unreclaimable:9329 [ 976.547797] mapped:67991 shmem:84 pagetables:1195 bounce:0 [ 976.547797] free:31976 free_pcp:382 free_cma:0 [ 976.580929] Node 0 active_anon:571224kB inactive_anon:312kB active_file:6316kB inactive_file:6448kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:271732kB dirty:172kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 253952kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 976.608863] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 976.634998] lowmem_reserve[]: 0 2817 7244 7244 [ 976.639593] Node 0 DMA32 free:63140kB min:26224kB low:32780kB high:39336kB active_anon:241736kB inactive_anon:28kB active_file:4096kB inactive_file:4208kB unevictable:0kB writepending:120kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2240kB pagetables:1912kB bounce:0kB free_pcp:988kB local_pcp:336kB free_cma:0kB [ 976.669518] lowmem_reserve[]: 0 0 4426 4426 [ 976.673933] Node 0 Normal free:49364kB min:41208kB low:51508kB high:61808kB active_anon:329404kB inactive_anon:284kB active_file:2336kB inactive_file:2276kB unevictable:0kB writepending:52kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7424kB pagetables:2868kB bounce:0kB free_pcp:564kB local_pcp:404kB free_cma:0kB [ 976.703278] lowmem_reserve[]: 0 0 0 0 [ 976.707082] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 976.720315] Node 0 DMA32: 719*4kB (UME) 3704*8kB (UME) 444*16kB (UME) 72*32kB (UME) 21*64kB (M) 45*128kB (UM) 29*256kB (UM) 8*512kB (UM) 3*1024kB (UME) 0*2048kB 0*4096kB = 63612kB [ 976.736505] Node 0 Normal: 1775*4kB (UMEH) 2179*8kB (UMEH) 330*16kB (UMEH) 141*32kB (UMEH) 89*64kB (UMH) 51*128kB (UMH) 3*256kB (M) 2*512kB (M) 1*1024kB (M) 0*2048kB 0*4096kB = 49364kB [ 976.753140] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 976.761712] 2994 total pagecache pages [ 976.765585] 0 pages in swap cache [ 976.769025] Swap cache stats: add 0, delete 0, find 0/0 [ 976.774371] Free swap = 0kB [ 976.777424] Total swap = 0kB [ 976.780430] 1965969 pages RAM [ 976.783619] 0 pages HighMem/MovableOnly [ 976.787587] 106316 pages reserved 19:31:06 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50241}]}) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) 19:31:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:31:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) semget$private(0x0, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000140)=""/242) 19:31:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:31:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:31:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:31:07 executing program 6: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, &(0x7f0000000880), 0x0) [ 977.072071] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 977.082599] syz-executor4 cpuset=syz4 mems_allowed=0 [ 977.087735] CPU: 1 PID: 28499 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 977.094568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.103930] Call Trace: [ 977.106517] dump_stack+0x185/0x1d0 [ 977.110147] warn_alloc+0x430/0x690 [ 977.113785] __alloc_pages_nodemask+0x5b1c/0x5cc0 19:31:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='/dev/full\x00', 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000200), &(0x7f0000000240)=0x4) [ 977.118645] ? kernel_poison_pages+0x40/0x360 [ 977.123146] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 977.128624] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 977.133649] ? kmsan_set_origin_inline+0x6b/0x120 [ 977.138487] ? __msan_poison_alloca+0x15c/0x1d0 [ 977.143162] kmsan_alloc_page+0x82/0xe0 [ 977.147141] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 977.151900] ? kmsan_set_origin_inline+0x6b/0x120 [ 977.156745] ? __msan_poison_alloca+0x15c/0x1d0 [ 977.161411] ? __should_failslab+0x278/0x2a0 [ 977.165818] ? should_fail+0x57/0xab0 [ 977.169614] ? __should_failslab+0x278/0x2a0 [ 977.174019] ? kmsan_set_origin_inline+0x6b/0x120 [ 977.178878] ? __msan_poison_alloca+0x15c/0x1d0 [ 977.183553] ? kmsan_set_origin+0x9e/0x160 [ 977.187795] alloc_pages_vma+0x1555/0x17f0 [ 977.192037] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 977.197140] handle_mm_fault+0x44ca/0x7ed0 [ 977.201360] ? kmsan_set_origin_inline+0x6b/0x120 [ 977.206197] __do_page_fault+0xec6/0x1a10 [ 977.210336] do_page_fault+0xb7/0x250 [ 977.214147] ? page_fault+0x8/0x30 [ 977.217674] page_fault+0x1e/0x30 [ 977.221110] RIP: 0033:0x4075fa [ 977.224280] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 977.229627] RAX: 0000000020006ac0 RBX: 0000000000000000 RCX: 0000000000000001 [ 977.236880] RDX: 24a66ced021e00e8 RSI: 0000000000000000 RDI: 0000000000f0d848 [ 977.244132] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 977.251396] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000eebcf [ 977.258645] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 19:31:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) [ 977.331176] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 977.341705] syz-executor4 cpuset=syz4 mems_allowed=0 [ 977.346850] CPU: 1 PID: 28504 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 977.353684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 977.363033] Call Trace: [ 977.365628] dump_stack+0x185/0x1d0 [ 977.369261] warn_alloc+0x430/0x690 [ 977.372900] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 977.377743] ? kernel_poison_pages+0x40/0x360 [ 977.382239] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 977.387687] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 977.392638] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 977.397665] ? kmsan_set_origin_inline+0x6b/0x120 [ 977.402510] ? __msan_poison_alloca+0x15c/0x1d0 [ 977.407187] kmsan_alloc_page+0x82/0xe0 [ 977.411162] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 977.415918] ? kmsan_set_origin_inline+0x6b/0x120 [ 977.420760] ? __msan_poison_alloca+0x15c/0x1d0 [ 977.425426] ? __should_failslab+0x278/0x2a0 [ 977.429835] ? should_fail+0x57/0xab0 [ 977.433633] ? __should_failslab+0x278/0x2a0 [ 977.438043] ? kmsan_set_origin_inline+0x6b/0x120 [ 977.442888] ? __msan_poison_alloca+0x15c/0x1d0 [ 977.447556] ? kmsan_set_origin+0x9e/0x160 [ 977.451791] alloc_pages_vma+0x1555/0x17f0 [ 977.456026] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 977.461130] handle_mm_fault+0x44ca/0x7ed0 [ 977.465359] ? kmsan_set_origin_inline+0x6b/0x120 [ 977.470219] __do_page_fault+0xec6/0x1a10 [ 977.474370] do_page_fault+0xb7/0x250 [ 977.478163] ? page_fault+0x8/0x30 [ 977.481695] page_fault+0x1e/0x30 [ 977.485136] RIP: 0033:0x4075fa [ 977.488324] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 977.493676] RAX: 0000000020006ac0 RBX: 0000000000000000 RCX: 0000000000000000 [ 977.500948] RDX: 24a66ced021e00e8 RSI: 0000000000000000 RDI: 0000000000f0d848 [ 977.508474] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 977.515733] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000eecd2 [ 977.522994] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 19:31:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:31:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) semget$private(0x0, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000140)=""/242) [ 977.802446] device bridge_slave_1 left promiscuous mode [ 977.808242] bridge0: port 2(bridge_slave_1) entered disabled state 19:31:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) semget$private(0x0, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000140)=""/242) [ 977.870149] device bridge_slave_0 left promiscuous mode [ 977.875891] bridge0: port 1(bridge_slave_0) entered disabled state 19:31:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(0xffffffffffffffff, &(0x7f00000012c0), 0x0, 0x0) 19:31:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) 19:31:07 executing program 5: seccomp(0x0, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50241}]}) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) 19:31:07 executing program 1: socket$inet6(0xa, 0x0, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:31:08 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000700)=ANY=[], 0x0) 19:31:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f0000000040)) [ 977.956727] team0 (unregistering): Port device team_slave_1 removed [ 977.981028] team0 (unregistering): Port device team_slave_0 removed 19:31:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000006c0)}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) [ 978.025721] bond0 (unregistering): Releasing backup interface bond_slave_1 19:31:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000140)=""/242) [ 978.075651] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 978.217319] bond0 (unregistering): Released all slaves 19:31:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000140)=""/242) 19:31:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:31:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:31:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50207}]}) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000140)=""/242) 19:31:08 executing program 0: semget$private(0x0, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000140)=""/242) [ 978.757788] IPVS: ftp: loaded support on port[0] = 21 [ 978.764522] IPVS: ftp: loaded support on port[0] = 21 [ 978.826874] IPVS: ftp: loaded support on port[0] = 21 [ 978.845223] IPVS: ftp: loaded support on port[0] = 21 19:31:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50245}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:31:08 executing program 0: semget$private(0x0, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000140)=""/242) [ 978.923859] IPVS: ftp: loaded support on port[0] = 21 [ 978.935858] IPVS: ftp: loaded support on port[0] = 21 19:31:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) [ 979.981849] IPVS: ftp: loaded support on port[0] = 21 [ 981.186832] device bridge_slave_1 left promiscuous mode [ 981.192569] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.231829] device bridge_slave_0 left promiscuous mode [ 981.237574] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.261735] device bridge_slave_1 left promiscuous mode [ 981.267428] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.288972] device bridge_slave_0 left promiscuous mode [ 981.294614] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.307659] device bridge_slave_1 left promiscuous mode [ 981.313340] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.324908] device bridge_slave_0 left promiscuous mode [ 981.330539] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.343582] device bridge_slave_1 left promiscuous mode [ 981.349286] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.360910] device bridge_slave_0 left promiscuous mode [ 981.366534] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.378589] device bridge_slave_1 left promiscuous mode [ 981.384307] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.395941] device bridge_slave_0 left promiscuous mode [ 981.401601] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.414666] device bridge_slave_1 left promiscuous mode [ 981.420368] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.431928] device bridge_slave_0 left promiscuous mode [ 981.437610] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.450649] device bridge_slave_1 left promiscuous mode [ 981.456328] bridge0: port 2(bridge_slave_1) entered disabled state [ 981.467871] device bridge_slave_0 left promiscuous mode [ 981.473495] bridge0: port 1(bridge_slave_0) entered disabled state [ 981.628850] team0 (unregistering): Port device team_slave_0 removed [ 981.639505] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 981.654852] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 981.684156] bond0 (unregistering): Released all slaves [ 981.703464] team0 (unregistering): Port device team_slave_1 removed [ 981.714845] team0 (unregistering): Port device team_slave_0 removed [ 981.725647] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 981.749618] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 981.771889] bond0 (unregistering): Released all slaves [ 981.789017] team0 (unregistering): Port device team_slave_1 removed [ 981.798628] team0 (unregistering): Port device team_slave_0 removed [ 981.808263] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 981.826865] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 981.848556] bond0 (unregistering): Released all slaves [ 981.868683] team0 (unregistering): Port device team_slave_1 removed [ 981.877910] team0 (unregistering): Port device team_slave_0 removed [ 981.887161] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 981.902929] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 981.924872] bond0 (unregistering): Released all slaves [ 981.946363] team0 (unregistering): Port device team_slave_1 removed [ 981.957857] team0 (unregistering): Port device team_slave_0 removed [ 981.969533] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 981.990419] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 982.071581] IPVS: ftp: loaded support on port[0] = 21 [ 982.085998] bond0 (unregistering): Released all slaves [ 982.103582] team0 (unregistering): Port device team_slave_1 removed [ 982.113139] team0 (unregistering): Port device team_slave_0 removed [ 982.124187] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 982.139865] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 982.163602] bond0 (unregistering): Released all slaves [ 982.181029] team0 (unregistering): Port device team_slave_1 removed [ 982.190500] team0 (unregistering): Port device team_slave_0 removed [ 982.200004] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 982.218774] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 982.243560] bond0 (unregistering): Released all slaves [ 982.878176] bridge0: port 1(bridge_slave_0) entered blocking state [ 982.884676] bridge0: port 1(bridge_slave_0) entered disabled state [ 982.935551] device bridge_slave_0 entered promiscuous mode [ 983.047488] bridge0: port 1(bridge_slave_0) entered blocking state [ 983.053956] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.103936] device bridge_slave_0 entered promiscuous mode [ 983.137273] bridge0: port 2(bridge_slave_1) entered blocking state [ 983.143736] bridge0: port 2(bridge_slave_1) entered disabled state [ 983.201699] device bridge_slave_1 entered promiscuous mode [ 983.320375] bridge0: port 2(bridge_slave_1) entered blocking state [ 983.326932] bridge0: port 2(bridge_slave_1) entered disabled state [ 983.372237] device bridge_slave_1 entered promiscuous mode [ 983.413227] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 983.423585] IPVS: ftp: loaded support on port[0] = 21 [ 983.471841] IPVS: ftp: loaded support on port[0] = 21 [ 983.491614] IPVS: ftp: loaded support on port[0] = 21 [ 983.568632] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 983.637122] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 983.755492] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 983.901039] bridge0: port 1(bridge_slave_0) entered blocking state [ 983.907566] bridge0: port 1(bridge_slave_0) entered disabled state [ 983.955173] device bridge_slave_0 entered promiscuous mode [ 984.188882] bridge0: port 2(bridge_slave_1) entered blocking state [ 984.195380] bridge0: port 2(bridge_slave_1) entered disabled state [ 984.203590] device bridge_slave_1 entered promiscuous mode [ 984.284334] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 984.387281] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 984.412844] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 984.535080] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 984.622140] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 984.641549] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 984.771432] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 984.778561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 984.883530] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 984.890698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 984.983505] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 984.990577] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 985.131021] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 985.142725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 985.304776] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 985.345761] bridge0: port 1(bridge_slave_0) entered blocking state [ 985.352260] bridge0: port 1(bridge_slave_0) entered disabled state [ 985.386137] device bridge_slave_0 entered promiscuous mode [ 985.552838] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 985.617576] bridge0: port 2(bridge_slave_1) entered blocking state [ 985.624331] bridge0: port 2(bridge_slave_1) entered disabled state [ 985.670228] device bridge_slave_1 entered promiscuous mode [ 985.708156] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 985.722203] team0: Port device team_slave_0 added [ 985.775739] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 985.797947] team0: Port device team_slave_0 added [ 985.826880] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 985.834471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 985.861579] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 985.909365] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 985.937638] team0: Port device team_slave_1 added [ 986.061506] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 986.069761] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 986.085920] team0: Port device team_slave_1 added [ 986.133540] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 986.166445] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 986.185445] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 986.192453] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 986.205839] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 986.317822] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 986.324836] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 986.337859] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 986.416677] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 986.500563] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 986.509409] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 986.522883] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 986.632985] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 986.649579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 986.665057] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 986.720194] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 986.727561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 986.739004] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 986.776162] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 986.803405] team0: Port device team_slave_0 added [ 986.866826] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 986.874849] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 986.903458] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 986.927236] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 986.938401] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 986.967468] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 986.992465] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 987.006859] team0: Port device team_slave_1 added [ 987.033882] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.040391] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.062351] device bridge_slave_0 entered promiscuous mode [ 987.087258] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 987.181062] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 987.190491] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 987.211880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 987.264588] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 987.273375] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.279816] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.300660] device bridge_slave_0 entered promiscuous mode [ 987.334717] bridge0: port 1(bridge_slave_0) entered blocking state [ 987.341238] bridge0: port 1(bridge_slave_0) entered disabled state [ 987.371227] device bridge_slave_0 entered promiscuous mode [ 987.393073] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.399594] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.409318] device bridge_slave_1 entered promiscuous mode [ 987.423115] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 987.433803] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 987.450544] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 987.478970] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.485477] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.520271] device bridge_slave_1 entered promiscuous mode [ 987.559506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 987.577851] bridge0: port 2(bridge_slave_1) entered blocking state [ 987.584305] bridge0: port 2(bridge_slave_1) entered disabled state [ 987.635210] device bridge_slave_1 entered promiscuous mode [ 987.663225] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 987.670678] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 987.678990] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 987.687939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 987.697507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 987.740989] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 987.766637] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 987.795766] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 987.860978] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 987.879617] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 987.887140] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 987.909356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 988.056315] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 988.200807] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 988.313683] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 988.334062] team0: Port device team_slave_0 added [ 988.396624] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 988.414674] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 988.474358] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 988.503506] team0: Port device team_slave_1 added [ 988.571012] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 988.587534] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 988.594514] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 988.653906] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 988.698842] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 988.706289] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 988.726468] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 988.764373] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 988.774038] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 988.781177] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 988.851488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 988.858467] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 988.953344] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 988.960859] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 989.001175] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 989.008231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 989.020400] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 989.067798] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 989.076527] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 989.161296] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 989.181208] bridge0: port 2(bridge_slave_1) entered blocking state [ 989.187671] bridge0: port 2(bridge_slave_1) entered forwarding state [ 989.194448] bridge0: port 1(bridge_slave_0) entered blocking state [ 989.200861] bridge0: port 1(bridge_slave_0) entered forwarding state [ 989.240695] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 989.247233] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 989.272464] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 989.279971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 989.294015] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 989.307715] bridge0: port 2(bridge_slave_1) entered blocking state [ 989.314146] bridge0: port 2(bridge_slave_1) entered forwarding state [ 989.320915] bridge0: port 1(bridge_slave_0) entered blocking state [ 989.327328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 989.342359] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 989.390596] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 989.420745] team0: Port device team_slave_0 added [ 989.445539] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 989.458444] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 989.481044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 989.546177] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 989.566771] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 989.617582] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 989.634606] team0: Port device team_slave_1 added [ 989.723836] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 989.752896] team0: Port device team_slave_0 added [ 989.770427] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 989.780933] team0: Port device team_slave_0 added [ 989.824834] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 989.832823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 989.851504] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 989.917420] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 989.946043] team0: Port device team_slave_1 added [ 989.993346] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 990.007268] team0: Port device team_slave_1 added [ 990.064857] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 990.071903] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 990.088789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 990.148511] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 990.155551] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 990.168415] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 990.204525] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 990.214183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 990.226299] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 990.270041] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 990.277528] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 990.302767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 990.331159] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 990.338554] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 990.355493] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 990.382017] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 990.411141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 990.432070] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 990.463077] bridge0: port 2(bridge_slave_1) entered blocking state [ 990.469570] bridge0: port 2(bridge_slave_1) entered forwarding state [ 990.476386] bridge0: port 1(bridge_slave_0) entered blocking state [ 990.482814] bridge0: port 1(bridge_slave_0) entered forwarding state [ 990.490241] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 990.519616] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 990.528851] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 990.536286] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 990.561334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 990.585703] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 990.612295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 990.624449] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 990.657711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 990.684968] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 990.706273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 990.745744] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 990.755273] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 990.774999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 990.827586] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 990.836764] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 990.854271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 991.702635] bridge0: port 2(bridge_slave_1) entered blocking state [ 991.709163] bridge0: port 2(bridge_slave_1) entered forwarding state [ 991.715952] bridge0: port 1(bridge_slave_0) entered blocking state [ 991.722357] bridge0: port 1(bridge_slave_0) entered forwarding state [ 991.764539] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 991.772551] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 992.604511] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.610969] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.617735] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.624139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.665457] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 992.776245] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 992.839218] bridge0: port 2(bridge_slave_1) entered blocking state [ 992.845686] bridge0: port 2(bridge_slave_1) entered forwarding state [ 992.852497] bridge0: port 1(bridge_slave_0) entered blocking state [ 992.858943] bridge0: port 1(bridge_slave_0) entered forwarding state [ 992.874522] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 993.099208] bridge0: port 2(bridge_slave_1) entered blocking state [ 993.105757] bridge0: port 2(bridge_slave_1) entered forwarding state [ 993.112557] bridge0: port 1(bridge_slave_0) entered blocking state [ 993.119004] bridge0: port 1(bridge_slave_0) entered forwarding state [ 993.157426] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 993.824630] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 993.835405] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 997.286380] 8021q: adding VLAN 0 to HW filter on device bond0 [ 997.696652] device bridge_slave_1 left promiscuous mode [ 997.702375] bridge0: port 2(bridge_slave_1) entered disabled state [ 997.770213] device bridge_slave_0 left promiscuous mode [ 997.776026] bridge0: port 1(bridge_slave_0) entered disabled state 19:31:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501ea}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000180)='htcp\x00', 0x1) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f00000000c0), &(0x7f0000000100)=0x40) 19:31:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) [ 997.842914] team0 (unregistering): Port device team_slave_1 removed [ 997.855360] team0 (unregistering): Port device team_slave_0 removed [ 997.866503] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 997.889814] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 998.036747] IPVS: ftp: loaded support on port[0] = 21 [ 998.055485] bond0 (unregistering): Released all slaves [ 998.102339] IPVS: ftp: loaded support on port[0] = 21 [ 998.401158] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 999.002303] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 999.009923] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 999.021688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 999.545724] 8021q: adding VLAN 0 to HW filter on device team0 [ 1000.119686] device bridge_slave_1 left promiscuous mode [ 1000.125391] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.165405] device bridge_slave_0 left promiscuous mode [ 1000.171169] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.193273] device bridge_slave_1 left promiscuous mode [ 1000.199536] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.212813] device bridge_slave_0 left promiscuous mode [ 1000.218401] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.231278] device bridge_slave_1 left promiscuous mode [ 1000.236854] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.247762] device bridge_slave_0 left promiscuous mode [ 1000.253329] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.297436] team0 (unregistering): Port device team_slave_1 removed [ 1000.306814] team0 (unregistering): Port device team_slave_0 removed [ 1000.315864] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1000.329519] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1000.353217] bond0 (unregistering): Released all slaves [ 1000.371692] team0 (unregistering): Port device team_slave_1 removed [ 1000.380870] team0 (unregistering): Port device team_slave_0 removed [ 1000.390019] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1000.408683] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1000.430823] bond0 (unregistering): Released all slaves [ 1000.447858] team0 (unregistering): Port device team_slave_1 removed [ 1000.457072] team0 (unregistering): Port device team_slave_0 removed [ 1000.466322] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1000.482771] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1000.504887] bond0 (unregistering): Released all slaves [ 1000.657236] bridge0: port 1(bridge_slave_0) entered blocking state [ 1000.663711] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.685142] device bridge_slave_0 entered promiscuous mode [ 1000.780731] bridge0: port 1(bridge_slave_0) entered blocking state [ 1000.787193] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.808662] device bridge_slave_0 entered promiscuous mode [ 1000.834727] bridge0: port 2(bridge_slave_1) entered blocking state [ 1000.841242] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.885419] device bridge_slave_1 entered promiscuous mode [ 1000.952267] bridge0: port 2(bridge_slave_1) entered blocking state [ 1000.958735] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.984060] device bridge_slave_1 entered promiscuous mode [ 1001.016859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1001.115607] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1001.132820] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1001.276218] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1001.484635] bond0: Enslaving bond_slave_0 as an active interface with an up link 19:31:31 executing program 1: socket$inet6(0xa, 0x0, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:31:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) [ 1001.654551] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1001.685349] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1001.844229] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1001.851253] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1001.885578] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1001.982495] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1001.989524] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1002.045455] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1002.052475] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1002.180942] IPVS: ftp: loaded support on port[0] = 21 [ 1002.200221] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1002.207293] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1002.413026] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1002.427612] team0: Port device team_slave_0 added [ 1002.545633] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1002.559684] team0: Port device team_slave_1 added [ 1002.571121] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1002.601355] team0: Port device team_slave_0 added [ 1002.704614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1002.730312] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1002.743270] team0: Port device team_slave_1 added [ 1002.784437] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1002.853612] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1002.861204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1002.870374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1002.887345] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1002.894574] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1002.910119] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1002.949231] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1002.956728] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1002.980033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1003.005064] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 1003.012896] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1003.025846] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1003.083360] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 1003.090791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1003.108834] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready 19:31:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x0, {0x2, 0x0, @loopback=0x7f000001}, 'veth0_to_bridge\x00'}) 19:31:33 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5023c}]}) openat$null(0xffffffffffffff9c, &(0x7f0000005b40)='/dev/null\x00', 0x0, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 19:31:33 executing program 0: semget$private(0x0, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0xc, &(0x7f0000000140)=""/242) 19:31:33 executing program 1: socket$inet6(0xa, 0x0, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) 19:31:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000000c0)}) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) [ 1003.229783] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1003.240343] syz-executor3 cpuset=syz3 mems_allowed=0 [ 1003.245463] CPU: 0 PID: 29998 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 1003.252292] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.256729] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 1003.261631] Call Trace: [ 1003.261653] dump_stack+0x185/0x1d0 [ 1003.261669] warn_alloc+0x430/0x690 [ 1003.261694] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1003.261708] ? kernel_poison_pages+0x40/0x360 [ 1003.261724] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1003.261748] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1003.269120] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1003.271172] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 1003.271211] kmsan_alloc_page+0x82/0xe0 [ 1003.276948] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1003.278431] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1003.278446] ? kmsan_set_origin_inline+0x6b/0x120 [ 1003.278458] ? __msan_poison_alloca+0x15c/0x1d0 [ 1003.278469] ? __should_failslab+0x278/0x2a0 [ 1003.278484] ? should_fail+0x57/0xab0 [ 1003.278495] ? __should_failslab+0x278/0x2a0 [ 1003.278507] ? kmsan_set_origin_inline+0x6b/0x120 [ 1003.278517] ? __msan_poison_alloca+0x15c/0x1d0 [ 1003.278540] ? kmsan_set_origin+0x9e/0x160 [ 1003.362320] alloc_pages_vma+0x1555/0x17f0 [ 1003.366559] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1003.371667] handle_mm_fault+0x44ca/0x7ed0 [ 1003.375900] ? kmsan_set_origin_inline+0x6b/0x120 [ 1003.380750] __do_page_fault+0xec6/0x1a10 [ 1003.384906] do_page_fault+0xb7/0x250 [ 1003.388729] ? page_fault+0x8/0x30 [ 1003.392265] page_fault+0x1e/0x30 [ 1003.395711] RIP: 0033:0x4075fa [ 1003.398893] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1003.404251] RAX: 0000000020006ac0 RBX: 0000000000000000 RCX: 0000000000000001 [ 1003.411515] RDX: e5777f066764b5a5 RSI: 0000000000000000 RDI: 0000000001382848 [ 1003.418797] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1003.426062] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f51fd [ 1003.433330] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1003.440608] warn_alloc_show_mem: 2 callbacks suppressed [ 1003.440611] Mem-Info: [ 1003.448387] active_anon:144073 inactive_anon:78 isolated_anon:0 [ 1003.448387] active_file:1560 inactive_file:3093 isolated_file:0 [ 1003.448387] unevictable:0 dirty:50 writeback:0 unstable:0 [ 1003.448387] slab_reclaimable:3296 slab_unreclaimable:8498 [ 1003.448387] mapped:56807 shmem:84 pagetables:1157 bounce:0 [ 1003.448387] free:31241 free_pcp:486 free_cma:0 [ 1003.481496] Node 0 active_anon:576176kB inactive_anon:312kB active_file:6240kB inactive_file:12372kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:229084kB dirty:200kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 253952kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1003.509524] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1003.535664] lowmem_reserve[]: 0 2817 7244 7244 [ 1003.540259] Node 0 DMA32 free:50424kB min:26224kB low:32780kB high:39336kB active_anon:246844kB inactive_anon:28kB active_file:4356kB inactive_file:10408kB unevictable:0kB writepending:164kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2688kB pagetables:1828kB bounce:0kB free_pcp:984kB local_pcp:572kB free_cma:0kB [ 1003.569694] lowmem_reserve[]: 0 0 4426 4426 [ 1003.574111] Node 0 Normal free:36560kB min:41208kB low:51508kB high:61808kB active_anon:329416kB inactive_anon:284kB active_file:1884kB inactive_file:1900kB unevictable:0kB writepending:36kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2800kB bounce:0kB free_pcp:864kB local_pcp:660kB free_cma:0kB [ 1003.603461] lowmem_reserve[]: 0 0 0 0 [ 1003.607274] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1003.620595] Node 0 DMA32: 30*4kB (ME) 2734*8kB (UM) 432*16kB (ME) 60*32kB (UME) 17*64kB (UME) 14*128kB (UME) 12*256kB (UM) 8*512kB (UM) 4*1024kB (UME) 0*2048kB 0*4096kB = 44968kB [ 1003.636706] Node 0 Normal: 1400*4kB (UMEH) 500*8kB (MEH) 262*16kB (UMEH) 126*32kB (MEH) 67*64kB (UMH) 29*128kB (M) 2*256kB (MH) 4*512kB (UMH) 0*1024kB 0*2048kB 0*4096kB = 28384kB [ 1003.652838] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1003.661409] 4590 total pagecache pages [ 1003.665285] 0 pages in swap cache [ 1003.668727] Swap cache stats: add 0, delete 0, find 0/0 [ 1003.674076] Free swap = 0kB [ 1003.677081] Total swap = 0kB [ 1003.680086] 1965969 pages RAM [ 1003.683177] 0 pages HighMem/MovableOnly [ 1003.687141] 106316 pages reserved [ 1003.694884] syz-executor2: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1003.706253] syz-executor2 cpuset=/ mems_allowed=0 [ 1003.711378] CPU: 1 PID: 29922 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 1003.718232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.727609] Call Trace: [ 1003.730248] dump_stack+0x185/0x1d0 [ 1003.733923] warn_alloc+0x430/0x690 [ 1003.737615] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1003.742618] ? __msan_poison_alloca+0x15c/0x1d0 [ 1003.747384] copy_process+0x778/0x9be0 [ 1003.751320] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1003.756829] ? ptep_set_access_flags+0x10e/0x1d0 [ 1003.761624] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1003.767129] ? __msan_poison_alloca+0x141/0x1d0 [ 1003.771837] _do_fork+0x353/0xf60 [ 1003.775364] __x64_sys_clone+0x15e/0x1b0 [ 1003.779463] ? __ia32_sys_vfork+0x70/0x70 [ 1003.783638] do_syscall_64+0x15b/0x230 [ 1003.787565] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1003.792778] RIP: 0033:0x41f8b9 [ 1003.795992] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1003.803761] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1003.811053] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1003.818343] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 000000000000003f [ 1003.825634] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 1003.832928] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1003.945241] syz-executor4: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1003.956729] syz-executor4 cpuset=/ mems_allowed=0 [ 1003.961704] CPU: 1 PID: 29689 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 1003.968563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1003.977935] Call Trace: [ 1003.980567] dump_stack+0x185/0x1d0 [ 1003.984238] warn_alloc+0x430/0x690 [ 1003.987930] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1003.992848] ? __msan_poison_alloca+0x15c/0x1d0 [ 1003.997612] copy_process+0x778/0x9be0 [ 1004.001566] ? __msan_poison_alloca+0x141/0x1d0 [ 1004.006303] _do_fork+0x353/0xf60 [ 1004.009825] __x64_sys_clone+0x15e/0x1b0 [ 1004.013925] ? __ia32_sys_vfork+0x70/0x70 [ 1004.018101] do_syscall_64+0x15b/0x230 [ 1004.022028] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1004.027247] RIP: 0033:0x41f8b9 [ 1004.030465] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1004.038231] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 19:31:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000000c0)}) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) [ 1004.045533] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1004.052817] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000028 [ 1004.060105] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe80 [ 1004.067406] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1004.079193] kworker/u4:1: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1004.090524] kworker/u4:1 cpuset=/ mems_allowed=0 [ 1004.095502] CPU: 0 PID: 20 Comm: kworker/u4:1 Not tainted 4.17.0+ #9 [ 1004.102024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.111426] Workqueue: events_unbound call_usermodehelper_exec_work [ 1004.117855] Call Trace: [ 1004.120489] dump_stack+0x185/0x1d0 [ 1004.124150] warn_alloc+0x430/0x690 [ 1004.127842] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1004.132748] ? __msan_poison_alloca+0x15c/0x1d0 [ 1004.137506] copy_process+0x778/0x9be0 [ 1004.141439] ? update_load_avg+0x1bd6/0x2cc0 [ 1004.145899] ? proc_cap_handler+0x6a0/0x6a0 [ 1004.150258] ? __msan_poison_alloca+0x140/0x1d0 [ 1004.154984] _do_fork+0x353/0xf60 [ 1004.158497] ? proc_cap_handler+0x6a0/0x6a0 [ 1004.162951] kernel_thread+0xc6/0xe0 [ 1004.166693] ? proc_cap_handler+0x6a0/0x6a0 [ 1004.171051] call_usermodehelper_exec_work+0x146/0x520 [ 1004.176376] ? __list_del_entry_valid+0x123/0x440 [ 1004.181253] ? process_one_work+0x1290/0x1fa0 [ 1004.185801] ? call_usermodehelper_setup+0x4d0/0x4d0 [ 1004.190950] process_one_work+0x12e4/0x1fa0 19:31:34 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6(0xa, 0x0, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) [ 1004.195320] worker_thread+0x113c/0x24f0 [ 1004.199429] kthread+0x4db/0x6c0 [ 1004.202816] ? process_one_work+0x1fa0/0x1fa0 [ 1004.207343] ? kthread_blkcg+0xf0/0xf0 [ 1004.211265] ret_from_fork+0x35/0x40 [ 1004.258717] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1004.269406] udevd cpuset=/ mems_allowed=0 [ 1004.273669] CPU: 1 PID: 7321 Comm: udevd Not tainted 4.17.0+ #9 [ 1004.279739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.289111] Call Trace: [ 1004.291742] dump_stack+0x185/0x1d0 [ 1004.295412] warn_alloc+0x430/0x690 [ 1004.299104] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1004.304016] ? __msan_poison_alloca+0x15c/0x1d0 [ 1004.308773] copy_process+0x778/0x9be0 [ 1004.312698] ? expand_files+0x5b/0xe00 [ 1004.316635] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1004.322026] ? expand_files+0xa6/0xe00 [ 1004.325972] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1004.331358] ? find_next_zero_bit+0x12b/0x2f0 [ 1004.335872] ? __msan_poison_alloca+0x141/0x1d0 [ 1004.340556] _do_fork+0x353/0xf60 [ 1004.344041] __x64_sys_clone+0x15e/0x1b0 [ 1004.348116] ? __ia32_sys_vfork+0x70/0x70 [ 1004.352294] do_syscall_64+0x15b/0x230 [ 1004.356194] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1004.361407] RIP: 0033:0x7f401b7c3f46 [ 1004.365118] RSP: 002b:00007ffec5ff8eb0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1004.372835] RAX: ffffffffffffffda RBX: 00007ffec5ff8eb0 RCX: 00007f401b7c3f46 [ 1004.380104] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1004.387374] RBP: 00007ffec5ff8f10 R08: 0000000000001c99 R09: 0000000000001c99 [ 1004.394641] R10: 00007f401c0e0a70 R11: 0000000000000246 R12: 0000000000000000 [ 1004.401909] R13: 00007ffec5ff8ed0 R14: 0000000000000005 R15: 0000000000000005 [ 1004.409642] warn_alloc_show_mem: 3 callbacks suppressed [ 1004.409649] Mem-Info: [ 1004.417588] active_anon:142986 inactive_anon:78 isolated_anon:0 [ 1004.417588] active_file:753 inactive_file:740 isolated_file:32 [ 1004.417588] unevictable:0 dirty:8 writeback:0 unstable:0 [ 1004.417588] slab_reclaimable:3296 slab_unreclaimable:8510 [ 1004.417588] mapped:61219 shmem:84 pagetables:1128 bounce:0 [ 1004.417588] free:19791 free_pcp:286 free_cma:0 [ 1004.450659] Node 0 active_anon:571944kB inactive_anon:312kB active_file:2620kB inactive_file:2660kB unevictable:0kB isolated(anon):0kB isolated(file):248kB mapped:244064kB dirty:32kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 253952kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1004.478744] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1004.505263] lowmem_reserve[]: 0 2817 7244 7244 [ 1004.509983] Node 0 DMA32 free:47696kB min:26224kB low:32780kB high:39336kB active_anon:242528kB inactive_anon:28kB active_file:2288kB inactive_file:2640kB unevictable:0kB writepending:228kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2496kB pagetables:1704kB bounce:0kB free_pcp:208kB local_pcp:4kB free_cma:0kB [ 1004.539229] lowmem_reserve[]: 0 0 4426 4426 [ 1004.543672] Node 0 Normal free:16572kB min:41208kB low:51508kB high:61808kB active_anon:329416kB inactive_anon:284kB active_file:1340kB inactive_file:892kB unevictable:0kB writepending:36kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2808kB bounce:0kB free_pcp:708kB local_pcp:0kB free_cma:0kB [ 1004.572867] lowmem_reserve[]: 0 0 0 0 [ 1004.576783] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1004.590194] Node 0 DMA32: 956*4kB (UM) 3777*8kB (UM) 433*16kB (UM) 53*32kB (UM) 10*64kB (UM) 6*128kB (UM) 8*256kB (UM) 4*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 48168kB [ 1004.605650] Node 0 Normal: 1719*4kB (UME) 361*8kB (UME) 167*16kB (UME) 58*32kB (UME) 32*64kB (UM) 7*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 17236kB [ 1004.620660] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1004.629319] 1455 total pagecache pages [ 1004.633290] 0 pages in swap cache [ 1004.636809] Swap cache stats: add 0, delete 0, find 0/0 [ 1004.642212] Free swap = 0kB [ 1004.645294] Total swap = 0kB [ 1004.648360] 1965969 pages RAM [ 1004.651518] 0 pages HighMem/MovableOnly [ 1004.655529] 106316 pages reserved [ 1004.666435] syz-executor6 invoked oom-killer: gfp_mask=0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null), order=1, oom_score_adj=0 [ 1004.679305] syz-executor6 cpuset=/ mems_allowed=0 [ 1004.684275] CPU: 0 PID: 29690 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1004.691126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1004.700496] Call Trace: [ 1004.703129] dump_stack+0x185/0x1d0 [ 1004.706806] dump_header+0x2cc/0x16f0 [ 1004.710646] ? __msan_poison_alloca+0x15c/0x1d0 [ 1004.715391] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1004.720880] ? ___ratelimit+0x67f/0x760 [ 1004.724911] oom_kill_process+0x341/0x2160 [ 1004.729181] ? oom_evaluate_task+0x856/0xb60 [ 1004.733624] out_of_memory+0x1700/0x1da0 [ 1004.737699] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1004.742290] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1004.747178] alloc_pages_current+0x6b1/0x970 [ 1004.751627] __get_free_pages+0x2d/0xc0 [ 1004.755640] pgd_alloc+0x5b/0x610 [ 1004.759102] ? kmsan_set_origin+0x9e/0x160 [ 1004.763351] mm_init+0x65c/0xaf0 [ 1004.766743] copy_process+0x3707/0x9be0 [ 1004.770749] ? __msan_poison_alloca+0x141/0x1d0 [ 1004.775428] _do_fork+0x353/0xf60 [ 1004.778912] __x64_sys_clone+0x15e/0x1b0 [ 1004.782982] ? __ia32_sys_vfork+0x70/0x70 [ 1004.787130] do_syscall_64+0x15b/0x230 [ 1004.791027] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1004.796215] RIP: 0033:0x41f8b9 [ 1004.799400] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1004.807123] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1004.814390] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1004.821919] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000028 [ 1004.829188] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe80 [ 1004.836456] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1004.844329] Mem-Info: [ 1004.846886] active_anon:142987 inactive_anon:76 isolated_anon:0 [ 1004.846886] active_file:517 inactive_file:605 isolated_file:25 [ 1004.846886] unevictable:0 dirty:16 writeback:0 unstable:0 [ 1004.846886] slab_reclaimable:3296 slab_unreclaimable:8510 [ 1004.846886] mapped:61377 shmem:84 pagetables:1063 bounce:0 [ 1004.846886] free:18726 free_pcp:214 free_cma:0 [ 1004.880050] Node 0 active_anon:571948kB inactive_anon:304kB active_file:2068kB inactive_file:1980kB unevictable:0kB isolated(anon):0kB isolated(file):156kB mapped:245276kB dirty:64kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 253952kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1004.908187] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1004.934602] lowmem_reserve[]: 0 2817 7244 7244 [ 1004.939313] Node 0 DMA32 free:44368kB min:26224kB low:32780kB high:39336kB active_anon:242532kB inactive_anon:20kB active_file:1516kB inactive_file:1720kB unevictable:0kB writepending:260kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2368kB pagetables:1444kB bounce:0kB free_pcp:836kB local_pcp:180kB free_cma:0kB [ 1004.968993] lowmem_reserve[]: 0 0 4426 4426 [ 1004.973591] Node 0 Normal free:15136kB min:41208kB low:51508kB high:61808kB active_anon:329416kB inactive_anon:284kB active_file:800kB inactive_file:168kB unevictable:0kB writepending:36kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2808kB bounce:0kB free_pcp:172kB local_pcp:36kB free_cma:0kB [ 1005.002963] lowmem_reserve[]: 0 0 0 0 [ 1005.007043] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1005.017604] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1005.020613] Node 0 DMA32: 844*4kB (UM) 3812*8kB (UM) 422*16kB (UM) 45*32kB (UM) 3*64kB (M) 2*128kB (UM) 6*256kB (UM) 2*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 45072kB [ 1005.032315] syz-executor0 cpuset=/ mems_allowed=0 [ 1005.047137] Node 0 [ 1005.051883] CPU: 1 PID: 29997 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 1005.051905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.054146] Normal: [ 1005.060947] Call Trace: [ 1005.060990] dump_stack+0x185/0x1d0 [ 1005.061029] warn_alloc+0x430/0x690 [ 1005.070389] 1663*4kB [ 1005.072710] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1005.072769] ? __msan_poison_alloca+0x15c/0x1d0 [ 1005.075322] (UME) [ 1005.078974] copy_process+0x778/0x9be0 [ 1005.082590] 314*8kB [ 1005.085088] ? __msan_poison_alloca+0x15c/0x1d0 [ 1005.085122] ? handle_mm_fault+0x74eb/0x7ed0 [ 1005.085166] ? handle_mm_fault+0x74eb/0x7ed0 [ 1005.090006] (UME) [ 1005.094673] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1005.094722] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 1005.096849] 145*16kB [ 1005.100732] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1005.100766] ? __msan_poison_alloca+0x141/0x1d0 [ 1005.103093] (UME) [ 1005.107753] _do_fork+0x353/0xf60 [ 1005.107798] __x64_sys_clone+0x15e/0x1b0 [ 1005.112194] 60*32kB [ 1005.116588] ? __ia32_sys_vfork+0x70/0x70 [ 1005.116621] do_syscall_64+0x15b/0x230 [ 1005.118762] (UME) [ 1005.124115] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1005.124143] RIP: 0033:0x458429 [ 1005.130115] 30*64kB [ 1005.132494] RSP: 002b:00007fff24501068 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1005.132523] RAX: ffffffffffffffda RBX: 00007fff24501120 RCX: 0000000000458429 [ 1005.132549] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 1005.136954] (UM) [ 1005.141595] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 1005.141611] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 1005.141626] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 1005.223132] 3*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 15708kB [ 1005.230696] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1005.239420] 676 total pagecache pages [ 1005.243303] 0 pages in swap cache [ 1005.246937] Swap cache stats: add 0, delete 0, find 0/0 [ 1005.252469] Free swap = 0kB [ 1005.255533] Total swap = 0kB [ 1005.258735] 1965969 pages RAM [ 1005.261920] 0 pages HighMem/MovableOnly [ 1005.266139] 106316 pages reserved [ 1005.270017] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1005.278725] [ 2268] 0 2268 5476 331 94208 0 -1000 udevd [ 1005.287132] [ 4221] 0 4221 2493 573 49152 0 0 dhclient [ 1005.295974] [ 4353] 0 4353 14250 169 118784 0 0 rsyslogd [ 1005.299729] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1005.304466] [ 4396] 0 4396 4725 51 81920 0 0 cron [ 1005.304495] [ 4422] 0 4422 12490 165 139264 0 -1000 sshd [ 1005.304530] [ 4446] 0 4446 3694 63 73728 0 0 getty [ 1005.315117] udevd cpuset=/ mems_allowed=0 [ 1005.315166] CPU: 1 PID: 20767 Comm: udevd Not tainted 4.17.0+ #9 [ 1005.315179] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.315190] Call Trace: [ 1005.315234] dump_stack+0x185/0x1d0 [ 1005.315274] warn_alloc+0x430/0x690 [ 1005.315326] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1005.315380] ? __msan_poison_alloca+0x15c/0x1d0 [ 1005.315459] copy_process+0x778/0x9be0 [ 1005.323660] [ 4447] 0 4447 3694 61 73728 0 0 getty [ 1005.331684] ? expand_files+0x5b/0xe00 [ 1005.331729] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1005.331754] ? expand_files+0xa6/0xe00 [ 1005.331795] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1005.331832] ? find_next_zero_bit+0x12b/0x2f0 [ 1005.339993] [ 4448] 0 4448 3694 63 73728 0 0 getty [ 1005.344121] ? __msan_poison_alloca+0x141/0x1d0 [ 1005.344161] _do_fork+0x353/0xf60 [ 1005.350321] [ 4449] 0 4449 3694 59 77824 0 0 getty [ 1005.359750] __x64_sys_clone+0x15e/0x1b0 [ 1005.359785] ? __ia32_sys_vfork+0x70/0x70 [ 1005.362391] [ 4450] 0 4450 3694 63 73728 0 0 getty [ 1005.365968] do_syscall_64+0x15b/0x230 [ 1005.366015] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1005.369653] [ 4451] 0 4451 3694 63 77824 0 0 getty [ 1005.374441] RIP: 0033:0x7f401b7c3f46 [ 1005.374456] RSP: 002b:00007ffec5ff8eb0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1005.379174] [ 4452] 0 4452 3649 57 73728 0 0 getty [ 1005.383021] RAX: ffffffffffffffda RBX: 00007ffec5ff8eb0 RCX: 00007f401b7c3f46 [ 1005.383038] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1005.383065] RBP: 00007ffec5ff8f10 R08: 000000000000511f R09: 000000000000511f [ 1005.391233] [ 4469] 0 4469 17821 198 184320 0 0 sshd [ 1005.395061] R10: 00007f401c0e0a70 R11: 0000000000000246 R12: 0000000000000000 [ 1005.395079] R13: 00007ffec5ff8ed0 R14: 0000000000000005 R15: 0000000000000005 [ 1005.395524] syz-executor2: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1005.400528] [ 4471] 0 4471 278970 140727 1875968 0 0 syz-fuzzer [ 1005.404403] syz-executor2 cpuset=/ [ 1005.409823] [ 7321] 0 7321 5475 321 90112 0 -1000 udevd [ 1005.414292] mems_allowed=0 [ 1005.422468] [20767] 0 20767 5475 321 90112 0 -1000 udevd [ 1005.427155] CPU: 1 PID: 29922 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 1005.430634] [28522] 0 28522 17553 16 118784 0 0 syz-executor3 [ 1005.438706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.438718] Call Trace: [ 1005.438769] dump_stack+0x185/0x1d0 [ 1005.442838] [28549] 0 28549 17552 8231 126976 0 0 syz-executor3 [ 1005.446945] warn_alloc+0x430/0x690 [ 1005.446998] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1005.455147] [28662] 0 28662 17553 15 114688 0 0 syz-executor5 [ 1005.459017] ? __msan_poison_alloca+0x15c/0x1d0 [ 1005.459096] copy_process+0x778/0x9be0 [ 1005.464264] [28664] 0 28664 17553 14 114688 0 0 syz-executor1 [ 1005.472369] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1005.472426] ? filemap_map_pages+0x1a5a/0x1ac0 [ 1005.476154] [28689] 0 28689 17552 8228 122880 0 0 syz-executor1 [ 1005.483830] ? kmsan_set_origin_inline+0x6b/0x120 [ 1005.483878] ? __msan_poison_alloca+0x141/0x1d0 [ 1005.492028] [28690] 0 28690 17552 8229 122880 0 0 syz-executor5 [ 1005.499264] _do_fork+0x353/0xf60 [ 1005.499330] __x64_sys_clone+0x15e/0x1b0 [ 1005.506683] [29676] 0 29676 5475 321 90112 0 -1000 udevd [ 1005.513933] ? __ia32_sys_vfork+0x70/0x70 [ 1005.513971] do_syscall_64+0x15b/0x230 [ 1005.522042] [29680] 0 29680 5475 321 90112 0 -1000 udevd [ 1005.529281] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1005.529309] RIP: 0033:0x41f8b9 [ 1005.536605] [29687] 0 29687 17553 15 118784 0 0 syz-executor4 [ 1005.547811] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1005.547841] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1005.547866] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1005.556468] [29688] 0 29688 17553 14 114688 0 0 syz-executor6 [ 1005.559947] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000025 [ 1005.559964] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 1005.559977] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1005.560676] warn_alloc_show_mem: 2 callbacks suppressed [ 1005.560682] Mem-Info: [ 1005.568180] [29689] 0 29689 17553 8185 118784 0 0 syz-executor4 [ 1005.571255] active_anon:142987 inactive_anon:76 isolated_anon:0 [ 1005.571255] active_file:199 inactive_file:233 isolated_file:59 [ 1005.571255] unevictable:0 dirty:16 writeback:0 unstable:0 [ 1005.571255] slab_reclaimable:3296 slab_unreclaimable:8510 [ 1005.571255] mapped:60710 shmem:84 pagetables:1063 bounce:0 [ 1005.571255] free:19230 free_pcp:362 free_cma:0 [ 1005.579383] [29690] 0 29690 17553 8198 114688 0 0 syz-executor6 [ 1005.586246] Node 0 active_anon:571948kB inactive_anon:304kB active_file:796kB inactive_file:932kB unevictable:0kB isolated(anon):0kB isolated(file):236kB mapped:242840kB dirty:64kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 253952kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1005.586264] Node 0 [ 1005.595138] [29894] 0 29894 17553 15 114688 0 0 syz-executor2 [ 1005.604614] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1005.604628] lowmem_reserve[]: [ 1005.607250] [29922] 0 29922 17553 8201 114688 0 0 syz-executor2 [ 1005.610856] 0 2817 7244 [ 1005.619935] [29989] 0 29989 12433 19 73728 0 0 syz-executor7 [ 1005.623539] 7244 [ 1005.623562] Node 0 [ 1005.628443] [29994] 0 29994 17927 22 57344 0 0 modprobe [ 1005.637307] DMA32 free:44872kB min:26224kB low:32780kB high:39336kB active_anon:242532kB inactive_anon:20kB active_file:992kB inactive_file:1200kB unevictable:0kB writepending:260kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2368kB pagetables:1444kB bounce:0kB free_pcp:776kB local_pcp:596kB free_cma:0kB [ 1005.637321] lowmem_reserve[]: [ 1005.642027] [29997] 0 29997 17553 15 118784 0 0 syz-executor0 [ 1005.645894] 0 0 4426 [ 1005.654784] Out of memory: Kill process 4471 (syz-fuzzer) score 75 or sacrifice child [ 1005.660138] 4426 [ 1005.660161] Node 0 [ 1005.664848] Killed process 28522 (syz-executor3) total-vm:70212kB, anon-rss:64kB, file-rss:0kB, shmem-rss:0kB [ 1005.673641] Normal free:16144kB min:41208kB low:51508kB high:61808kB active_anon:329416kB inactive_anon:284kB active_file:196kB inactive_file:168kB unevictable:0kB writepending:36kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7232kB pagetables:2808kB bounce:0kB free_pcp:672kB local_pcp:636kB free_cma:0kB [ 1005.673657] lowmem_reserve[]: [ 1005.795869] syz-executor1: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1005.799925] 0 0 0 0 [ 1005.799958] Node 0 DMA: 0*4kB 0*8kB [ 1005.802506] syz-executor1 cpuset= [ 1005.811292] 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) [ 1005.844451] syz1 [ 1005.853263] 1*2048kB [ 1005.881303] mems_allowed=0 [ 1005.883473] (M) 3*4096kB (M) = 15904kB [ 1005.892415] CPU: 0 PID: 28689 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 1005.917883] Node 0 [ 1005.920958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.920970] Call Trace: [ 1005.921018] dump_stack+0x185/0x1d0 [ 1005.929822] DMA32: [ 1005.932484] warn_alloc+0x430/0x690 [ 1005.932554] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1005.941349] 705*4kB [ 1005.943419] ? __msan_poison_alloca+0x15c/0x1d0 [ 1005.943485] copy_process+0x778/0x9be0 [ 1005.945676] (UM) [ 1005.954078] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1005.954125] ? ptep_set_access_flags+0x10e/0x1d0 [ 1005.982647] 3948*8kB [ 1005.985741] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1005.985802] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1005.994608] (UM) [ 1005.997010] ? __msan_poison_alloca+0x141/0x1d0 [ 1005.997064] _do_fork+0x353/0xf60 [ 1006.004999] 424*16kB [ 1006.007082] __x64_sys_clone+0x15e/0x1b0 [ 1006.007117] ? __ia32_sys_vfork+0x70/0x70 [ 1006.009344] (UM) [ 1006.019381] do_syscall_64+0x15b/0x230 [ 1006.019429] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1006.047951] 44*32kB [ 1006.051035] RIP: 0033:0x45414a [ 1006.051061] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 [ 1006.062334] (M) [ 1006.064626] ORIG_RAX: 0000000000000038 [ 1006.064644] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 1006.064668] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1006.068378] 4*64kB [ 1006.071804] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000001c7c940 [ 1006.071819] R10: 0000000001c7cc10 R11: 0000000000000246 R12: 0000000000000001 [ 1006.071843] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 1006.079886] (UM) [ 1006.084777] syz-executor4: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1006.087234] 1*128kB (M) [ 1006.091163] syz-executor4 cpuset= [ 1006.098005] 3*256kB (M) [ 1006.100270] / [ 1006.109632] 1*512kB [ 1006.112220] mems_allowed=0 [ 1006.115954] (U) 0*1024kB 0*2048kB [ 1006.118247] CPU: 0 PID: 29689 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 1006.121858] 0*4096kB [ 1006.126672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1006.126684] Call Trace: [ 1006.126728] dump_stack+0x185/0x1d0 [ 1006.129027] = 44260kB [ 1006.133699] warn_alloc+0x430/0x690 [ 1006.133752] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1006.137607] Node 0 [ 1006.139681] ? __msan_poison_alloca+0x15c/0x1d0 [ 1006.139759] copy_process+0x778/0x9be0 [ 1006.145159] Normal: [ 1006.149922] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1006.149961] ? filemap_map_pages+0x1a5a/0x1ac0 [ 1006.152355] 1667*4kB [ 1006.157800] ? kmsan_set_origin_inline+0x6b/0x120 [ 1006.157849] ? __msan_poison_alloca+0x141/0x1d0 [ 1006.162230] (UME) [ 1006.164299] _do_fork+0x353/0xf60 [ 1006.164359] __x64_sys_clone+0x15e/0x1b0 [ 1006.168991] 277*8kB [ 1006.172435] ? __ia32_sys_vfork+0x70/0x70 [ 1006.172468] do_syscall_64+0x15b/0x230 [ 1006.174864] (UME) [ 1006.178918] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1006.178945] RIP: 0033:0x41f8b9 [ 1006.183085] 153*16kB [ 1006.185118] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1006.185156] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1006.189033] (UME) [ 1006.194199] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1006.194214] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000025 [ 1006.194237] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe80 [ 1006.196557] 62*32kB [ 1006.199721] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1006.436361] (UME) 30*64kB (UM) 3*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 15620kB [ 1006.445435] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1006.454030] 290 total pagecache pages [ 1006.457841] 0 pages in swap cache [ 1006.461307] Swap cache stats: add 0, delete 0, find 0/0 [ 1006.466678] Free swap = 0kB [ 1006.469700] Total swap = 0kB [ 1006.472748] 1965969 pages RAM [ 1006.475855] 0 pages HighMem/MovableOnly [ 1006.479836] 106316 pages reserved [ 1006.684163] device bridge_slave_1 left promiscuous mode [ 1006.690147] bridge0: port 2(bridge_slave_1) entered disabled state [ 1006.768410] device bridge_slave_0 left promiscuous mode [ 1006.774300] bridge0: port 1(bridge_slave_0) entered disabled state [ 1006.885904] team0 (unregistering): Port device team_slave_1 removed [ 1006.907747] IPVS: ftp: loaded support on port[0] = 21 [ 1006.939703] team0 (unregistering): Port device team_slave_0 removed [ 1006.954388] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1006.971572] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1007.005557] bond0 (unregistering): Released all slaves 19:31:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet_udp(0x2, 0x2, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=@random={'os2.', 'wlan0em1-\x00'}, &(0x7f0000000180)=""/230, 0xe6) 19:31:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x0, &(0x7f00000000c0)}) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) 19:31:37 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) socket$inet6(0xa, 0x0, 0x0) capget(&(0x7f0000000100), &(0x7f0000000180)) [ 1008.065914] IPVS: ftp: loaded support on port[0] = 21 [ 1008.112324] IPVS: ftp: loaded support on port[0] = 21 [ 1008.942228] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 1010.015391] device bridge_slave_1 left promiscuous mode [ 1010.021221] bridge0: port 2(bridge_slave_1) entered disabled state [ 1010.064231] device bridge_slave_0 left promiscuous mode [ 1010.069921] bridge0: port 1(bridge_slave_0) entered disabled state [ 1010.098609] device bridge_slave_1 left promiscuous mode [ 1010.104295] bridge0: port 2(bridge_slave_1) entered disabled state [ 1010.123926] device bridge_slave_0 left promiscuous mode [ 1010.129570] bridge0: port 1(bridge_slave_0) entered disabled state [ 1010.188672] team0 (unregistering): Port device team_slave_1 removed [ 1010.210932] team0 (unregistering): Port device team_slave_0 removed [ 1010.232861] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1010.259324] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1010.315974] bond0 (unregistering): Released all slaves [ 1010.349010] team0 (unregistering): Port device team_slave_1 removed [ 1010.366482] team0 (unregistering): Port device team_slave_0 removed [ 1010.382931] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1010.447298] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1010.496890] bond0 (unregistering): Released all slaves [ 1011.053354] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 1011.059559] 8021q: adding VLAN 0 to HW filter on device bond0 19:31:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50245}]}) memfd_create(&(0x7f0000000080)='\x00', 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000400)=@filter={'filter\x00', 0xe, 0x5, 0x90, [0x0, 0x20000cc0, 0x20001038, 0x200011c0], 0x0, &(0x7f00000000c0), &(0x7f0000000cc0)=[{}, {0x0, '\x00', 0x2}, {0x0, '\x00', 0x3}]}, 0x108) [ 1011.856744] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 1011.996163] warn_alloc: 2 callbacks suppressed [ 1011.996198] syz-executor2: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1012.012235] syz-executor2 cpuset=/ mems_allowed=0 [ 1012.017208] CPU: 0 PID: 29922 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 1012.024150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.033526] Call Trace: [ 1012.036156] dump_stack+0x185/0x1d0 [ 1012.039822] warn_alloc+0x430/0x690 [ 1012.043513] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1012.048430] ? __msan_poison_alloca+0x15c/0x1d0 [ 1012.053189] copy_process+0x778/0x9be0 [ 1012.057111] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1012.062167] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1012.067562] ? do_signal+0x49f/0x1d20 [ 1012.071414] ? __msan_poison_alloca+0x141/0x1d0 [ 1012.076141] _do_fork+0x353/0xf60 [ 1012.079661] __x64_sys_clone+0x15e/0x1b0 [ 1012.083769] ? __ia32_sys_vfork+0x70/0x70 [ 1012.087948] do_syscall_64+0x15b/0x230 [ 1012.091873] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1012.097075] RIP: 0033:0x41f8b9 [ 1012.100283] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1012.108024] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1012.115317] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1012.122607] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000020 [ 1012.129897] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3ff00 [ 1012.137189] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1012.144628] warn_alloc_show_mem: 2 callbacks suppressed [ 1012.144644] Mem-Info: [ 1012.152620] active_anon:142788 inactive_anon:78 isolated_anon:0 [ 1012.152620] active_file:4192 inactive_file:3398 isolated_file:98 [ 1012.152620] unevictable:0 dirty:58 writeback:0 unstable:0 [ 1012.152620] slab_reclaimable:3270 slab_unreclaimable:8058 [ 1012.152620] mapped:61752 shmem:84 pagetables:1056 bounce:0 [ 1012.152620] free:25581 free_pcp:332 free_cma:0 [ 1012.186161] Node 0 active_anon:571152kB inactive_anon:312kB active_file:14668kB inactive_file:14788kB unevictable:0kB isolated(anon):0kB isolated(file):280kB mapped:247008kB dirty:232kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 253952kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1012.214591] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1012.240926] lowmem_reserve[]: 0 2817 7244 7244 [ 1012.245604] Node 0 DMA32 free:50360kB min:26224kB low:32780kB high:39336kB active_anon:241896kB inactive_anon:32kB active_file:14428kB inactive_file:15256kB unevictable:0kB writepending:208kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2112kB pagetables:1488kB bounce:0kB free_pcp:1076kB local_pcp:388kB free_cma:0kB [ 1012.275278] lowmem_reserve[]: 0 0 4426 4426 [ 1012.279690] Node 0 Normal free:37572kB min:41208kB low:51508kB high:61808kB active_anon:329024kB inactive_anon:280kB active_file:32kB inactive_file:12kB unevictable:0kB writepending:24kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2736kB bounce:0kB free_pcp:12kB local_pcp:12kB free_cma:0kB [ 1012.308763] lowmem_reserve[]: 0 0 0 0 [ 1012.312666] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1012.326132] Node 0 DMA32: 496*4kB (UM) 926*8kB (UM) 431*16kB (UM) 48*32kB (UM) 5*64kB (UM) 1*128kB (M) 3*256kB (M) 37*512kB (U) 10*1024kB (U) 1*2048kB (U) 0*4096kB = 50272kB [ 1012.342012] Node 0 Normal: 1702*4kB (UME) 799*8kB (UMEH) 269*16kB (UMEH) 116*32kB (UMEH) 96*64kB (UMH) 28*128kB (UMH) 1*256kB (H) 2*512kB (MH) 1*1024kB (H) 0*2048kB 0*4096kB = 33248kB [ 1012.358846] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1012.367490] 6621 total pagecache pages [ 1012.371420] 0 pages in swap cache [ 1012.374943] Swap cache stats: add 0, delete 0, find 0/0 [ 1012.380344] Free swap = 0kB [ 1012.383422] Total swap = 0kB [ 1012.386482] 1965969 pages RAM [ 1012.389658] 0 pages HighMem/MovableOnly [ 1012.393668] 106316 pages reserved [ 1012.397736] sh: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1012.408148] sh cpuset=/ mems_allowed=0 [ 1012.412130] CPU: 1 PID: 30223 Comm: sh Not tainted 4.17.0+ #9 [ 1012.418022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1012.427393] Call Trace: [ 1012.430024] dump_stack+0x185/0x1d0 [ 1012.433688] warn_alloc+0x430/0x690 [ 1012.437377] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1012.442289] ? __msan_poison_alloca+0x15c/0x1d0 [ 1012.447042] copy_process+0x778/0x9be0 [ 1012.450955] ? kmsan_set_origin_inline+0x6b/0x120 [ 1012.455825] ? __msan_poison_alloca+0x15c/0x1d0 [ 1012.460520] ? cp_new_stat+0x327/0x9b0 [ 1012.464460] ? __msan_poison_alloca+0x141/0x1d0 [ 1012.469190] _do_fork+0x353/0xf60 [ 1012.472690] __x64_sys_clone+0x15e/0x1b0 [ 1012.476790] ? __ia32_sys_vfork+0x70/0x70 [ 1012.481453] do_syscall_64+0x15b/0x230 [ 1012.485378] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1012.490587] RIP: 0033:0x7f95459baf46 [ 1012.494311] RSP: 002b:00007ffc51d54580 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1012.502045] RAX: ffffffffffffffda RBX: 00007ffc51d54580 RCX: 00007f95459baf46 [ 1012.509336] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1012.516624] RBP: 00007ffc51d545c0 R08: 0000000000000000 R09: 000000000000001e [ 1012.523908] R10: 00007f9545eb19d0 R11: 0000000000000246 R12: 0000000000000000 [ 1012.531287] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 19:31:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) 19:31:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50241}]}) perf_event_open(&(0x7f0000940000)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$unlink(0x9, 0x0, 0x0) 19:31:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) request_key(&(0x7f0000000100)='trusted\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0)='(\x00', 0xfffffffffffffffb) keyctl$get_security(0x11, 0x0, &(0x7f0000000200)=""/206, 0xce) [ 1013.876719] device bridge_slave_1 left promiscuous mode [ 1013.882487] bridge0: port 2(bridge_slave_1) entered disabled state [ 1013.921684] device bridge_slave_0 left promiscuous mode [ 1013.927401] bridge0: port 1(bridge_slave_0) entered disabled state [ 1013.953005] device bridge_slave_1 left promiscuous mode [ 1013.958673] bridge0: port 2(bridge_slave_1) entered disabled state [ 1013.986064] device bridge_slave_0 left promiscuous mode [ 1013.991789] bridge0: port 1(bridge_slave_0) entered disabled state [ 1014.127516] IPVS: ftp: loaded support on port[0] = 21 [ 1014.128269] bond0 (unregistering): Released all slaves [ 1014.178366] IPVS: ftp: loaded support on port[0] = 21 [ 1014.204444] team0 (unregistering): Port device team_slave_1 removed [ 1014.242473] team0 (unregistering): Port device team_slave_0 removed [ 1014.251507] IPVS: ftp: loaded support on port[0] = 21 [ 1014.258743] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1014.280787] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1014.312854] bond0 (unregistering): Released all slaves [ 1014.330340] team0 (unregistering): Port device team_slave_1 removed [ 1014.340617] team0 (unregistering): Port device team_slave_0 removed [ 1014.356044] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1014.383178] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1014.452335] bond0 (unregistering): Released all slaves [ 1014.931456] IPVS: ftp: loaded support on port[0] = 21 [ 1015.681226] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1015.691752] syz-executor2 cpuset=syz2 mems_allowed=0 [ 1015.696873] CPU: 1 PID: 30335 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 1015.703707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1015.713057] Call Trace: [ 1015.715652] dump_stack+0x185/0x1d0 [ 1015.719291] warn_alloc+0x430/0x690 [ 1015.722935] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1015.727792] ? kernel_poison_pages+0x40/0x360 [ 1015.732298] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1015.737767] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 1015.742801] kmsan_alloc_page+0x82/0xe0 [ 1015.746782] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1015.751543] ? kmsan_set_origin_inline+0x6b/0x120 [ 1015.756383] ? __msan_poison_alloca+0x15c/0x1d0 [ 1015.761053] ? __should_failslab+0x278/0x2a0 [ 1015.765463] ? should_fail+0x57/0xab0 [ 1015.769266] ? __should_failslab+0x278/0x2a0 [ 1015.773681] ? kmsan_set_origin_inline+0x6b/0x120 [ 1015.778528] ? __msan_poison_alloca+0x15c/0x1d0 [ 1015.783202] ? kmsan_set_origin+0x9e/0x160 [ 1015.787452] alloc_pages_vma+0x1555/0x17f0 [ 1015.791694] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1015.796806] handle_mm_fault+0x44ca/0x7ed0 [ 1015.801040] ? kmsan_set_origin_inline+0x6b/0x120 [ 1015.805920] __do_page_fault+0xec6/0x1a10 [ 1015.810079] do_page_fault+0xb7/0x250 [ 1015.813878] ? page_fault+0x8/0x30 [ 1015.817415] page_fault+0x1e/0x30 [ 1015.820864] RIP: 0033:0x4075fa [ 1015.824081] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1015.829440] RAX: 0000000020006ac0 RBX: 0000000000000000 RCX: 0000000000000001 [ 1015.836705] RDX: b3d807e4af8e1c8c RSI: 0000000000000000 RDI: 0000000000c2b848 [ 1015.843980] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1015.851259] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f829c [ 1015.858536] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1015.865826] warn_alloc_show_mem: 1 callbacks suppressed [ 1015.865829] Mem-Info: [ 1015.873622] active_anon:142788 inactive_anon:74 isolated_anon:0 [ 1015.873622] active_file:2930 inactive_file:5442 isolated_file:32 [ 1015.873622] unevictable:0 dirty:79 writeback:0 unstable:0 [ 1015.873622] slab_reclaimable:3268 slab_unreclaimable:7251 [ 1015.873622] mapped:57775 shmem:80 pagetables:1073 bounce:0 [ 1015.873622] free:36147 free_pcp:526 free_cma:0 [ 1015.906824] Node 0 active_anon:571152kB inactive_anon:296kB active_file:11568kB inactive_file:22000kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:231100kB dirty:316kB writeback:0kB shmem:320kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 253952kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1015.935121] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1015.961789] lowmem_reserve[]: 0 2817 7244 7244 [ 1015.966391] Node 0 DMA32 free:65180kB min:26224kB low:32780kB high:39336kB active_anon:242280kB inactive_anon:16kB active_file:7812kB inactive_file:6820kB unevictable:0kB writepending:280kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2432kB pagetables:1568kB bounce:0kB free_pcp:804kB local_pcp:604kB free_cma:0kB [ 1015.995654] lowmem_reserve[]: 0 0 4426 4426 [ 1015.999991] Node 0 Normal free:51432kB min:41208kB low:51508kB high:61808kB active_anon:328892kB inactive_anon:280kB active_file:3756kB inactive_file:14920kB unevictable:0kB writepending:36kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2724kB bounce:0kB free_pcp:1176kB local_pcp:496kB free_cma:0kB [ 1016.029512] lowmem_reserve[]: 0 0 0 0 [ 1016.033332] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1016.046575] Node 0 DMA32: 38*4kB (UM) 2683*8kB (UME) 437*16kB (UME) 53*32kB (ME) 14*64kB (UME) 7*128kB (UME) 5*256kB (ME) 9*512kB (UME) 16*1024kB (UE) 0*2048kB 0*4096kB = 54368kB [ 1016.062740] Node 0 Normal: 3916*4kB (UME) 1873*8kB (UMEH) 282*16kB (UMEH) 131*32kB (UME) 86*64kB (UMH) 41*128kB (UMH) 1*256kB (H) 1*512kB (H) 1*1024kB (H) 0*2048kB 0*4096kB = 51896kB [ 1016.079285] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1016.087872] 8367 total pagecache pages [ 1016.091767] 0 pages in swap cache [ 1016.095226] Swap cache stats: add 0, delete 0, find 0/0 [ 1016.101036] Free swap = 0kB [ 1016.104051] Total swap = 0kB [ 1016.107061] 1965969 pages RAM [ 1016.110157] 0 pages HighMem/MovableOnly [ 1016.114131] 106316 pages reserved [ 1016.414046] syz-executor3 invoked oom-killer: gfp_mask=0x14082c2(GFP_KERNEL|__GFP_HIGHMEM|__GFP_NOWARN|__GFP_ZERO), nodemask=(null), order=0, oom_score_adj=0 [ 1016.428435] syz-executor3 cpuset=/ mems_allowed=0 [ 1016.433441] CPU: 0 PID: 30333 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 1016.440322] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1016.449704] Call Trace: [ 1016.452351] dump_stack+0x185/0x1d0 [ 1016.456007] dump_header+0x2cc/0x16f0 [ 1016.459830] ? __msan_poison_alloca+0x15c/0x1d0 [ 1016.464519] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 1016.469976] ? ___ratelimit+0x67f/0x760 [ 1016.473960] oom_kill_process+0x341/0x2160 [ 1016.478220] ? oom_evaluate_task+0x84a/0xb60 [ 1016.482669] out_of_memory+0x1700/0x1da0 [ 1016.486745] ? __udp4_lib_lookup+0x1540/0x28e0 [ 1016.491354] __alloc_pages_nodemask+0x4e4f/0x5cc0 [ 1016.496257] alloc_pages_current+0x6b1/0x970 [ 1016.500676] __vmalloc_node_range+0x83c/0x1170 [ 1016.505292] vmalloc_user+0xe1/0x3d0 [ 1016.509036] ? kcov_mmap+0x2a/0x120 [ 1016.512706] ? kcov_ioctl+0x1d0/0x1d0 [ 1016.516521] kcov_mmap+0x2a/0x120 [ 1016.520003] ? kcov_ioctl+0x1d0/0x1d0 [ 1016.523806] mmap_region+0x2751/0x3730 [ 1016.527718] do_mmap+0x1902/0x2010 [ 1016.531287] vm_mmap_pgoff+0x31b/0x430 [ 1016.535207] ksys_mmap_pgoff+0xa5a/0xaf0 [ 1016.539308] __x64_sys_mmap+0x1f1/0x260 [ 1016.543295] ? align_vdso_addr+0x420/0x420 [ 1016.547530] do_syscall_64+0x15b/0x230 [ 1016.551427] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1016.556616] RIP: 0033:0x455aea [ 1016.559803] RSP: 002b:00007ffe73922208 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 1016.567519] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000455aea [ 1016.574786] RDX: 0000000000000003 RSI: 0000000000200000 RDI: 0000000000000000 [ 1016.582054] RBP: 000000000000000e R08: 000000000000000e R09: 0000000000000000 [ 1016.589333] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000 [ 1016.596614] R13: 0000000000200000 R14: 0000000000000001 R15: 0000000000000000 [ 1016.604166] Mem-Info: [ 1016.606682] active_anon:142760 inactive_anon:75 isolated_anon:0 [ 1016.606682] active_file:762 inactive_file:650 isolated_file:96 [ 1016.606682] unevictable:0 dirty:26 writeback:0 unstable:0 [ 1016.606682] slab_reclaimable:3270 slab_unreclaimable:7279 [ 1016.606682] mapped:58255 shmem:81 pagetables:1052 bounce:0 [ 1016.606682] free:25315 free_pcp:248 free_cma:0 [ 1016.639855] Node 0 active_anon:571040kB inactive_anon:300kB active_file:1844kB inactive_file:1848kB unevictable:0kB isolated(anon):0kB isolated(file):360kB mapped:231048kB dirty:104kB writeback:0kB shmem:324kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 253952kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1016.668757] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1016.695036] lowmem_reserve[]: 0 2817 7244 7244 [ 1016.699754] Node 0 DMA32 free:48396kB min:26224kB low:32780kB high:39336kB active_anon:242148kB inactive_anon:24kB active_file:1264kB inactive_file:1392kB unevictable:0kB writepending:284kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2048kB pagetables:1476kB bounce:0kB free_pcp:648kB local_pcp:16kB free_cma:0kB [ 1016.729097] lowmem_reserve[]: 0 0 4426 4426 [ 1016.729943] sh: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1016.733498] Node 0 Normal free:39480kB min:41208kB low:51508kB high:61808kB active_anon:328892kB inactive_anon:276kB active_file:536kB inactive_file:560kB unevictable:0kB writepending:36kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2732kB bounce:0kB free_pcp:716kB local_pcp:60kB free_cma:0kB [ 1016.733572] lowmem_reserve[]: [ 1016.743944] sh cpuset= [ 1016.772998] 0 0 0 0 [ 1016.773027] Node 0 DMA: 0*4kB 0*8kB [ 1016.776206] / [ 1016.778699] 0*16kB [ 1016.781041] mems_allowed=0 [ 1016.784769] 1*32kB (U) [ 1016.786539] CPU: 1 PID: 30344 Comm: sh Not tainted 4.17.0+ #9 [ 1016.788762] 2*64kB [ 1016.791662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1016.791673] Call Trace: [ 1016.791722] dump_stack+0x185/0x1d0 [ 1016.794272] (U) [ 1016.800149] warn_alloc+0x430/0x690 [ 1016.800217] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1016.802409] 1*128kB [ 1016.811777] ? __msan_poison_alloca+0x15c/0x1d0 [ 1016.811855] copy_process+0x778/0x9be0 [ 1016.814382] (U) [ 1016.818010] ? kmsan_set_origin_inline+0x6b/0x120 [ 1016.818042] ? __msan_poison_alloca+0x15c/0x1d0 [ 1016.820010] 1*256kB [ 1016.823623] ? cp_new_stat+0x327/0x9b0 [ 1016.823672] ? __msan_poison_alloca+0x141/0x1d0 [ 1016.828486] (U) [ 1016.830815] _do_fork+0x353/0xf60 [ 1016.830860] __x64_sys_clone+0x15e/0x1b0 [ 1016.835504] 0*512kB [ 1016.839379] ? __ia32_sys_vfork+0x70/0x70 [ 1016.839412] do_syscall_64+0x15b/0x230 [ 1016.841374] 1*1024kB [ 1016.846209] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1016.846237] RIP: 0033:0x7f4eb3ca6f46 [ 1016.850892] (U) [ 1016.853190] RSP: 002b:00007ffc4a135180 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1016.853229] RAX: ffffffffffffffda RBX: 00007ffc4a135180 RCX: 00007f4eb3ca6f46 [ 1016.857128] 1*2048kB [ 1016.861769] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1016.861785] RBP: 00007ffc4a1351c0 R08: 0000000000000000 R09: 000000000000003d [ 1016.861810] R10: 00007f4eb419d9d0 R11: 0000000000000246 R12: 0000000000000000 [ 1016.863781] (M) [ 1016.867206] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1016.867295] Mem-Info: [ 1016.871297] 3*4096kB (M) = 15904kB [ 1016.873724] active_anon:142760 inactive_anon:75 isolated_anon:0 [ 1016.873724] active_file:336 inactive_file:346 isolated_file:60 [ 1016.873724] unevictable:0 dirty:26 writeback:0 unstable:0 [ 1016.873724] slab_reclaimable:3270 slab_unreclaimable:7279 [ 1016.873724] mapped:57501 shmem:81 pagetables:1052 bounce:0 [ 1016.873724] free:25945 free_pcp:351 free_cma:0 [ 1016.877812] Node 0 DMA32: 803*4kB [ 1016.881795] Node 0 active_anon:571040kB inactive_anon:300kB active_file:1344kB inactive_file:1384kB unevictable:0kB isolated(anon):0kB isolated(file):240kB mapped:230004kB dirty:104kB writeback:0kB shmem:324kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 253952kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1016.884159] (UM) 3783*8kB (UME) [ 1016.889401] Node 0 [ 1016.893115] 435*16kB (UME) 53*32kB [ 1016.895184] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1016.902840] (UME) 7*64kB (ME) 3*128kB (ME) 6*256kB (UME) 3*512kB [ 1016.910187] lowmem_reserve[]: [ 1016.912596] (UME) 3*1024kB (UME) [ 1016.919913] 0 [ 1016.927189] 0*2048kB 0*4096kB = 49108kB [ 1016.934504] 2817 [ 1016.936481] Node 0 Normal: [ 1016.943790] 7244 [ 1016.946207] 1630*4kB (ME) [ 1016.949827] 7244 [ 1016.982802] 323*8kB (UME) 408*16kB [ 1017.014495] (UME) 190*32kB (UME) 129*64kB (UM) 56*128kB [ 1017.017953] Node 0 [ 1017.020169] (UM) 4*256kB (M) [ 1017.023898] DMA32 free:48396kB min:26224kB low:32780kB high:39336kB active_anon:242148kB inactive_anon:24kB active_file:1264kB inactive_file:1392kB unevictable:0kB writepending:284kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2048kB pagetables:1476kB bounce:0kB free_pcp:688kB local_pcp:672kB free_cma:0kB [ 1017.049349] 2*512kB (UM) 1*1024kB (U) 0*2048kB 0*4096kB = 40208kB [ 1017.055682] lowmem_reserve[]: [ 1017.058788] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1017.058805] 811 total pagecache pages [ 1017.062706] 0 [ 1017.064518] 0 pages in swap cache [ 1017.064543] Swap cache stats: add 0, delete 0, find 0/0 [ 1017.068521] 0 [ 1017.070607] Free swap = 0kB [ 1017.070615] Total swap = 0kB [ 1017.070631] 1965969 pages RAM [ 1017.073575] 4426 [ 1017.075643] 0 pages HighMem/MovableOnly [ 1017.075651] 106316 pages reserved [ 1017.075669] [ pid ] uid tgid total_vm rss pgtables_bytes swapents oom_score_adj name [ 1017.078524] 4426 [ 1017.080674] [ 2268] 0 2268 5476 466 94208 0 -1000 udevd [ 1017.089734] [ 4221] 0 4221 2493 573 49152 0 0 dhclient [ 1017.089775] [ 4353] 0 4353 14250 169 118784 0 0 rsyslogd [ 1017.092004] Node 0 [ 1017.095131] [ 4396] 0 4396 4725 48 81920 0 0 cron [ 1017.095175] [ 4422] 0 4422 12490 153 139264 0 -1000 sshd [ 1017.123964] Normal free:39480kB min:41208kB low:51508kB high:61808kB active_anon:328892kB inactive_anon:276kB active_file:536kB inactive_file:560kB unevictable:0kB writepending:36kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2732kB bounce:0kB free_pcp:716kB local_pcp:656kB free_cma:0kB [ 1017.130147] [ 4446] 0 4446 3694 41 73728 0 0 getty [ 1017.130185] [ 4447] 0 4447 3694 41 73728 0 0 getty [ 1017.133291] lowmem_reserve[]: [ 1017.141980] [ 4448] 0 4448 3694 41 73728 0 0 getty [ 1017.142018] [ 4449] 0 4449 3694 40 77824 0 0 getty [ 1017.145813] 0 [ 1017.147652] [ 4450] 0 4450 3694 41 73728 0 0 getty [ 1017.147689] [ 4451] 0 4451 3694 41 77824 0 0 getty [ 1017.151139] 0 [ 1017.156526] [ 4452] 0 4452 3649 38 73728 0 0 getty [ 1017.156562] [ 4469] 0 4469 17821 198 184320 0 0 sshd [ 1017.158360] 0 [ 1017.161403] [ 4471] 0 4471 278970 140508 1875968 0 0 syz-fuzzer [ 1017.161444] [29676] 0 29676 5475 459 90112 0 -1000 udevd [ 1017.164451] 0 [ 1017.167588] [29680] 0 29680 5475 275 90112 0 -1000 udevd [ 1017.167625] [29894] 0 29894 17553 15 114688 0 0 syz-executor2 [ 1017.173686] [29922] 0 29922 17553 8313 122880 0 0 syz-executor2 [ 1017.173724] [30022] 0 30022 17553 102 114688 0 0 syz-executor1 [ 1017.177204] Node 0 [ 1017.185786] [30057] 0 30057 17553 8282 114688 0 0 syz-executor1 [ 1017.185818] [30238] 0 30238 17553 165 118784 0 0 syz-executor4 [ 1017.185859] [30245] 0 30245 17553 168 118784 0 0 syz-executor5 [ 1017.187923] DMA: [ 1017.196110] [30246] 0 30246 17553 166 118784 0 0 syz-executor7 [ 1017.196149] [30254] 0 30254 17553 8181 118784 0 0 syz-executor4 [ 1017.204555] 0*4kB [ 1017.212977] [30255] 0 30255 17553 8182 118784 0 0 syz-executor5 [ 1017.213014] [30256] 0 30256 17553 8180 118784 0 0 syz-executor7 [ 1017.215256] 0*8kB [ 1017.223340] [30257] 0 30257 17553 167 118784 0 0 syz-executor0 [ 1017.223379] [30279] 0 30279 17553 8181 118784 0 0 syz-executor0 [ 1017.231451] 0*16kB [ 1017.260026] [30333] 0 30333 14993 195 98304 0 0 syz-executor3 [ 1017.260070] [30335] 0 30335 17553 8192 122880 0 0 syz-executor2 [ 1017.268225] 1*32kB [ 1017.276411] [30336] 0 30336 11409 195 65536 0 0 syz-executor6 [ 1017.276448] [30344] 0 30344 1050 122 57344 0 0 sh [ 1017.279553] (U) [ 1017.287732] [30346] 0 30346 17553 8213 118784 0 0 syz-executor5 [ 1017.287780] [30347] 0 30347 17553 8212 118784 0 0 syz-executor4 [ 1017.295919] 2*64kB [ 1017.297735] Out of memory: Kill process 4471 (syz-fuzzer) score 76 or sacrifice child [ 1017.297811] Killed process 30333 (syz-executor3) total-vm:59972kB, anon-rss:60kB, file-rss:720kB, shmem-rss:0kB [ 1017.305942] (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1017.565144] Node 0 DMA32: 846*4kB (UM) 3860*8kB (UME) 436*16kB (UME) 54*32kB (UME) 11*64kB (UME) 5*128kB (UME) 6*256kB (UME) 3*512kB (UME) 3*1024kB (UME) 0*2048kB 0*4096kB = 50456kB [ 1017.581797] Node 0 Normal: 1639*4kB (ME) 321*8kB (UME) 393*16kB (UME) 189*32kB (UME) 128*64kB (UM) 55*128kB (UM) 3*256kB (M) 3*512kB (UM) 1*1024kB (U) 0*2048kB 0*4096kB = 40020kB [ 1017.598178] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1017.606878] 505 total pagecache pages [ 1017.610764] 0 pages in swap cache [ 1017.614297] Swap cache stats: add 0, delete 0, find 0/0 [ 1017.619724] Free swap = 0kB [ 1017.622801] Total swap = 0kB [ 1017.625873] 1965969 pages RAM [ 1017.629026] 0 pages HighMem/MovableOnly [ 1017.633057] 106316 pages reserved [ 1017.753296] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1017.764853] syz-executor0 cpuset=/ mems_allowed=0 [ 1017.769869] CPU: 1 PID: 30279 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 1017.776728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1017.786102] Call Trace: [ 1017.788735] dump_stack+0x185/0x1d0 [ 1017.792405] warn_alloc+0x430/0x690 [ 1017.796094] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1017.801008] ? __msan_poison_alloca+0x15c/0x1d0 [ 1017.805762] copy_process+0x778/0x9be0 [ 1017.809690] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1017.814746] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1017.820156] ? do_signal+0x49f/0x1d20 [ 1017.824010] ? __msan_poison_alloca+0x141/0x1d0 [ 1017.828737] _do_fork+0x353/0xf60 [ 1017.832265] __x64_sys_clone+0x15e/0x1b0 [ 1017.836365] ? __ia32_sys_vfork+0x70/0x70 [ 1017.840627] do_syscall_64+0x15b/0x230 [ 1017.844601] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1017.849816] RIP: 0033:0x41f8b9 [ 1017.853023] RSP: 002b:0000000000a3fc00 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1017.860763] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1017.868056] RDX: 0000000000a3fc0c RSI: 0000000000000000 RDI: 0000000000100011 [ 1017.875370] RBP: 0000000000a3fdb0 R08: 0000000000a44a60 R09: 000000000000004d [ 1017.882663] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000411910 [ 1017.889984] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 1017.897452] Mem-Info: [ 1017.899991] active_anon:142725 inactive_anon:75 isolated_anon:0 [ 1017.899991] active_file:367 inactive_file:599 isolated_file:78 [ 1017.899991] unevictable:0 dirty:36 writeback:0 unstable:0 [ 1017.899991] slab_reclaimable:3268 slab_unreclaimable:7283 [ 1017.899991] mapped:59120 shmem:81 pagetables:1053 bounce:0 [ 1017.899991] free:22561 free_pcp:171 free_cma:0 [ 1017.933283] Node 0 active_anon:570900kB inactive_anon:300kB active_file:484kB inactive_file:1720kB unevictable:0kB isolated(anon):0kB isolated(file):256kB mapped:235204kB dirty:144kB writeback:0kB shmem:324kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 253952kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1017.961395] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1017.987672] lowmem_reserve[]: 0 2817 7244 7244 [ 1017.992394] Node 0 DMA32 free:46236kB min:26224kB low:32780kB high:39336kB active_anon:242096kB inactive_anon:24kB active_file:880kB inactive_file:2008kB unevictable:0kB writepending:88kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1984kB pagetables:1444kB bounce:0kB free_pcp:380kB local_pcp:0kB free_cma:0kB [ 1018.021448] lowmem_reserve[]: 0 0 4426 4426 [ 1018.025887] Node 0 Normal free:30120kB min:41208kB low:51508kB high:61808kB active_anon:328920kB inactive_anon:276kB active_file:408kB inactive_file:160kB unevictable:0kB writepending:24kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2768kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1018.054854] lowmem_reserve[]: 0 0 0 0 [ 1018.058773] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1018.061160] syz-executor7: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1018.072228] Node 0 DMA32: 540*4kB (UM) 4045*8kB (UM) 439*16kB (UM) 59*32kB (UM) 9*64kB (UM) 2*128kB (UM) 3*256kB (M) 1*512kB (U) 1*1024kB (U) 0*2048kB 0*4096kB = 46568kB [ 1018.072417] Node 0 [ 1018.083744] syz-executor7 cpuset=/ [ 1018.099039] Normal: [ 1018.101268] mems_allowed=0 [ 1018.101301] CPU: 0 PID: 30256 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 1018.104842] 1771*4kB [ 1018.107124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1018.107136] Call Trace: [ 1018.107187] dump_stack+0x185/0x1d0 [ 1018.110099] (UME) [ 1018.116924] warn_alloc+0x430/0x690 [ 1018.116977] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1018.119386] 339*8kB [ 1018.128730] ? __msan_poison_alloca+0x15c/0x1d0 [ 1018.128814] copy_process+0x778/0x9be0 [ 1018.131341] (UME) [ 1018.134971] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1018.135006] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1018.137155] 171*16kB [ 1018.140763] ? do_signal+0x49f/0x1d20 [ 1018.140808] ? __msan_poison_alloca+0x141/0x1d0 [ 1018.145639] (UME) [ 1018.147965] _do_fork+0x353/0xf60 [ 1018.148025] __x64_sys_clone+0x15e/0x1b0 [ 1018.152673] 73*32kB [ 1018.156544] ? __ia32_sys_vfork+0x70/0x70 [ 1018.156576] do_syscall_64+0x15b/0x230 [ 1018.158721] (UME) [ 1018.163729] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1018.163765] RIP: 0033:0x41f8b9 [ 1018.169213] 79*64kB [ 1018.171585] RSP: 002b:0000000000a3fc00 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1018.171613] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1018.171637] RDX: 0000000000a3fc0c RSI: 0000000000000000 RDI: 0000000000100011 [ 1018.175440] (UM) [ 1018.180079] RBP: 0000000000a3fdb0 R08: 0000000000a44a60 R09: 000000000000004b [ 1018.180096] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000411910 [ 1018.180122] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 1018.182294] 55*128kB [ 1018.197380] syz-executor1: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1018.201102] (UM) 4*256kB (M) 3*512kB (UM) [ 1018.203313] syz-executor1 cpuset=/ [ 1018.208535] 1*1024kB [ 1018.211744] mems_allowed=0 [ 1018.214100] (U) [ 1018.221868] CPU: 0 PID: 30057 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 1018.229401] 0*2048kB [ 1018.236639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1018.236652] Call Trace: [ 1018.236702] dump_stack+0x185/0x1d0 [ 1018.238753] 0*4096kB [ 1018.246013] warn_alloc+0x430/0x690 [ 1018.246066] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1018.253321] = 30548kB [ 1018.260599] ? __msan_poison_alloca+0x15c/0x1d0 [ 1018.260677] copy_process+0x778/0x9be0 [ 1018.263062] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1018.274299] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1018.274338] ? filemap_map_pages+0x1a5a/0x1ac0 [ 1018.278572] 653 total pagecache pages [ 1018.282101] ? kmsan_set_origin_inline+0x6b/0x120 [ 1018.282151] ? __msan_poison_alloca+0x141/0x1d0 [ 1018.284546] 0 pages in swap cache [ 1018.287477] _do_fork+0x353/0xf60 [ 1018.287537] __x64_sys_clone+0x15e/0x1b0 [ 1018.289491] Swap cache stats: add 0, delete 0, find 0/0 [ 1018.296306] ? __ia32_sys_vfork+0x70/0x70 [ 1018.296340] do_syscall_64+0x15b/0x230 [ 1018.298756] Free swap = 0kB [ 1018.308102] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1018.308130] RIP: 0033:0x41f8b9 [ 1018.310725] Total swap = 0kB [ 1018.314312] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1018.314341] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1018.314365] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1018.316782] 1965969 pages RAM [ 1018.320376] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 0000000000000018 [ 1018.320393] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fed0 [ 1018.320406] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1018.455331] 0 pages HighMem/MovableOnly [ 1018.459390] 106316 pages reserved 19:31:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) [ 1018.969550] audit: type=1326 audit(1529695908.968:2158): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30350 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1019.131893] IPVS: ftp: loaded support on port[0] = 21 19:31:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) [ 1019.983937] audit: type=1326 audit(1529695909.982:2159): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30400 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1020.491490] bridge0: port 1(bridge_slave_0) entered blocking state [ 1020.497974] bridge0: port 1(bridge_slave_0) entered disabled state [ 1020.539188] device bridge_slave_0 entered promiscuous mode [ 1020.767592] bridge0: port 2(bridge_slave_1) entered blocking state [ 1020.774179] bridge0: port 2(bridge_slave_1) entered disabled state [ 1020.828254] device bridge_slave_1 entered promiscuous mode [ 1020.879759] bridge0: port 1(bridge_slave_0) entered blocking state [ 1020.886250] bridge0: port 1(bridge_slave_0) entered disabled state 19:31:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x0, @rand_addr}, {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='gretap0\x00'}) [ 1020.964322] device bridge_slave_0 entered promiscuous mode [ 1020.993850] audit: type=1326 audit(1529695910.992:2160): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=30447 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1021.073277] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1021.169586] bridge0: port 2(bridge_slave_1) entered blocking state [ 1021.176172] bridge0: port 2(bridge_slave_1) entered disabled state [ 1021.217937] device bridge_slave_1 entered promiscuous mode [ 1021.261389] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1021.393946] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1021.605141] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1021.860127] bond0: Enslaving bond_slave_0 as an active interface with an up link 19:31:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000006ac0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) creat(&(0x7f00000002c0)='./file0\x00', 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)) [ 1022.103713] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1022.202445] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1022.349422] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 1022.356873] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1022.418853] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1022.497548] bridge0: port 1(bridge_slave_0) entered blocking state [ 1022.504028] bridge0: port 1(bridge_slave_0) entered disabled state [ 1022.523037] device bridge_slave_0 entered promiscuous mode [ 1022.541365] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1022.548859] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1022.556473] IPVS: ftp: loaded support on port[0] = 21 [ 1022.696630] bridge0: port 2(bridge_slave_1) entered blocking state [ 1022.703147] bridge0: port 2(bridge_slave_1) entered disabled state [ 1022.719430] device bridge_slave_1 entered promiscuous mode [ 1022.741935] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 1022.749206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1022.894598] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1022.986785] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 1023.005416] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1023.014956] team0: Port device team_slave_0 added [ 1023.130064] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 1023.158513] team0: Port device team_slave_0 added [ 1023.176295] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1023.194746] team0: Port device team_slave_1 added [ 1023.260516] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 1023.279950] team0: Port device team_slave_1 added [ 1023.365126] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 1023.379189] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 1023.389594] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1023.405915] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1023.436886] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1023.521144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1023.580540] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 1023.650290] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1023.661818] syz-executor6 cpuset=/ mems_allowed=0 [ 1023.666854] CPU: 0 PID: 30357 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1023.673706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1023.683093] Call Trace: [ 1023.685728] dump_stack+0x185/0x1d0 [ 1023.689409] warn_alloc+0x430/0x690 [ 1023.693090] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1023.698005] ? __msan_poison_alloca+0x15c/0x1d0 [ 1023.702774] copy_process+0x778/0x9be0 [ 1023.706692] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1023.711757] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1023.717154] ? do_signal+0x49f/0x1d20 [ 1023.721004] ? __msan_poison_alloca+0x141/0x1d0 [ 1023.726255] _do_fork+0x353/0xf60 [ 1023.729789] __x64_sys_clone+0x15e/0x1b0 [ 1023.733891] ? __ia32_sys_vfork+0x70/0x70 [ 1023.738066] do_syscall_64+0x15b/0x230 [ 1023.741998] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1023.747212] RIP: 0033:0x41f8b9 [ 1023.750419] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1023.758165] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1023.765459] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1023.772754] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 000000000000001c [ 1023.780049] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 1023.787344] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1023.795030] warn_alloc_show_mem: 2 callbacks suppressed [ 1023.795047] Mem-Info: [ 1023.803007] active_anon:142719 inactive_anon:75 isolated_anon:0 [ 1023.803007] active_file:1613 inactive_file:5490 isolated_file:64 [ 1023.803007] unevictable:0 dirty:0 writeback:16 unstable:0 [ 1023.803007] slab_reclaimable:3264 slab_unreclaimable:7473 [ 1023.803007] mapped:60440 shmem:81 pagetables:1102 bounce:0 [ 1023.803007] free:21852 free_pcp:206 free_cma:0 [ 1023.836379] Node 0 active_anon:570876kB inactive_anon:300kB active_file:6452kB inactive_file:19772kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:243732kB dirty:0kB writeback:64kB shmem:324kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 253952kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1023.864627] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1023.890917] lowmem_reserve[]: 0 2817 7244 7244 [ 1023.895644] Node 0 DMA32 free:43672kB min:26224kB low:32780kB high:39336kB active_anon:241952kB inactive_anon:24kB active_file:6204kB inactive_file:16352kB unevictable:0kB writepending:152kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2240kB pagetables:1676kB bounce:0kB free_pcp:828kB local_pcp:132kB free_cma:0kB [ 1023.925139] lowmem_reserve[]: 0 0 4426 4426 [ 1023.929579] Node 0 Normal free:15308kB min:41208kB low:51508kB high:61808kB active_anon:328892kB inactive_anon:276kB active_file:40kB inactive_file:4kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7168kB pagetables:2732kB bounce:0kB free_pcp:124kB local_pcp:0kB free_cma:0kB [ 1023.958389] lowmem_reserve[]: 0 0 0 0 [ 1023.962383] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1023.975854] Node 0 DMA32: 727*4kB (M) 1220*8kB (UM) 40*16kB (M) 6*32kB (UM) 27*64kB (UM) 21*128kB (M) 18*256kB (UM) 35*512kB (UM) 4*1024kB (UM) 0*2048kB 0*4096kB = 44540kB [ 1023.991591] Node 0 Normal: 1747*4kB (ME) 304*8kB (ME) 143*16kB (UME) 53*32kB (ME) 23*64kB (UM) 3*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 15260kB [ 1024.006391] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1024.015102] 4299 total pagecache pages [ 1024.019046] 0 pages in swap cache [ 1024.022585] Swap cache stats: add 0, delete 0, find 0/0 [ 1024.028024] Free swap = 0kB [ 1024.031105] Total swap = 0kB [ 1024.034177] 1965969 pages RAM [ 1024.037318] 0 pages HighMem/MovableOnly [ 1024.041362] 106316 pages reserved [ 1024.196400] kthreadd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1024.207349] kthreadd cpuset=/ mems_allowed=0 [ 1024.211903] CPU: 0 PID: 2 Comm: kthreadd Not tainted 4.17.0+ #9 [ 1024.217979] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1024.227355] Call Trace: [ 1024.229996] dump_stack+0x185/0x1d0 [ 1024.233668] warn_alloc+0x430/0x690 [ 1024.237373] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1024.242281] ? __msan_poison_alloca+0x15c/0x1d0 [ 1024.247027] copy_process+0x778/0x9be0 [ 1024.250959] ? __list_add_valid+0xb8/0x450 [ 1024.255236] ? pick_next_task_fair+0x22c9/0x2530 [ 1024.260024] ? kthread_blkcg+0xf0/0xf0 [ 1024.263939] ? __msan_poison_alloca+0x140/0x1d0 [ 1024.268623] _do_fork+0x353/0xf60 [ 1024.272112] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1024.277497] ? balance_callback+0x48/0x260 [ 1024.281758] ? kthread_blkcg+0xf0/0xf0 [ 1024.285658] kernel_thread+0xc6/0xe0 [ 1024.289382] ? kthread_blkcg+0xf0/0xf0 [ 1024.293278] kthreadd+0x5df/0x940 [ 1024.296741] ? kthread_stop+0x680/0x680 [ 1024.300723] ret_from_fork+0x35/0x40 [ 1024.304914] BUG: unable to handle kernel NULL pointer dereference at 00000000000008cc [ 1024.313003] PGD 80000000ae546067 P4D 80000000ae546067 PUD 9d60f067 PMD 0 [ 1024.319934] Oops: 0002 [#1] SMP PTI [ 1024.323544] Dumping ftrace buffer: [ 1024.327067] (ftrace buffer empty) [ 1024.330760] Modules linked in: [ 1024.333937] CPU: 1 PID: 20101 Comm: kworker/1:2 Not tainted 4.17.0+ #9 [ 1024.340579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1024.349940] RIP: 0010:memset_erms+0x9/0x10 [ 1024.354152] RSP: 0018:ffff88005be3fa50 EFLAGS: 00010046 [ 1024.359497] RAX: 0000000000000000 RBX: ffff8800866c8000 RCX: 0000000000000fb0 [ 1024.366747] RDX: 0000000000000fb0 RSI: 0000000000000000 RDI: 00000000000008cc [ 1024.373997] RBP: ffff88005be3fa80 R08: 0000000000000000 R09: 00000000000008cc [ 1024.381249] R10: 0000000000000000 R11: ffffffff813553c0 R12: ffff8800866c88d8 [ 1024.388500] R13: 0000000000000000 R14: 0000000000000282 R15: fffffffffffffff4 [ 1024.395838] FS: 0000000000000000(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 1024.404060] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1024.409927] CR2: 00000000000000b0 CR3: 000000009f9d0000 CR4: 00000000001406e0 [ 1024.417179] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1024.424952] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1024.432212] Call Trace: [ 1024.434787] ? kmsan_thread_create+0x56/0xb0 [ 1024.439192] __kthread_create_on_node+0x6ba/0x7b0 [ 1024.444021] kthread_create_on_node+0x243/0x270 [ 1024.448675] ? process_one_work+0x1fa0/0x1fa0 [ 1024.453157] create_worker+0x7c6/0x1000 [ 1024.457116] worker_thread+0x876/0x24f0 [ 1024.461084] kthread+0x4db/0x6c0 [ 1024.464432] ? process_one_work+0x1fa0/0x1fa0 [ 1024.468924] ? kthread_blkcg+0xf0/0xf0 [ 1024.472807] ret_from_fork+0x35/0x40 [ 1024.476498] Code: 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 [ 1024.496102] RIP: memset_erms+0x9/0x10 RSP: ffff88005be3fa50 [ 1024.501793] CR2: 00000000000008cc [ 1024.505231] ---[ end trace 735802b88210984a ]--- [ 1024.509966] Kernel panic - not syncing: Fatal exception [ 1024.515772] Dumping ftrace buffer: [ 1024.519291] (ftrace buffer empty) [ 1024.522984] Kernel Offset: disabled [ 1024.526587] Rebooting in 86400 seconds..