&(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:14 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) 19:03:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 19:03:14 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) [ 777.234394] audit: type=1326 audit(1529694194.232:1671): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15483 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:14 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 19:03:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) setxattr(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)=@random={'user.', 'net/bnep\x00'}, &(0x7f00000005c0)='ppp0security^\x00', 0xe, 0x0) [ 777.294763] audit: type=1326 audit(1529694194.253:1672): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15482 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:14 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) 19:03:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) setxattr(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)=@random={'user.', 'net/bnep\x00'}, &(0x7f00000005c0)='ppp0security^\x00', 0xe, 0x0) 19:03:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_open_dev$random(&(0x7f00000002c0)='/dev/random\x00', 0x0, 0x0) 19:03:14 executing program 0: openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) [ 777.700271] audit: type=1326 audit(1529694194.698:1673): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15516 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) creat(&(0x7f0000000480)='./file0\x00', 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000000)) 19:03:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) 19:03:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:15 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) setxattr(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)=@random={'user.', 'net/bnep\x00'}, &(0x7f00000005c0)='ppp0security^\x00', 0xe, 0x0) 19:03:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 19:03:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) connect$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}, 0x14) 19:03:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) setxattr(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)=@random={'user.', 'net/bnep\x00'}, &(0x7f00000005c0)='ppp0security^\x00', 0xe, 0x0) [ 778.210707] audit: type=1326 audit(1529694195.209:1674): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15534 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 19:03:15 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) 19:03:15 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) [ 778.288679] audit: type=1326 audit(1529694195.265:1675): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15536 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) 19:03:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 19:03:15 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') syz_open_dev$random(&(0x7f00000002c0)='/dev/random\x00', 0x0, 0x0) 19:03:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, &(0x7f0000000100)) 19:03:16 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 19:03:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) 19:03:16 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/zero\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000040)=0x78) 19:03:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) setxattr(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)=@random={'user.', 'net/bnep\x00'}, &(0x7f00000005c0)='ppp0security^\x00', 0xe, 0x0) 19:03:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 19:03:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:16 executing program 2: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) 19:03:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 19:03:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 19:03:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) 19:03:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:16 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) setxattr(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000440)=@random={'user.', 'net/bnep\x00'}, &(0x7f00000005c0)='ppp0security^\x00', 0xe, 0x0) 19:03:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) 19:03:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 19:03:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) [ 780.328933] kauditd_printk_skb: 3 callbacks suppressed [ 780.328955] audit: type=1326 audit(1529694197.327:1679): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15653 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) 19:03:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 19:03:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) 19:03:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) 19:03:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) [ 781.267564] audit: type=1326 audit(1529694198.266:1680): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15706 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 781.322690] audit: type=1326 audit(1529694198.320:1681): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15703 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f3}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) 19:03:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f3}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50241}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:19 executing program 7: socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) [ 782.273314] audit: type=1326 audit(1529694199.271:1682): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15766 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f3}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 782.362658] audit: type=1326 audit(1529694199.311:1683): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15773 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:19 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:19 executing program 1: fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:19 executing program 7: socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) [ 782.563947] audit: type=1326 audit(1529694199.562:1684): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15781 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:19 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) [ 782.729363] audit: type=1326 audit(1529694199.727:1685): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15799 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, &(0x7f0000000280)) 19:03:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:20 executing program 1: fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:20 executing program 5: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:20 executing program 7: socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000080)) [ 783.282618] audit: type=1326 audit(1529694200.281:1686): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15816 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 783.370440] audit: type=1326 audit(1529694200.347:1687): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15825 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:20 executing program 1: fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) [ 783.579617] audit: type=1326 audit(1529694200.578:1688): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15836 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:21 executing program 3: fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:21 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:21 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/149, 0x95) fchownat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0) 19:03:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:21 executing program 3: fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) 19:03:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0xffffffffffffffff, 0x28, &(0x7f0000000040)}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) 19:03:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:21 executing program 3: fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:21 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:22 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:22 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) [ 786.235034] kauditd_printk_skb: 3 callbacks suppressed [ 786.240496] audit: type=1326 audit(1529694203.233:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16038 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) [ 786.676635] audit: type=1326 audit(1529694203.675:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16076 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:24 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:24 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) socket$kcm(0x29, 0x0, 0x0) 19:03:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) [ 787.166934] audit: type=1326 audit(1529694204.165:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16098 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:24 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:24 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) [ 787.241391] audit: type=1326 audit(1529694204.217:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16107 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) [ 787.340195] audit: type=1326 audit(1529694204.338:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16115 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) socket$kcm(0x29, 0x0, 0x0) 19:03:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:24 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:24 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) [ 787.628576] audit: type=1326 audit(1529694204.627:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16136 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f0000000040)=""/84) 19:03:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) socket$kcm(0x29, 0x0, 0x0) 19:03:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:25 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) [ 788.159257] audit: type=1326 audit(1529694205.157:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16151 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:25 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) [ 788.226059] audit: type=1326 audit(1529694205.191:1699): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16158 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:25 executing program 2: fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:25 executing program 2: fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) [ 788.382176] audit: type=1326 audit(1529694205.380:1700): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16171 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000000c0)=""/75, 0x4b, 0x0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 19:03:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:25 executing program 6: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) [ 788.608762] audit: type=1326 audit(1529694205.607:1701): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16191 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:26 executing program 2: fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socketpair$inet6_sctp(0xa, 0x0, 0x84, &(0x7f0000000000)) 19:03:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) connect$rds(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) 19:03:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:26 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:03:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:03:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, &(0x7f0000000140)) 19:03:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023f}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023f}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:28 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023f}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:28 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) [ 791.711262] kauditd_printk_skb: 4 callbacks suppressed [ 791.711284] audit: type=1326 audit(1529694208.709:1706): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16385 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 791.736472] audit: type=1326 audit(1529694208.709:1707): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16384 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) [ 791.829025] audit: type=1326 audit(1529694208.827:1708): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16399 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:28 executing program 5: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:28 executing program 7: pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) [ 791.918247] audit: type=1326 audit(1529694208.916:1709): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16403 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:29 executing program 7: pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000100)) 19:03:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) [ 792.653781] audit: type=1326 audit(1529694209.652:1710): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16433 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 792.683794] audit: type=1326 audit(1529694209.682:1711): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16436 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:03:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:29 executing program 7: pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:29 executing program 3: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) [ 792.789275] audit: type=1326 audit(1529694209.788:1712): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16439 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:29 executing program 3: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:29 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:29 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) [ 792.964359] audit: type=1326 audit(1529694209.962:1713): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16460 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:30 executing program 3: syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) socket$kcm(0x29, 0x0, 0x0) 19:03:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:30 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="2dab4820e931"}, 0x14) 19:03:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) [ 793.642612] audit: type=1326 audit(1529694210.641:1714): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16489 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000040)=ANY=[]) 19:03:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:30 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:30 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) [ 794.008672] audit: type=1326 audit(1529694211.007:1715): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16523 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:31 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:31 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:31 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) socket$nl_route(0x10, 0x3, 0x0) 19:03:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:33 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f00000001c0)) 19:03:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:33 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:33 executing program 0: pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:34 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) [ 797.090917] kauditd_printk_skb: 5 callbacks suppressed [ 797.090939] audit: type=1326 audit(1529694214.089:1721): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16699 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:34 executing program 0: pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000180)) 19:03:34 executing program 2: fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:34 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:34 executing program 0: pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) [ 797.392365] audit: type=1326 audit(1529694214.391:1722): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16725 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 797.470336] audit: type=1326 audit(1529694214.432:1723): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16729 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:34 executing program 2: fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:34 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:34 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) [ 798.027487] audit: type=1326 audit(1529694215.026:1724): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16740 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:35 executing program 2: fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:35 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:35 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:35 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000340)={'yam0\x00'}) 19:03:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'bridge_slave_0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) [ 798.411902] audit: type=1326 audit(1529694215.410:1725): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16772 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:35 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'bridge_slave_0\x00', {0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}}) 19:03:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) [ 799.004804] audit: type=1326 audit(1529694216.003:1726): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16809 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:36 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)) 19:03:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 19:03:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) keyctl$set_timeout(0xf, 0x0, 0x0) 19:03:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:36 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) clock_settime(0x0, &(0x7f0000000000)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000042c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000004280)={&(0x7f0000003a80)=ANY=[]}, 0x1}, 0x0) 19:03:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) [ 799.977444] audit: type=1326 audit(1529694216.976:1727): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16866 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:37 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) clock_settime(0x0, &(0x7f0000000000)) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f00000042c0)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000004280)={&(0x7f0000003a80)=ANY=[]}, 0x1}, 0x0) 19:03:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:37 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) getpgid(0xffffffffffffffff) sched_yield() 19:03:37 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) [ 800.941251] audit: type=1326 audit(1529694217.939:1728): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16907 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:38 executing program 5: syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) [ 801.068353] audit: type=1326 audit(1529694218.066:1729): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16920 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) getpgid(0xffffffffffffffff) sched_yield() 19:03:38 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) [ 801.360528] audit: type=1326 audit(1529694218.359:1730): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16945 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:38 executing program 5: syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) getpgid(0xffffffffffffffff) sched_yield() 19:03:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:38 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:38 executing program 5: syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:39 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) getpgid(0xffffffffffffffff) sched_yield() 19:03:39 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) [ 802.128365] kauditd_printk_skb: 1 callbacks suppressed [ 802.128387] audit: type=1326 audit(1529694219.126:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16979 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:39 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) [ 802.392201] audit: type=1326 audit(1529694219.390:1733): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16999 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000100)=0xb0) 19:03:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:39 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) sched_yield() 19:03:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:39 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) [ 802.825246] audit: type=1326 audit(1529694219.823:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17008 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) sched_yield() [ 802.878097] audit: type=1326 audit(1529694219.868:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17015 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) 19:03:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:40 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) sched_yield() 19:03:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:40 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) [ 803.149041] audit: type=1326 audit(1529694220.147:1736): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17033 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:40 executing program 7: getpgid(0xffffffffffffffff) sched_yield() 19:03:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f0000000040)) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) [ 803.377036] audit: type=1326 audit(1529694220.375:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17048 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:40 executing program 7: getpgid(0xffffffffffffffff) sched_yield() 19:03:40 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) [ 803.821861] audit: type=1326 audit(1529694220.820:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17061 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:40 executing program 7: getpgid(0xffffffffffffffff) sched_yield() 19:03:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:41 executing program 1: inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:41 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) getpgid(0xffffffffffffffff) sched_yield() 19:03:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:41 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) getpgid(0xffffffffffffffff) sched_yield() 19:03:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000140)) 19:03:41 executing program 1: inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:41 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) getpgid(0xffffffffffffffff) sched_yield() 19:03:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:41 executing program 1: inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) [ 804.816615] audit: type=1326 audit(1529694221.815:1739): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17126 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgid(0xffffffffffffffff) sched_yield() 19:03:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgid(0xffffffffffffffff) sched_yield() 19:03:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:42 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) [ 805.786095] audit: type=1326 audit(1529694222.784:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17166 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:42 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) getpgid(0xffffffffffffffff) sched_yield() 19:03:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:43 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:43 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:43 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:43 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) getpgid(0xffffffffffffffff) sched_yield() 19:03:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="d9c522cc64dfcbacb63371720ebb5c5d40663d20ca38bbb58413d4f62b3c216be728491cbdca518e1a4bfaa6fb847b506f0101c341994935cd378fc5924ffaa630712b4e6a55cb506c43075b119c830628dd6f8c6867d237dbeffe80ef3f8e4009f87f16a578c32142814b7cecb6368b1cbb1d61c6f741513f2bad22281d368990b14bb1e883b290d8aaef7cb11b427f23c58c755781e790466e059775cf3c105894c3351785c798a03cc922404b3cb2eda72f8b6b2f7c07220d1f7d162837b27e638361e8deb5b9398277c86ff42f3a1f39a468957ccc1ed5ffae28614eb22aaddc1213a0e79628ecbdd235e9abaad4e89b1998bb1aa027bdd1a32a954a3b5e") [ 806.739014] audit: type=1326 audit(1529694223.737:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17232 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:43 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) getpgid(0xffffffffffffffff) sched_yield() 19:03:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:43 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) getpgid(0xffffffffffffffff) sched_yield() 19:03:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:44 executing program 2: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f00000000c0)) 19:03:44 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:44 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgid(0xffffffffffffffff) sched_yield() 19:03:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) [ 807.692130] audit: type=1326 audit(1529694224.690:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17277 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:44 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) [ 807.761324] audit: type=1326 audit(1529694224.759:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17284 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:44 executing program 2: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:44 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:44 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:44 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:45 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) [ 808.050974] audit: type=1326 audit(1529694225.049:1744): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17307 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgid(0xffffffffffffffff) sched_yield() 19:03:45 executing program 2: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="d9c522cc64dfcbacb63371720ebb5c5d40663d20ca38bbb58413d4f62b3c216be728491cbdca518e1a4bfaa6fb847b506f0101c341994935cd378fc5924ffaa630712b4e6a55cb506c43075b119c830628dd6f8c6867d237dbeffe80ef3f8e4009f87f16a578c32142814b7cecb6368b1cbb1d61c6f741513f2bad22281d368990b14bb1e883b290d8aaef7cb11b427f23c58c755781e790466e059775cf3c105894c3351785c798a03cc922404b3cb2eda72f8b6b2f7c07220d1f7d162837b27e638361e8deb5b9398277c86ff42f3a1f39a468957ccc1ed5ffae28614eb22aaddc1213a0e79628ecbdd235e9abaad4e89b1998bb1aa027bdd1a32a954a3b5e") 19:03:45 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:45 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000006, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) [ 808.699659] audit: type=1326 audit(1529694225.698:1745): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17329 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:45 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:45 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:45 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000006, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) [ 809.103862] audit: type=1326 audit(1529694226.102:1746): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17366 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) getpgid(0xffffffffffffffff) sched_yield() 19:03:46 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:46 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="d9c522cc64dfcbacb63371720ebb5c5d40663d20ca38bbb58413d4f62b3c216be728491cbdca518e1a4bfaa6fb847b506f0101c341994935cd378fc5924ffaa630712b4e6a55cb506c43075b119c830628dd6f8c6867d237dbeffe80ef3f8e4009f87f16a578c32142814b7cecb6368b1cbb1d61c6f741513f2bad22281d368990b14bb1e883b290d8aaef7cb11b427f23c58c755781e790466e059775cf3c105894c3351785c798a03cc922404b3cb2eda72f8b6b2f7c07220d1f7d162837b27e638361e8deb5b9398277c86ff42f3a1f39a468957ccc1ed5ffae28614eb22aaddc1213a0e79628ecbdd235e9abaad4e89b1998bb1aa027bdd1a32a954a3b5e") 19:03:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000006, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) [ 809.670674] audit: type=1326 audit(1529694226.669:1747): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17378 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000006, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:46 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="d9c522cc64dfcbacb63371720ebb5c5d40663d20ca38bbb58413d4f62b3c216be728491cbdca518e1a4bfaa6fb847b506f0101c341994935cd378fc5924ffaa630712b4e6a55cb506c43075b119c830628dd6f8c6867d237dbeffe80ef3f8e4009f87f16a578c32142814b7cecb6368b1cbb1d61c6f741513f2bad22281d368990b14bb1e883b290d8aaef7cb11b427f23c58c755781e790466e059775cf3c105894c3351785c798a03cc922404b3cb2eda72f8b6b2f7c07220d1f7d162837b27e638361e8deb5b9398277c86ff42f3a1f39a468957ccc1ed5ffae28614eb22aaddc1213a0e79628ecbdd235e9abaad4e89b1998bb1aa027bdd1a32a954a3b5e") [ 809.752291] audit: type=1326 audit(1529694226.694:1748): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17381 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) inotify_init() fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) 19:03:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="d9c522cc64dfcbacb63371720ebb5c5d40663d20ca38bbb58413d4f62b3c216be728491cbdca518e1a4bfaa6fb847b506f0101c341994935cd378fc5924ffaa630712b4e6a55cb506c43075b119c830628dd6f8c6867d237dbeffe80ef3f8e4009f87f16a578c32142814b7cecb6368b1cbb1d61c6f741513f2bad22281d368990b14bb1e883b290d8aaef7cb11b427f23c58c755781e790466e059775cf3c105894c3351785c798a03cc922404b3cb2eda72f8b6b2f7c07220d1f7d162837b27e638361e8deb5b9398277c86ff42f3a1f39a468957ccc1ed5ffae28614eb22aaddc1213a0e79628ecbdd235e9abaad4e89b1998bb1aa027bdd1a32a954a3b5e") [ 810.147931] audit: type=1326 audit(1529694227.146:1749): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17417 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000006, 0x0, 0x0, 0x5008c}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:47 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) [ 810.625770] audit: type=1326 audit(1529694227.619:1750): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17428 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000006, 0x0, 0x0, 0x5008c}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) [ 810.820018] audit: type=1326 audit(1529694227.818:1751): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17447 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000006, 0x0, 0x0, 0x5008c}]}) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:48 executing program 3: syz_open_dev$urandom(&(0x7f0000000240)='/dev/urandom\x00', 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) 19:03:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:48 executing program 5: mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:48 executing program 5: mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:48 executing program 5: mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000006, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000006, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) chmod(&(0x7f00000006c0)='./file0\x00', 0x0) 19:03:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000006, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) 19:03:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) [ 812.800446] kauditd_printk_skb: 4 callbacks suppressed [ 812.800468] audit: type=1326 audit(1529694229.799:1756): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17567 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) [ 812.923554] audit: type=1326 audit(1529694229.863:1757): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17568 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 812.943501] audit: type=1326 audit(1529694229.868:1758): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17571 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:50 executing program 1: accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) [ 813.113491] audit: type=1326 audit(1529694229.993:1759): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17578 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000400)='/dev/loop#\x00', 0x0, 0x0) 19:03:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:50 executing program 1: accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:50 executing program 7: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) vmsplice(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0) [ 813.785022] audit: type=1326 audit(1529694230.783:1760): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17616 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:50 executing program 1: accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) [ 813.888133] audit: type=1326 audit(1529694230.845:1761): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17623 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:50 executing program 7: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) [ 814.024343] audit: type=1326 audit(1529694231.022:1762): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17636 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:51 executing program 7: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, &(0x7f0000000140)="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") 19:03:51 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000006}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) [ 815.003485] audit: type=1326 audit(1529694232.002:1763): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17686 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) [ 815.091176] audit: type=1326 audit(1529694232.071:1764): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17698 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:52 executing program 3: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:52 executing program 3: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000006}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:52 executing program 3: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) [ 815.977370] audit: type=1326 audit(1529694232.976:1765): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17739 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50093}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50093}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:53 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000006}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000280)={0x0, @empty, 0x0, 0x0, 'none\x00'}, 0x2c) 19:03:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50093}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:54 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:54 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:54 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:54 executing program 2: mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:54 executing program 5: 19:03:54 executing program 5: [ 817.918211] kauditd_printk_skb: 2 callbacks suppressed [ 817.918233] audit: type=1326 audit(1529694234.916:1768): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17846 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:55 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:55 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:55 executing program 2: mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:55 executing program 5: 19:03:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) [ 818.212505] audit: type=1326 audit(1529694235.211:1769): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17874 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:55 executing program 2: mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:55 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:03:55 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) [ 818.889149] audit: type=1326 audit(1529694235.887:1770): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17896 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @local}, &(0x7f0000000100)=0xfffffffffffffea8) sched_rr_get_interval(0x0, &(0x7f0000000300)) 19:03:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:56 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:56 executing program 6: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:03:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) [ 819.195918] audit: type=1326 audit(1529694236.194:1771): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17927 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:03:56 executing program 6: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) 19:03:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) [ 819.838264] audit: type=1326 audit(1529694236.836:1772): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17940 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:56 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) [ 819.904219] audit: type=1326 audit(1529694236.878:1773): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17952 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:57 executing program 6: syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:03:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:03:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:03:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:03:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:03:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) [ 820.842263] audit: type=1326 audit(1529694237.840:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18002 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:03:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:03:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:03:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:58 executing program 5: getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:03:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:03:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:58 executing program 5: getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:03:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:03:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000300)) 19:03:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) [ 821.783764] audit: type=1326 audit(1529694238.782:1775): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18062 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:58 executing program 5: getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) [ 821.821383] audit: type=1326 audit(1529694238.819:1776): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18072 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:03:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) [ 822.000171] audit: type=1326 audit(1529694238.998:1777): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18083 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:03:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:03:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023f}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:03:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:03:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:03:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:03:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023f}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:03:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:03:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:03:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023f}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:03:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:03:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:03:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:03:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:04:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) [ 823.029714] kauditd_printk_skb: 2 callbacks suppressed [ 823.029738] audit: type=1326 audit(1529694240.028:1780): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18134 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:04:00 executing program 1: socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) [ 823.133965] audit: type=1326 audit(1529694240.102:1781): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18141 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 823.230295] audit: type=1326 audit(1529694240.218:1782): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18152 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) mknod(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 19:04:00 executing program 7: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:04:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) 19:04:00 executing program 1: socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:04:00 executing program 1: socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) [ 823.765825] audit: type=1326 audit(1529694240.764:1783): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18168 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:04:00 executing program 7: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) 19:04:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) 19:04:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:04:01 executing program 7: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) [ 824.083487] audit: type=1326 audit(1529694241.082:1784): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18187 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:04:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) [ 824.191487] audit: type=1326 audit(1529694241.169:1785): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18195 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 824.288546] audit: type=1326 audit(1529694241.282:1786): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18202 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:04:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:04:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:01 executing program 2: 19:04:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:04:01 executing program 2: 19:04:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:04:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:02 executing program 4: 19:04:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:02 executing program 2: 19:04:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) [ 825.178681] audit: type=1326 audit(1529694242.177:1787): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18246 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) 19:04:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:04:02 executing program 0: 19:04:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:02 executing program 2: 19:04:02 executing program 4: [ 825.333557] audit: type=1326 audit(1529694242.331:1788): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18260 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:02 executing program 0: 19:04:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:04:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) 19:04:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:02 executing program 4: ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000240)=@generic) 19:04:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000100)) 19:04:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:04:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) [ 826.086159] audit: type=1326 audit(1529694243.084:1789): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18300 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:03 executing program 0: r0 = epoll_create1(0x0) ftruncate(r0, 0x0) 19:04:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000380)) 19:04:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:04:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:03 executing program 2: pipe(&(0x7f0000000480)={0xffffffffffffffff}) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000540)={0x303, 0x33}, 0x4) 19:04:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:04:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000100)=0xc) ioctl$SCSI_IOCTL_SYNC(0xffffffffffffffff, 0x4) 19:04:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:04:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:04 executing program 3: pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:04:04 executing program 3: pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:04 executing program 3: pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:04 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f000000a840)={&(0x7f0000001300)={0x10}, 0xc, &(0x7f000000a800)={&(0x7f000000a0c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 19:04:05 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) 19:04:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) [ 828.350626] kauditd_printk_skb: 3 callbacks suppressed [ 828.350652] audit: type=1326 audit(1529694245.348:1793): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18429 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:05 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) [ 828.473421] audit: type=1326 audit(1529694245.376:1794): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18432 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:05 executing program 6: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:05 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:05 executing program 4: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040), 0x4) 19:04:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:06 executing program 6: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:06 executing program 2: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:06 executing program 4: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000100), &(0x7f0000000400)=0x4) [ 829.291733] audit: type=1326 audit(1529694246.290:1795): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18479 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 829.348332] audit: type=1326 audit(1529694246.337:1796): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18488 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:06 executing program 6: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:06 executing program 2: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:06 executing program 4: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:06 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:06 executing program 2: ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:07 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:07 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:07 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:07 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:08 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) [ 831.046789] audit: type=1326 audit(1529694248.045:1797): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18605 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:08 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') socket(0x0, 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:08 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:08 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:09 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) [ 832.008993] audit: type=1326 audit(1529694249.007:1798): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18675 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:09 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000580)={0x0, 0x0, 'client1\x00', 0x0, "bc82ef8281ca7004", "4c190aca4087df46367f741d62e1726ffc0ac4e8f2212dc828d036ce00503048"}) 19:04:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) [ 832.968900] audit: type=1326 audit(1529694249.967:1799): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18714 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') [ 833.046535] audit: type=1326 audit(1529694250.010:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18721 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:10 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) [ 833.177463] audit: type=1326 audit(1529694250.165:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18730 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:10 executing program 7: syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) [ 833.270652] audit: type=1326 audit(1529694250.243:1802): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18739 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:10 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:10 executing program 7: syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) [ 833.980235] audit: type=1326 audit(1529694250.978:1803): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18763 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:11 executing program 7: syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') [ 834.041061] audit: type=1326 audit(1529694251.037:1804): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18762 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:11 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) [ 834.173479] audit: type=1326 audit(1529694251.172:1805): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18777 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) [ 834.326326] audit: type=1326 audit(1529694251.324:1806): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18789 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x0) 19:04:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) [ 834.929131] audit: type=1326 audit(1529694251.927:1807): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18812 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 835.006241] audit: type=1326 audit(1529694251.989:1808): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18811 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 835.026213] audit: type=1326 audit(1529694251.993:1809): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18822 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000280)) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)}, &(0x7f0000000340)) 19:04:12 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) [ 835.162816] audit: type=1326 audit(1529694252.161:1810): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18832 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000040)) 19:04:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) [ 835.334100] audit: type=1326 audit(1529694252.332:1811): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18841 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) write$eventfd(0xffffffffffffffff, &(0x7f0000000000), 0x8) 19:04:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000080)={'veth0_to_bond\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) [ 835.953053] audit: type=1326 audit(1529694252.951:1812): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18863 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:13 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:13 executing program 6: sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000ec0)={&(0x7f0000000140)=@kern={0x10}, 0xc, &(0x7f0000000640), 0x0, &(0x7f0000000d40)}, 0x0) 19:04:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:13 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:13 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000006140), 0x0, 0x2, &(0x7f00000000c0)={0x77359400}) 19:04:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, &(0x7f00000000c0)) 19:04:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) 19:04:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:13 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:13 executing program 4: ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000340)) 19:04:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x501f5}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:13 executing program 6: openat$dir(0xffffffffffffff9c, &(0x7f0000002e00)='./file1\x00', 0x0, 0x0) 19:04:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0) 19:04:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:14 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:14 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:14 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004000), &(0x7f0000006940)=0xc) 19:04:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) [ 839.074581] kauditd_printk_skb: 6 callbacks suppressed [ 839.074602] audit: type=1326 audit(1529694256.066:1819): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19052 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') 19:04:16 executing program 2: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023f}]}) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:16 executing program 2: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) [ 839.233535] audit: type=1326 audit(1529694256.231:1820): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19065 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:16 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:16 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:16 executing program 2: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023f}]}) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:16 executing program 6: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023f}]}) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:17 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:17 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:17 executing program 6: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:17 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:17 executing program 6: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) [ 840.358899] audit: type=1326 audit(1529694257.357:1821): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19130 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:17 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:17 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:17 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:17 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:17 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:17 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:18 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) [ 841.327274] audit: type=1326 audit(1529694258.325:1822): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19193 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:18 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:18 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:18 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000080)=""/92) 19:04:19 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) [ 842.301717] audit: type=1326 audit(1529694259.300:1823): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19245 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:19 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) [ 842.548410] audit: type=1326 audit(1529694259.542:1824): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19262 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:20 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:20 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) [ 843.557496] audit: type=1326 audit(1529694260.556:1825): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19309 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 843.635172] audit: type=1326 audit(1529694260.599:1826): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19316 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:20 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) [ 843.752438] audit: type=1326 audit(1529694260.717:1827): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19326 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:20 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:20 executing program 7: pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) [ 844.053122] audit: type=1326 audit(1529694261.051:1828): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19352 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:21 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) 19:04:21 executing program 7: pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) [ 844.528683] audit: type=1326 audit(1529694261.527:1829): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19368 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 844.594214] audit: type=1326 audit(1529694261.553:1830): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19371 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:21 executing program 7: pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:21 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) [ 844.683715] audit: type=1326 audit(1529694261.665:1831): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19376 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 844.764716] audit: type=1326 audit(1529694261.760:1832): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19386 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:21 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:21 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) [ 845.148405] audit: type=1326 audit(1529694262.146:1833): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19407 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=""/154, &(0x7f0000000200)=0x9a) 19:04:22 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:22 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) [ 845.507289] audit: type=1326 audit(1529694262.506:1834): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19422 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)=""/186, &(0x7f0000000200)=0xba) 19:04:22 executing program 3: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) [ 845.660192] audit: type=1326 audit(1529694262.658:1835): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19431 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:22 executing program 3: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) [ 845.770782] audit: type=1326 audit(1529694262.769:1836): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19441 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:22 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:04:23 executing program 3: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) [ 846.075348] audit: type=1326 audit(1529694263.073:1837): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19460 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:23 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f0000000000)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x0, 0x0, 0x0, {0x10}}, 0x14}, 0x1}, 0x0) 19:04:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:23 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket(0x0, 0x0, 0x0) shmdt(0x0) [ 846.702134] audit: type=1326 audit(1529694263.700:1838): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19488 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:23 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:24 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_mems\x00', 0x0, 0x0) getpeername$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, @local}, &(0x7f0000000080)=0x1c) 19:04:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:24 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) shmdt(0x0) 19:04:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) shmdt(0x0) 19:04:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:25 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:25 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) shmdt(0x0) 19:04:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:25 executing program 0: socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:25 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:25 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:25 executing program 0: socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:26 executing program 7: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe(&(0x7f0000000180)) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) 19:04:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:26 executing program 0: socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) [ 849.581858] kauditd_printk_skb: 5 callbacks suppressed [ 849.581881] audit: type=1326 audit(1529694266.580:1844): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19661 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f00000069c0)={0x0, &(0x7f0000006980)}) 19:04:26 executing program 6: pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) [ 849.846889] audit: type=1326 audit(1529694266.845:1845): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19672 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:26 executing program 5: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:26 executing program 6: pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket(0x0, 0x0, 0x0) shmdt(0x0) [ 849.932885] audit: type=1326 audit(1529694266.880:1846): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19683 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:27 executing program 6: pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:27 executing program 5: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:27 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:27 executing program 5: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, &(0x7f00000000c0)=""/103) 19:04:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000a}]}) sysfs$3(0x3) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, &(0x7f0000000000)={'bcsf0\x00'}) 19:04:27 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) [ 850.872569] audit: type=1326 audit(1529694267.871:1847): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19742 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:28 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:28 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:28 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:28 executing program 3: fgetxattr(0xffffffffffffffff, &(0x7f0000002900)=@random={'os2.', 'icmp6\x00'}, &(0x7f0000002940)=""/120, 0x78) 19:04:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:28 executing program 3: 19:04:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:29 executing program 3: 19:04:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:29 executing program 3: 19:04:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:29 executing program 3: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000002540)) [ 852.520441] audit: type=1326 audit(1529694269.518:1848): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19868 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:29 executing program 7: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) [ 852.724664] audit: type=1326 audit(1529694269.723:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19883 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:29 executing program 3: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000001b80), 0x4) 19:04:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:29 executing program 7: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:29 executing program 3: getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000880)={'filter\x00'}, &(0x7f0000000900)=0x44) 19:04:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:30 executing program 7: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:30 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000600)='/dev/ptmx\x00', 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f00000074c0)) [ 853.408229] audit: type=1326 audit(1529694270.406:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19925 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 853.484428] audit: type=1326 audit(1529694270.444:1851): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19931 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:30 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x0, &(0x7f00000005c0)={@multicast2, @loopback}, &(0x7f0000000600)=0x8) 19:04:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) [ 853.635816] audit: type=1326 audit(1529694270.633:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19943 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) [ 853.698599] audit: type=1326 audit(1529694270.691:1853): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19951 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:30 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, &(0x7f0000000380)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x0, {0x2, 0x0, @rand_addr}, 'ip6tnl0\x00'}) 19:04:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:31 executing program 1: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket(0x0, 0x0, 0x0) shmdt(0x0) 19:04:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:31 executing program 1: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) [ 854.634967] kauditd_printk_skb: 2 callbacks suppressed [ 854.634990] audit: type=1326 audit(1529694271.633:1856): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19995 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:31 executing program 1: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) [ 854.713198] audit: type=1326 audit(1529694271.661:1857): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19999 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 854.733136] audit: type=1326 audit(1529694271.677:1858): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20003 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) [ 855.379776] audit: type=1326 audit(1529694272.376:1859): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20031 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0) 19:04:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) lchown(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 19:04:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000300), &(0x7f0000000340)=0x4) [ 855.637424] audit: type=1326 audit(1529694272.636:1860): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20045 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) [ 855.719293] audit: type=1326 audit(1529694272.691:1861): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20052 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) [ 855.814720] audit: type=1326 audit(1529694272.813:1862): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20063 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000300), &(0x7f0000000340)=0x4) 19:04:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:33 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000100), &(0x7f0000000180)) 19:04:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) [ 856.312576] audit: type=1326 audit(1529694273.310:1863): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20092 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000300), &(0x7f0000000340)=0x4) 19:04:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:33 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) 19:04:33 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:33 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) 19:04:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) [ 856.899171] audit: type=1326 audit(1529694273.897:1864): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20123 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:33 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:34 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) [ 857.432531] audit: type=1326 audit(1529694274.431:1865): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20164 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$search(0xa, 0x0, &(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0) 19:04:34 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:34 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:35 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:35 executing program 2: keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000140)=""/45) 19:04:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:36 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:36 executing program 5: recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:36 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:36 executing program 0: syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) [ 859.740781] kauditd_printk_skb: 3 callbacks suppressed [ 859.740810] audit: type=1326 audit(1529694276.739:1869): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20309 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:37 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:37 executing program 0: syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:37 executing program 5: recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:37 executing program 4: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:37 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f0000000180)) 19:04:37 executing program 5: recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:37 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:37 executing program 0: syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:37 executing program 4: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:37 executing program 4: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:37 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) [ 860.852802] audit: type=1326 audit(1529694277.851:1870): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20362 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:37 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:38 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:38 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:38 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, &(0x7f0000000100)) 19:04:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:38 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:38 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) [ 861.786790] audit: type=1326 audit(1529694278.785:1871): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20419 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:38 executing program 7: openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50090}]}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) [ 862.719329] audit: type=1326 audit(1529694279.717:1872): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20469 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f3}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:39 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f3}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f3}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) [ 863.656449] audit: type=1326 audit(1529694280.655:1873): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20528 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) [ 863.718329] audit: type=1326 audit(1529694280.716:1874): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20542 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x0, &(0x7f0000000180)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) [ 863.863818] audit: type=1326 audit(1529694280.862:1875): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20551 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) 19:04:40 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) [ 864.015976] audit: type=1326 audit(1529694281.014:1876): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20560 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) keyctl$set_reqkey_keyring(0xe, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f0000000140)) 19:04:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:41 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) [ 864.644174] audit: type=1326 audit(1529694281.641:1877): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20579 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:41 executing program 1: openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') [ 864.686895] audit: type=1326 audit(1529694281.666:1878): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20575 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) [ 864.916169] kauditd_printk_skb: 1 callbacks suppressed [ 864.916194] audit: type=1326 audit(1529694281.912:1880): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20600 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) [ 865.049825] audit: type=1326 audit(1529694282.025:1881): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20608 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') [ 865.115218] audit: type=1326 audit(1529694282.086:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20612 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:42 executing program 3: socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0), 0x14) 19:04:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) [ 865.627671] audit: type=1326 audit(1529694282.626:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20627 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') [ 865.670862] audit: type=1326 audit(1529694282.650:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20630 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:42 executing program 3: socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) recvmsg(0xffffffffffffff9c, &(0x7f00000000c0)={&(0x7f0000000140)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000040), 0x0, &(0x7f00000002c0)=""/4096, 0x1000}, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, &(0x7f00000001c0), 0x4) 19:04:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, &(0x7f0000000180)) [ 865.962571] audit: type=1326 audit(1529694282.961:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20658 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:43 executing program 3: socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:43 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) [ 866.061346] audit: type=1326 audit(1529694283.055:1886): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20662 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) [ 866.148501] audit: type=1326 audit(1529694283.131:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20667 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000180)) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}, 0x10) 19:04:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') [ 866.650948] audit: type=1326 audit(1529694283.649:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20706 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 866.743356] audit: type=1326 audit(1529694283.741:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20710 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:43 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:43 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50208}]}) accept4$inet(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, @broadcast}, &(0x7f0000000100)=0x10, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 19:04:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_BASE(0xffffffffffffffff, 0x4008af04, &(0x7f0000000040)) 19:04:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:44 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:45 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000100)) 19:04:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:45 executing program 2: recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:45 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000440)='/dev/full\x00', 0x0, 0x0) uselib(&(0x7f00000000c0)='./file0\x00') 19:04:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:45 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:45 executing program 6: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:46 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) setresuid(0x0, 0x0, 0x0) 19:04:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:46 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:46 executing program 0: syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) flistxattr(0xffffffffffffffff, &(0x7f00000002c0)=""/176, 0xb0) 19:04:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:47 executing program 5: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:47 executing program 0: syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:47 executing program 1: 19:04:47 executing program 5: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:47 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) [ 870.734738] kauditd_printk_skb: 4 callbacks suppressed [ 870.734764] audit: type=1326 audit(1529694287.733:1894): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20967 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:47 executing program 0: syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:47 executing program 1: 19:04:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:47 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:47 executing program 5: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:48 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x9, &(0x7f0000001dc0), &(0x7f0000001e00)=0x1) 19:04:48 executing program 1: 19:04:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:48 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:48 executing program 7: syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:48 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) [ 871.677185] audit: type=1326 audit(1529694288.675:1895): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21006 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:48 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:48 executing program 7: syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:48 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) [ 871.875212] audit: type=1326 audit(1529694288.873:1896): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21025 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:49 executing program 7: syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:49 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50093}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) [ 872.944278] audit: type=1326 audit(1529694289.936:1897): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21093 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:50 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) [ 873.142802] audit: type=1326 audit(1529694290.141:1898): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21108 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:50 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000004280), 0x0, 0x0, &(0x7f0000004400)) statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140)) 19:04:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) [ 873.871820] audit: type=1326 audit(1529694290.870:1899): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21137 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50093}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) [ 874.195660] audit: type=1326 audit(1529694291.194:1900): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21169 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50093}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) 19:04:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 874.817907] audit: type=1326 audit(1529694291.816:1901): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21187 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50093}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:51 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) [ 874.918416] audit: type=1326 audit(1529694291.916:1902): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21193 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) 19:04:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:52 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) [ 875.190810] audit: type=1326 audit(1529694292.189:1903): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21215 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:52 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:52 executing program 3: socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) [ 875.765800] kauditd_printk_skb: 2 callbacks suppressed [ 875.765821] audit: type=1326 audit(1529694292.764:1906): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21238 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) [ 875.821221] audit: type=1326 audit(1529694292.818:1907): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21246 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:52 executing program 3: socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:52 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:53 executing program 3: socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:53 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) [ 876.226166] audit: type=1326 audit(1529694293.224:1908): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21273 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000480)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) [ 876.360704] audit: type=1326 audit(1529694293.359:1909): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21286 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080), &(0x7f0000000100)=0xc) 19:04:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:53 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000480)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/255) [ 876.762648] audit: type=1326 audit(1529694293.761:1910): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21300 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000480)}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 876.827468] audit: type=1326 audit(1529694293.807:1911): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21307 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/150) 19:04:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x5008e}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:54 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) [ 877.175529] audit: type=1326 audit(1529694294.174:1912): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21336 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000140)) 19:04:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x5008e}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) [ 877.370662] audit: type=1326 audit(1529694294.369:1913): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21348 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x4) 19:04:54 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:54 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x5008e}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50002}]}) sysfs$3(0x3) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 19:04:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:54 executing program 2: openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) [ 877.906178] audit: type=1326 audit(1529694294.904:1914): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21374 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50211}]}) syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') ioctl$TIOCLINUX4(0xffffffffffffffff, 0x541c, &(0x7f0000000040)=0x4) 19:04:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:04:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:04:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:04:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:04:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:55 executing program 6: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:04:55 executing program 6: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:55 executing program 6: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:04:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:04:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:04:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:04:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:55 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) [ 878.910789] audit: type=1326 audit(1529694295.905:1915): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21454 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:04:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:04:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:04:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:04:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:04:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:04:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) setpriority(0x0, 0x0, 0x0) 19:04:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000080)) 19:04:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:04:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) setpriority(0x0, 0x0, 0x0) 19:04:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:04:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:04:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:04:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:04:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:04:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) setpriority(0x0, 0x0, 0x0) 19:04:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:04:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) [ 880.810791] kauditd_printk_skb: 1 callbacks suppressed [ 880.810813] audit: type=1326 audit(1529694297.809:1917): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21554 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023f}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:04:57 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:04:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:04:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:04:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:04:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:58 executing program 4: memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:04:58 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:04:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) [ 881.291538] audit: type=1326 audit(1529694298.289:1918): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21589 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:58 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:04:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:58 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:04:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:04:58 executing program 4: memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:04:58 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:04:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:04:58 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) [ 881.722711] audit: type=1326 audit(1529694298.721:1919): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21608 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:58 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:04:58 executing program 7: openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:04:58 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:04:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) [ 881.949292] audit: type=1326 audit(1529694298.946:1920): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21630 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:04:59 executing program 4: memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:04:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:04:59 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:04:59 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) [ 882.248121] audit: type=1326 audit(1529694299.246:1921): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21650 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:04:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:04:59 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:04:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:04:59 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:04:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) setgroups(0x0, &(0x7f0000000340)) 19:04:59 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) [ 882.701498] audit: type=1326 audit(1529694299.700:1922): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21668 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:04:59 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:04:59 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:04:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) setgroups(0x0, &(0x7f0000000340)) 19:04:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) [ 882.974941] audit: type=1326 audit(1529694299.973:1923): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21687 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/uinput\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:05:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:05:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:05:00 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:05:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) [ 883.226817] audit: type=1326 audit(1529694300.225:1924): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21701 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008c}]}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:05:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) setgroups(0x0, &(0x7f0000000340)) 19:05:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:05:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:05:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50202}]}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:05:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:05:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:05:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:05:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:05:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:05:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:05:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getsockname$unix(0xffffffffffffffff, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) 19:05:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50202}]}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:05:01 executing program 1: lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:05:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:05:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) [ 884.156145] audit: type=1326 audit(1529694301.154:1925): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21748 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:01 executing program 1: lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:05:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:05:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:05:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:05:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:05:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50202}]}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:05:01 executing program 1: lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:05:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:05:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:05:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:05:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:05:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50202}]}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:05:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) [ 885.110218] audit: type=1326 audit(1529694302.108:1926): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21803 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:05:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:05:02 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:05:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50202}]}) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008c}]}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:05:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:05:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:05:03 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:05:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:05:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:05:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50202}]}) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) [ 886.039984] kauditd_printk_skb: 2 callbacks suppressed [ 886.040007] audit: type=1326 audit(1529694303.038:1929): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21849 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:05:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) [ 886.196158] audit: type=1326 audit(1529694303.107:1930): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21853 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 886.216152] audit: type=1326 audit(1529694303.143:1931): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21862 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50202}]}) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:05:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:05:03 executing program 3: set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) [ 886.572912] audit: type=1326 audit(1529694303.571:1932): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21884 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)) setpriority(0x0, 0x0, 0x0) 19:05:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:05:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, &(0x7f0000000000)=""/35) 19:05:04 executing program 2: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:04 executing program 3: set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) [ 887.022904] audit: type=1326 audit(1529694304.021:1933): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21900 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) [ 887.094401] audit: type=1326 audit(1529694304.092:1934): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21907 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:04 executing program 3: set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) [ 887.180289] audit: type=1326 audit(1529694304.148:1935): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21914 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:04 executing program 2: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:05:04 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50202}]}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:04 executing program 2: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=""/4, 0x4) 19:05:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) [ 887.571897] audit: type=1326 audit(1529694304.570:1936): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21944 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:04 executing program 6: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:05:04 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50202}]}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) [ 887.955825] audit: type=1326 audit(1529694304.954:1937): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21952 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:05 executing program 6: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:05 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f00000029c0)) 19:05:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) memfd_create(&(0x7f0000000040)='eth1:{\x00', 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000002c0)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14}}, 0xc) 19:05:05 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50202}]}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:05 executing program 7: getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000100)={'ah\x00'}, &(0x7f0000000140)=0x1e) [ 888.115830] audit: type=1326 audit(1529694305.114:1938): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21961 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, 0x0) 19:05:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:05 executing program 6: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:05:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50202}]}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50202}]}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) setgroups(0x0, &(0x7f0000000340)) 19:05:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x50202}]}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) [ 889.918742] syz-executor0: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 889.930287] syz-executor0 cpuset=syz0 mems_allowed=0 [ 889.935596] CPU: 1 PID: 22063 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 889.942467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.951886] Call Trace: [ 889.954532] dump_stack+0x185/0x1d0 [ 889.958225] warn_alloc+0x430/0x690 [ 889.961944] __alloc_pages_nodemask+0x5b1c/0x5cc0 19:05:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) [ 889.966875] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.971651] copy_process+0x778/0x9be0 [ 889.975630] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.980377] ? handle_mm_fault+0x74eb/0x7ed0 [ 889.984866] ? handle_mm_fault+0x74eb/0x7ed0 [ 889.989357] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 889.994814] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 890.000923] ? handle_mm_fault+0x1eb0/0x7ed0 [ 890.005398] ? __msan_poison_alloca+0x140/0x1d0 [ 890.010157] _do_fork+0x353/0xf60 [ 890.013742] __x64_sys_clone+0x15e/0x1b0 [ 890.017875] ? __ia32_sys_vfork+0x70/0x70 [ 890.022081] do_syscall_64+0x15b/0x230 [ 890.026043] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 890.031306] RIP: 0033:0x458429 [ 890.034543] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 890.042304] RAX: ffffffffffffffda RBX: 00007efe32565700 RCX: 0000000000458429 [ 890.049614] RDX: 00007efe325659d0 RSI: 00007efe32564db0 RDI: 00000000003d0f00 [ 890.056952] RBP: 0000000000a3e8a0 R08: 00007efe32565700 R09: 00007efe32565700 19:05:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) [ 890.064289] R10: 00007efe325659d0 R11: 0000000000000202 R12: 0000000000000000 [ 890.071603] R13: 0000000000a3e81f R14: 00007efe325659c0 R15: 0000000000000000 [ 890.079190] Mem-Info: [ 890.081771] active_anon:186014 inactive_anon:78 isolated_anon:0 [ 890.081771] active_file:5167 inactive_file:10810 isolated_file:32 [ 890.081771] unevictable:0 dirty:27 writeback:0 unstable:0 [ 890.081771] slab_reclaimable:3579 slab_unreclaimable:9457 [ 890.081771] mapped:74607 shmem:84 pagetables:1252 bounce:0 [ 890.081771] free:31287 free_pcp:53 free_cma:0 [ 890.115194] Node 0 active_anon:744056kB inactive_anon:312kB active_file:20668kB inactive_file:42636kB unevictable:0kB isolated(anon):0kB isolated(file):384kB mapped:298428kB dirty:108kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 251904kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 890.143582] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 890.170192] lowmem_reserve[]: 0 2817 7244 7244 [ 890.174924] Node 0 DMA32 free:74944kB min:26224kB low:32780kB high:39336kB active_anon:419520kB inactive_anon:8kB active_file:488kB inactive_file:368kB unevictable:0kB writepending:20kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1920kB pagetables:1940kB bounce:0kB free_pcp:432kB local_pcp:0kB free_cma:0kB [ 890.203879] lowmem_reserve[]: 0 0 4426 4426 [ 890.208353] Node 0 Normal free:54492kB min:41208kB low:51508kB high:61808kB active_anon:318196kB inactive_anon:304kB active_file:19648kB inactive_file:41812kB unevictable:0kB writepending:88kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:8064kB pagetables:3068kB bounce:0kB free_pcp:800kB local_pcp:212kB free_cma:0kB [ 890.238149] lowmem_reserve[]: 0 0 0 0 [ 890.242121] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB 19:05:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) [ 890.255681] Node 0 DMA32: 888*4kB (UMEH) 570*8kB (UM) 199*16kB (UMH) 48*32kB (UMEH) 19*64kB (UMEH) 7*128kB (UMEH) 2*256kB (UH) 0*512kB 2*1024kB (EH) 17*2048kB (UMEH) 4*4096kB (M) = 68704kB [ 890.273122] Node 0 Normal: 5574*4kB (UMEH) 2596*8kB (UME) 641*16kB (UMEH) 54*32kB (UMH) 2*64kB (M) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 55176kB [ 890.287917] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 890.296589] 15749 total pagecache pages [ 890.300640] 0 pages in swap cache [ 890.304199] Swap cache stats: add 0, delete 0, find 0/0 [ 890.309895] Free swap = 0kB [ 890.313619] Total swap = 0kB [ 890.316721] 1965969 pages RAM 19:05:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) [ 890.319932] 0 pages HighMem/MovableOnly [ 890.323968] 106316 pages reserved 19:05:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) arch_prctl(0x0, &(0x7f0000000240)) readv(0xffffffffffffffff, &(0x7f0000001900), 0x0) 19:05:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:08 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50200}]}) socket$netlink(0x10, 0x3, 0x0) 19:05:08 executing program 1: io_submit(0x0, 0x2, &(0x7f0000000400)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000040)="bc45b4be3f3c3e136fe8b689b7bb67d06207d0ceddb20d0556b745e900d14dbc4462c3d3ba86904399f0061a067e92702053ede2ea9fee5176dade231abab03da3f744d5806a0d1799cc1cf4a8f41557525d0a1c5e1ebc307389b920dadaf0c024d516ceba2a6b713990c74621ea08e5aea8b818bf3bf2d137fa9c3130a38f1d5f8ed02200a123655b943d210d97e2b58c35bdaec02963940c20f13ef4d97f246ef44bdb0aaabbbf707b3882ba6e", 0xae, 0x0, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0xffffffffffffff00, 0xffffffffffffffff, &(0x7f00000002c0)="4b97d24104c0b9a7360dde9e839e47e8b858dfcbdb2e3d297fba9646a7e7193d15ae8fe39882e22b2b0286cb511f7d9edb7541d4b9f940c07c8107f5ae5360dd019c50e61d27e1511aa127910426f4b12bdc4a37656c02e6ca725e6485bbdb3c9ded6b6c1721ea3b2d1eb9948f5c972e2c2e5b0b20d868b9a9cc399e59fe564af747e0306381ea45868f8ffb8e8d4392bf15c75285a021d5bff895508eab9949e6b37a82030878ac2646f19653d1d88cc91467ffecd972cc073346acf2238768f4520389860d5a0614ee82693dd8012441793be7b0ad70fc0299852de31e4369cf61df9138c44a8e605ef3dd6d", 0xed, 0x7f, 0x0, 0x1}]) 19:05:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) 19:05:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) [ 891.302837] kauditd_printk_skb: 3 callbacks suppressed [ 891.302858] audit: type=1326 audit(1529694308.301:1942): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22150 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:08 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:08 executing program 7: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50200}]}) socket$netlink(0x10, 0x3, 0x0) [ 891.409919] audit: type=1326 audit(1529694308.344:1943): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22151 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 891.429870] audit: type=1326 audit(1529694308.402:1944): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22156 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:08 executing program 5: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50200}]}) socket$netlink(0x10, 0x3, 0x0) 19:05:08 executing program 7: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) set_robust_list(&(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)}}, 0x18) msgrcv(0x0, &(0x7f00000003c0)={0x0, ""/193}, 0xc9, 0x0, 0x0) 19:05:09 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:09 executing program 7: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:09 executing program 4: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) [ 892.293520] audit: type=1326 audit(1529694309.292:1945): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22203 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:09 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:09 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) [ 892.370863] audit: type=1326 audit(1529694309.368:1946): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22205 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:09 executing program 4: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) [ 892.510987] audit: type=1326 audit(1529694309.492:1947): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22214 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:09 executing program 0: rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:09 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:09 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:09 executing program 4: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:10 executing program 0: rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:10 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000040)) [ 893.375912] audit: type=1326 audit(1529694310.374:1948): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22258 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffff8) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000280)) 19:05:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:10 executing program 0: rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:10 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) [ 893.562908] audit: type=1326 audit(1529694310.561:1949): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22276 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:10 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:10 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:11 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:11 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:11 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) [ 894.802429] audit: type=1326 audit(1529694311.799:1950): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22346 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:11 executing program 1: syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000100)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:12 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) [ 895.236948] audit: type=1326 audit(1529694312.235:1951): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22383 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:12 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:12 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 19:05:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:13 executing program 3: pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:13 executing program 3: pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) [ 896.710590] kauditd_printk_skb: 3 callbacks suppressed [ 896.710610] audit: type=1326 audit(1529694313.709:1955): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22464 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:13 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) [ 896.880563] audit: type=1326 audit(1529694313.879:1956): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22471 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$IP6T_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000140)={'raw\x00', 0x2, [{}, {}]}, 0x48) 19:05:14 executing program 3: pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:14 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:14 executing program 2: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) [ 897.154922] audit: type=1326 audit(1529694314.153:1957): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22491 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:14 executing program 2: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:14 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:14 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) [ 897.638563] audit: type=1326 audit(1529694314.637:1958): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22504 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:14 executing program 2: setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:14 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:14 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) [ 897.908769] audit: type=1326 audit(1529694314.907:1959): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22531 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:15 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) [ 898.141264] audit: type=1326 audit(1529694315.139:1960): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22543 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) 19:05:15 executing program 7: time(&(0x7f0000002740)) 19:05:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:15 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f3}]}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) [ 898.618740] audit: type=1326 audit(1529694315.617:1961): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22567 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) rt_sigaction(0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x8, &(0x7f0000000180)) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f00000001c0), 0x0) 19:05:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000140)) 19:05:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:15 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) [ 898.892965] audit: type=1326 audit(1529694315.891:1962): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22582 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) [ 899.142633] audit: type=1326 audit(1529694316.141:1963): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22603 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f3}]}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:16 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50243}]}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:16 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f3}]}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6, @in6=@remote={0xfe, 0x80, [], 0xbb}}}, {{@in=@multicast1=0xe0000001}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) 19:05:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:17 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f3}]}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:17 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) [ 900.157606] audit: type=1326 audit(1529694317.156:1964): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22657 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:17 executing program 5: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:17 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:17 executing program 5: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:18 executing program 5: add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) syz_open_procfs(0x0, &(0x7f0000000440)='map_files\x00') syz_open_procfs(0x0, &(0x7f0000000d80)='net/ip6_tables_names\x00') 19:05:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:18 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:18 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000500)) 19:05:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe(&(0x7f0000000180)) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={{}, {0x77359400}}, 0x0) 19:05:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:19 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) 19:05:19 executing program 7: creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 902.121850] kauditd_printk_skb: 5 callbacks suppressed [ 902.121873] audit: type=1326 audit(1529694319.120:1970): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22771 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) [ 902.211200] audit: type=1326 audit(1529694319.146:1971): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22773 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000001c0)={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, {0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}}, 0x5c) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000700), 0x10) 19:05:19 executing program 7: creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:19 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) 19:05:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:19 executing program 7: creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) [ 902.449443] audit: type=1326 audit(1529694319.447:1972): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22796 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000280)={0x0, &(0x7f0000000040)}) 19:05:20 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:20 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) prctl$getname(0x10, &(0x7f0000000140)=""/114) 19:05:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) [ 903.103546] audit: type=1326 audit(1529694320.101:1973): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22817 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:20 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:20 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:20 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50090}]}) accept$unix(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000000)=0x362) connect$netlink(0xffffffffffffffff, &(0x7f00000001c0)=@proc={0x10}, 0xc) 19:05:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:20 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:20 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:20 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:21 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:21 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) setrlimit(0x0, &(0x7f0000000300)) 19:05:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) [ 904.336761] audit: type=1326 audit(1529694321.334:1974): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22907 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:21 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) setrlimit(0x0, &(0x7f0000000300)) 19:05:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:21 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) setrlimit(0x0, &(0x7f0000000300)) 19:05:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:22 executing program 3: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) [ 905.283201] audit: type=1326 audit(1529694322.281:1975): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22973 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:22 executing program 3: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:22 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:23 executing program 3: socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) keyctl$reject(0x13, 0x0, 0x0, 0x0, 0x0) 19:05:23 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) [ 906.226155] audit: type=1326 audit(1529694323.224:1976): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23014 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) [ 906.289809] audit: type=1326 audit(1529694323.249:1977): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23010 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 906.309766] audit: type=1326 audit(1529694323.280:1978): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23025 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:23 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) [ 906.494213] audit: type=1326 audit(1529694323.443:1979): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23030 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:23 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:23 executing program 6: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:23 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:24 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:24 executing program 1: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:24 executing program 2: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:24 executing program 6: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) [ 907.233211] audit: type=1326 audit(1529694324.231:1980): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23064 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:24 executing program 1: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) [ 907.291887] audit: type=1326 audit(1529694324.261:1981): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23069 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:24 executing program 6: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') [ 907.452366] audit: type=1326 audit(1529694324.450:1982): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23088 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:24 executing program 1: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:25 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) 19:05:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:25 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f00000001c0)={0x0, @multicast1=0xe0000001, 0x0, 0x0, 'fo\x00'}, 0x2c) 19:05:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') [ 908.231463] audit: type=1326 audit(1529694325.230:1983): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23123 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 908.307168] audit: type=1326 audit(1529694325.287:1984): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23129 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 19:05:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:25 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) [ 908.534571] audit: type=1326 audit(1529694325.532:1985): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23145 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:25 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') [ 909.379741] audit: type=1326 audit(1529694326.378:1986): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23183 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:26 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:27 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) [ 910.283346] audit: type=1326 audit(1529694327.282:1987): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23233 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 910.319007] audit: type=1326 audit(1529694327.316:1988): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23237 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:27 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) [ 910.374302] audit: type=1326 audit(1529694327.348:1989): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23241 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:27 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000140)) setrlimit(0x0, &(0x7f0000000300)) 19:05:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:28 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x4c831, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="cf"], 0x1) 19:05:28 executing program 0: chown(&(0x7f0000001c80)='./file0\x00', 0x0, 0x0) 19:05:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000340)) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 19:05:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 19:05:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 19:05:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:29 executing program 7: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f00000000c0)) r1 = epoll_create1(0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000001200)) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000001c40)) 19:05:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) [ 912.323347] kauditd_printk_skb: 6 callbacks suppressed [ 912.323373] audit: type=1326 audit(1529694329.321:1996): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23336 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@multicast1, @in6=@ipv4={[], [], @multicast2}}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8) futimesat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x7530}, {0x0, 0x2710}}) 19:05:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, &(0x7f00000000c0)) 19:05:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.evm\x00') 19:05:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) [ 912.446825] audit: type=1326 audit(1529694329.445:1997): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23351 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) [ 912.586268] audit: type=1326 audit(1529694329.475:1998): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23354 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 912.606202] audit: type=1326 audit(1529694329.569:1999): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23358 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) 19:05:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000180)={'security\x00'}, &(0x7f0000000040)=0x54) 19:05:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:30 executing program 4: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) [ 913.288499] audit: type=1326 audit(1529694330.287:2000): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23395 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000180)={@broadcast=0xffffffff, @rand_addr, @rand_addr}, 0xc) 19:05:30 executing program 4: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008f}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:30 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:30 executing program 4: syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) sync() 19:05:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008f}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:31 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) sync() 19:05:31 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:31 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x5) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)=[{&(0x7f00000020c0)}], 0x1}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:31 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:31 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) sync() 19:05:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008f}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:31 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:31 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:31 executing program 7: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008f}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:31 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:31 executing program 7: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008f}]}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:32 executing program 7: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008f}]}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:32 executing program 1: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008f}]}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:32 executing program 1: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:32 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:32 executing program 6: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:33 executing program 1: add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:33 executing program 6: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:33 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:33 executing program 6: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:33 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:33 executing program 2: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 916.454985] audit: type=1326 audit(1529694333.453:2001): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23642 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:33 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008f}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:33 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:33 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:33 executing program 5: timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:33 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008f}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:34 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:34 executing program 5: timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5008f}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) [ 917.400496] audit: type=1326 audit(1529694334.399:2002): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23700 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:34 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:34 executing program 5: timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 917.479836] audit: type=1326 audit(1529694334.478:2003): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23706 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:34 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:34 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_dev$loop(&(0x7f0000000140)='/dev/loop#\x00', 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(0xffffffffffffffff, 0x2282, &(0x7f00000000c0)) 19:05:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:35 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) [ 918.346434] audit: type=1326 audit(1529694335.345:2004): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23743 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:35 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) [ 918.440282] audit: type=1326 audit(1529694335.438:2005): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23758 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008f}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:35 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008f}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='security.ima\x00', &(0x7f0000000180)=""/4096, 0x1000) 19:05:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) [ 919.372456] audit: type=1326 audit(1529694336.371:2006): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23794 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) [ 919.438948] audit: type=1326 audit(1529694336.421:2007): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23802 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5008f}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 919.608140] audit: type=1326 audit(1529694336.606:2008): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23817 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) [ 919.768666] audit: type=1326 audit(1529694336.767:2009): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23833 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) [ 920.355587] audit: type=1326 audit(1529694337.354:2010): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23843 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 920.414997] audit: type=1326 audit(1529694337.387:2011): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23845 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) sync() 19:05:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x38}, [{}]}, 0x78) 19:05:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue0\x00'}) 19:05:38 executing program 4: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:38 executing program 4: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000200)={0x50, ""/80}) 19:05:39 executing program 4: syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:39 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socket(0x0, 0x0, 0x0) epoll_create(0x0) [ 922.505470] kauditd_printk_skb: 10 callbacks suppressed [ 922.505494] audit: type=1326 audit(1529694339.504:2022): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23963 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:39 executing program 1: 19:05:39 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) timer_create(0x0, &(0x7f0000000640)={0x0, 0x0, 0x0, @thr={&(0x7f0000000500), &(0x7f0000000580)}}, &(0x7f0000000680)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 19:05:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) [ 922.870600] audit: type=1326 audit(1529694339.869:2023): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23984 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:40 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000180)=""/201) 19:05:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:05:40 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) epoll_create(0x0) 19:05:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) [ 923.478099] audit: type=1326 audit(1529694340.476:2024): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24031 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:40 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) epoll_create(0x0) 19:05:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:40 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) epoll_create(0x0) 19:05:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:41 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x5) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:41 executing program 7: socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:41 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x5) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:41 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x5) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:41 executing program 7: socket(0x0, 0x0, 0x0) epoll_create(0x0) [ 924.968924] audit: type=1326 audit(1529694341.967:2025): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24119 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:42 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x5) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:42 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:42 executing program 7: socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:42 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x5) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:42 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:42 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:42 executing program 6: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:42 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x5) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:42 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) [ 925.930020] audit: type=1326 audit(1529694342.928:2026): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24194 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:43 executing program 6: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:43 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$inet6(0xa, 0x3, 0x5) ioctl(r1, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:43 executing program 2: socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) [ 926.064055] audit: type=1326 audit(1529694343.062:2027): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24202 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:43 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f00000000c0)) 19:05:43 executing program 6: openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:43 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) socket$inet6(0xa, 0x3, 0x5) sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:43 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:43 executing program 2: socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:43 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) [ 926.846933] audit: type=1326 audit(1529694343.845:2028): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24230 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:44 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:44 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:44 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:44 executing program 2: socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) [ 927.156129] audit: type=1326 audit(1529694344.154:2029): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24261 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:44 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:44 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:44 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:44 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:44 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:45 executing program 3: sendmmsg(0xffffffffffffffff, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)="526d618b735f726f6c00000000") openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 19:05:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000480)}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) [ 928.272783] audit: type=1326 audit(1529694345.271:2030): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24327 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:45 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:45 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000480)}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:45 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:46 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000480)}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)) symlinkat(&(0x7f0000000000)='\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') 19:05:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x5008e}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:46 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002640), 0x0, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x5008e}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:46 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002640), 0x0, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) [ 929.746254] audit: type=1326 audit(1529694346.744:2031): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24430 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:46 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002640), 0x0, 0x0) sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) [ 929.850265] audit: type=1326 audit(1529694346.808:2032): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24439 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x5008e}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501f5}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:47 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:47 executing program 4: arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) [ 930.170420] audit: type=1326 audit(1529694347.167:2033): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24468 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:47 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) 19:05:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) 19:05:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:47 executing program 4: arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:47 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f00000002c0)=ANY=[]}}], 0x1, 0x0) [ 930.671642] audit: type=1326 audit(1529694347.670:2034): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24495 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 930.756861] audit: type=1326 audit(1529694347.755:2035): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24502 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:47 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0), 0x0, 0x0) 19:05:47 executing program 4: arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) [ 930.834220] audit: type=1326 audit(1529694347.788:2036): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24508 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:48 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0), 0x0, 0x0) 19:05:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) [ 931.167394] audit: type=1326 audit(1529694348.165:2037): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24534 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000200), 0x4) [ 931.612240] audit: type=1326 audit(1529694348.610:2038): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24549 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket(0x0, 0x0, 0x0) epoll_create(0x0) 19:05:48 executing program 3: r0 = socket$pppoe(0x18, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002640)=[{{&(0x7f0000001e00)=@sco={0x1f}, 0x80, &(0x7f00000021c0)}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000000c0), 0x0, 0x0) 19:05:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:48 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) [ 931.739547] audit: type=1326 audit(1529694348.737:2039): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24559 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000480)}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:48 executing program 0: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000480)}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6}]}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0), 0x20) 19:05:49 executing program 0: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000480)}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:49 executing program 0: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x5008e}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:05:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:49 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x5008e}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x7b, &(0x7f0000000080)=""/123}, &(0x7f0000000180), &(0x7f00000002c0)=""/116, 0x0, 0x0, 0x0, &(0x7f0000000100)}) 19:05:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140), &(0x7f0000000200)=0x8) 19:05:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x0, 0x5008e}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:49 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x7b, &(0x7f0000000080)=""/123}, &(0x7f0000000180), &(0x7f00000002c0)=""/116, 0x0, 0x0, 0x0, &(0x7f0000000100)}) 19:05:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:50 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:05:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x7b, &(0x7f0000000080)=""/123}, &(0x7f0000000180), &(0x7f00000002c0)=""/116, 0x0, 0x0, 0x0, &(0x7f0000000100)}) 19:05:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:05:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000000c0)) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, &(0x7f0000000080)=""/9) 19:05:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:50 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:05:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:50 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) [ 933.720336] kauditd_printk_skb: 6 callbacks suppressed [ 933.720408] audit: type=1326 audit(1529694350.718:2046): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24684 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:51 executing program 3: ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) exit(0x0) 19:05:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) [ 934.131460] audit: type=1326 audit(1529694351.130:2047): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24703 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:51 executing program 3: ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) exit(0x0) 19:05:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) 19:05:51 executing program 3: ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) exit(0x0) 19:05:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080), &(0x7f00000000c0)=0x8) 19:05:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) accept$packet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x14) timerfd_create(0x0, 0x0) 19:05:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:52 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) [ 935.058774] audit: type=1326 audit(1529694352.057:2048): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24753 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:52 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) [ 935.148995] audit: type=1326 audit(1529694352.122:2049): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24768 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:52 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:05:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f00000000c0)) 19:05:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:52 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f00000000c0)) 19:05:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 936.090535] audit: type=1326 audit(1529694353.089:2050): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24811 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:53 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:05:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:53 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:53 executing program 6: pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:53 executing program 6: pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000080)) 19:05:53 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:53 executing program 7: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:53 executing program 6: pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) [ 937.070226] audit: type=1326 audit(1529694354.068:2051): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24870 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:54 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:05:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:54 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:54 executing program 7: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:54 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:54 executing program 7: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:05:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:05:55 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:55 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) [ 938.241390] audit: type=1326 audit(1529694355.231:2052): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24936 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:55 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:55 executing program 2: accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:05:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:55 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:05:55 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:56 executing program 2: accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:56 executing program 4: syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:05:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000340)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:56 executing program 4: syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) [ 939.221364] audit: type=1326 audit(1529694356.220:2053): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24996 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:56 executing program 2: accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000340)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:05:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:56 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:05:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000340)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:57 executing program 4: syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:05:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) 19:05:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) [ 940.195579] audit: type=1326 audit(1529694357.193:2054): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25045 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:57 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:05:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) [ 940.430020] audit: type=1326 audit(1529694357.428:2055): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25061 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:57 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:05:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) [ 940.674969] audit: type=1326 audit(1529694357.673:2056): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25074 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:58 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:05:58 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:58 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:05:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:58 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:05:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:58 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) [ 941.349941] audit: type=1326 audit(1529694358.348:2057): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25098 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:58 executing program 0: recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) [ 941.455799] audit: type=1326 audit(1529694358.453:2058): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25109 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:05:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:58 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:05:58 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) [ 941.750308] audit: type=1326 audit(1529694358.748:2059): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25128 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:05:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:05:59 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) [ 942.301641] audit: type=1326 audit(1529694359.300:2060): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25148 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 942.346415] audit: type=1326 audit(1529694359.329:2061): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25147 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) kexec_load(0x0, 0x0, &(0x7f0000001140), 0x0) 19:05:59 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:05:59 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) [ 942.514055] audit: type=1326 audit(1529694359.512:2062): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25162 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:05:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:05:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) 19:05:59 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:05:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:59 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:05:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:05:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:05:59 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:06:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:06:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000340)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x0, 0x0) 19:06:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:06:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:06:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:00 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:06:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) ptrace$poke(0x0, 0x0, &(0x7f0000000040), 0x0) 19:06:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:06:00 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:06:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:06:00 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:06:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) accept$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000340)=0x14) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/110) 19:06:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:01 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) [ 944.343800] kauditd_printk_skb: 6 callbacks suppressed [ 944.343832] audit: type=1326 audit(1529694361.342:2069): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25263 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:06:01 executing program 3: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:01 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) syz_open_pts(0xffffffffffffffff, 0x0) recvfrom$packet(0xffffffffffffffff, &(0x7f00000000c0)=""/24, 0x18, 0x0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6}, 0x14) 19:06:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:01 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:01 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) [ 945.042568] audit: type=1326 audit(1529694362.041:2070): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25308 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:06:02 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioprio_set$pid(0x0, 0x0, 0x0) [ 945.282357] audit: type=1326 audit(1529694362.281:2071): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25318 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:06:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:02 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:02 executing program 6: timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:02 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:02 executing program 6: timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:02 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0, &(0x7f0000000280)) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f00000001c0)) 19:06:03 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023e}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:03 executing program 6: timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:06:03 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:03 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:03 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) [ 946.265962] audit: type=1326 audit(1529694363.264:2072): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25378 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) [ 946.363059] audit: type=1326 audit(1529694363.361:2073): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25387 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:03 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:03 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:03 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) [ 946.474184] audit: type=1326 audit(1529694363.425:2074): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25391 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:03 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:04 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:04 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50212}]}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:06:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:06:04 executing program 7: socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:04 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 19:06:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) [ 947.429018] audit: type=1326 audit(1529694364.427:2075): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25440 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) [ 947.494214] audit: type=1326 audit(1529694364.465:2076): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25449 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:04 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:06:04 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:04 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) exit(0x0) 19:06:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:05 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:06:05 executing program 2: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:05 executing program 4: pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:05 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050094}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:05 executing program 3: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) [ 948.425049] audit: type=1326 audit(1529694365.421:2077): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25488 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:05 executing program 4: pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:05 executing program 2: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) [ 948.495433] audit: type=1326 audit(1529694365.480:2078): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25500 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50212}]}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x0) 19:06:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50212}]}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:06 executing program 4: pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:06 executing program 2: fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x50212}]}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:06 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) [ 949.783749] audit: type=1326 audit(1529694366.782:2079): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25569 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:06 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:07 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:07 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x5023f}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050094}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) [ 950.727739] audit: type=1326 audit(1529694367.726:2080): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25627 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) [ 950.814406] audit: type=1326 audit(1529694367.761:2081): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25631 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) [ 950.949376] audit: type=1326 audit(1529694367.857:2082): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25638 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) timer_create(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, @thr={&(0x7f00000002c0), &(0x7f0000000300)}}, &(0x7f0000000380)) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) 19:06:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) [ 951.702637] audit: type=1326 audit(1529694368.701:2083): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25674 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) [ 951.792710] audit: type=1326 audit(1529694368.754:2084): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25686 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:08 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) [ 951.951253] audit: type=1326 audit(1529694368.940:2085): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25691 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x5023f}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:09 executing program 0: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioprio_set$pid(0x0, 0x0, 0x0) 19:06:09 executing program 1: prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:09 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:09 executing program 0: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) [ 952.697880] audit: type=1326 audit(1529694369.696:2086): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25725 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 952.770550] audit: type=1326 audit(1529694369.717:2087): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25727 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 952.790510] audit: type=1326 audit(1529694369.720:2088): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25728 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000002c0)) 19:06:09 executing program 0: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:09 executing program 1: prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:09 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:09 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:10 executing program 1: prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:10 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:10 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$KDDISABIO(0xffffffffffffffff, 0x4b37) 19:06:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:10 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:10 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:10 executing program 7: uname(&(0x7f0000000500)=""/4096) 19:06:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$SCSI_IOCTL_GET_PCI(0xffffffffffffffff, 0x5387, &(0x7f0000000080)) 19:06:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f0000000180), 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f0000000100)) 19:06:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:12 executing program 6: vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 19:06:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:12 executing program 6: vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:12 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) [ 955.933731] kauditd_printk_skb: 5 callbacks suppressed [ 955.933752] audit: type=1326 audit(1529694372.932:2094): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25923 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:13 executing program 6: vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:13 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:13 executing program 5: pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) [ 956.358681] audit: type=1326 audit(1529694373.357:2095): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25955 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) [ 956.443880] audit: type=1326 audit(1529694373.393:2096): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25956 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:13 executing program 5: pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:13 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:13 executing program 7: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) [ 956.902640] audit: type=1326 audit(1529694373.901:2097): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25988 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:13 executing program 5: pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:13 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:14 executing program 7: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:14 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) setns(0xffffffffffffffff, 0x0) 19:06:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) 19:06:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) [ 957.368532] audit: type=1326 audit(1529694374.367:2098): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26020 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 957.475271] audit: type=1326 audit(1529694374.420:2099): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26019 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:14 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000240)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2}}, 0x10) 19:06:14 executing program 7: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) setns(0xffffffffffffffff, 0x0) 19:06:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:14 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) [ 957.887994] audit: type=1326 audit(1529694374.886:2100): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26039 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:14 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) setns(0xffffffffffffffff, 0x0) 19:06:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) prctl$setname(0xf, &(0x7f0000000080)='\x00') ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000340)) 19:06:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:15 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:15 executing program 2: syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000004b40)=0xffffffff, 0x4) [ 958.344683] audit: type=1326 audit(1529694375.343:2101): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26062 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 958.413841] audit: type=1326 audit(1529694375.384:2102): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26074 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:15 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:15 executing program 2: syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f5}]}) socket$inet6(0xa, 0x0, 0x0) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000000c0)) 19:06:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:15 executing program 2: syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:15 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:16 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) [ 959.533286] audit: type=1326 audit(1529694376.531:2103): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26142 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:16 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ea}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000280)={'security\x00'}, &(0x7f0000000300)=0x54) 19:06:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) [ 961.390019] kauditd_printk_skb: 3 callbacks suppressed [ 961.390045] audit: type=1326 audit(1529694378.388:2107): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26263 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 961.462790] audit: type=1326 audit(1529694378.461:2108): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26266 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:18 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) [ 961.589294] audit: type=1326 audit(1529694378.587:2109): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26272 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:18 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:18 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) [ 961.721133] audit: type=1326 audit(1529694378.719:2110): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26286 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:18 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:18 executing program 0: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) pkey_alloc(0x0, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000080), &(0x7f0000000100)=0x4) 19:06:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 962.329641] audit: type=1326 audit(1529694379.328:2111): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26313 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 962.395001] audit: type=1326 audit(1529694379.393:2112): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26318 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000001500)) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 19:06:19 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:19 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) [ 962.544741] audit: type=1326 audit(1529694379.542:2113): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26330 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:19 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) [ 962.798872] audit: type=1326 audit(1529694379.797:2114): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26345 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:19 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:19 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:19 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) [ 963.395809] audit: type=1326 audit(1529694380.394:2115): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26373 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x0) setns(0xffffffffffffffff, 0x0) 19:06:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) [ 963.734114] audit: type=1326 audit(1529694380.732:2116): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26401 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 19:06:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x5023f}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:21 executing program 6: pipe(&(0x7f0000000380)) 19:06:21 executing program 7: semctl$GETPID(0x0, 0x0, 0xb, &(0x7f0000000200)=""/4096) 19:06:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:21 executing program 5: mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000011c0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000001180)={&(0x7f0000000440)=@newtclass={0x24, 0x28}, 0x24}, 0x1}, 0x0) 19:06:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501f9}]}) socket$inet6(0xa, 0x0, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x14}, 0x1}, 0x0) 19:06:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) add_key$user(&(0x7f0000001440)='user\x00', &(0x7f0000001480)={0x73, 0x79, 0x7a}, &(0x7f00000014c0), 0x0, 0xfffffffffffffff9) 19:06:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 19:06:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @local, @remote}, &(0x7f0000000200)=0xc) 19:06:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f00000005c0)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 19:06:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000040)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) [ 966.467127] kauditd_printk_skb: 8 callbacks suppressed [ 966.467152] audit: type=1326 audit(1529694383.465:2125): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26550 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) [ 966.573538] audit: type=1326 audit(1529694383.537:2126): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26559 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:23 executing program 2: pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:23 executing program 6: open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:23 executing program 2: pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:24 executing program 6: open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:24 executing program 7: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) geteuid() sched_getscheduler(0x0) 19:06:24 executing program 2: pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:24 executing program 7: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) 19:06:24 executing program 6: open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:24 executing program 5: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:24 executing program 5: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:24 executing program 7: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) geteuid() sched_getscheduler(0x0) 19:06:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:24 executing program 5: fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:24 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) geteuid() sched_getscheduler(0x0) 19:06:25 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:25 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:25 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) geteuid() sched_getscheduler(0x0) 19:06:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:25 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:25 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:25 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:25 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) sched_getscheduler(0x0) 19:06:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:25 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) sched_getscheduler(0x0) 19:06:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syslog(0x0, 0x0, 0x0) 19:06:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) sched_getscheduler(0x0) 19:06:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syslog(0x0, 0x0, 0x0) 19:06:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:26 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:26 executing program 1: geteuid() sched_getscheduler(0x0) 19:06:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) syslog(0x0, 0x0, 0x0) 19:06:26 executing program 0: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x501ed}]}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:26 executing program 1: geteuid() sched_getscheduler(0x0) 19:06:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:27 executing program 0: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:27 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:27 executing program 1: geteuid() sched_getscheduler(0x0) 19:06:27 executing program 0: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:27 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) [ 970.384672] audit: type=1326 audit(1529694387.383:2127): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26847 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) geteuid() sched_getscheduler(0x0) 19:06:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) [ 970.480514] audit: type=1326 audit(1529694387.444:2128): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26852 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) [ 970.588023] audit: type=1326 audit(1529694387.519:2129): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26856 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:27 executing program 3: openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) geteuid() sched_getscheduler(0x0) [ 970.695171] audit: type=1326 audit(1529694387.687:2130): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26870 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:27 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) geteuid() sched_getscheduler(0x0) 19:06:27 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) 19:06:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) [ 971.321182] audit: type=1326 audit(1529694388.319:2131): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26903 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) geteuid() sched_getscheduler(0x0) 19:06:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) [ 971.412650] audit: type=1326 audit(1529694388.411:2132): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26909 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 971.502285] audit: type=1326 audit(1529694388.500:2133): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26919 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) geteuid() sched_getscheduler(0x0) 19:06:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) [ 971.638812] audit: type=1326 audit(1529694388.637:2134): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26930 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) geteuid() sched_getscheduler(0x0) [ 971.716026] audit: type=1326 audit(1529694388.714:2135): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26934 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) pipe(&(0x7f00000001c0)) futimesat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x0, 0x7530}}) [ 972.255975] audit: type=1326 audit(1529694389.254:2136): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26953 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000100)={'veth1_to_team\x00', {0x2, 0x0, @loopback=0x7f000001}}) 19:06:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) [ 972.359986] audit: type=1326 audit(1529694389.358:2137): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26960 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) geteuid() sched_getscheduler(0x0) 19:06:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) 19:06:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) [ 972.468283] audit: type=1326 audit(1529694389.466:2138): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26971 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, &(0x7f0000000040)) 19:06:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) geteuid() sched_getscheduler(0x0) 19:06:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) geteuid() sched_getscheduler(0x0) [ 972.675872] audit: type=1326 audit(1529694389.674:2139): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26982 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) geteuid() sched_getscheduler(0x0) [ 972.774470] audit: type=1326 audit(1529694389.715:2140): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26987 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) [ 972.836210] audit: type=1326 audit(1529694389.827:2141): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26993 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) [ 973.197126] audit: type=1326 audit(1529694390.195:2142): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27004 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) socket$inet(0x2, 0x0, 0x0) 19:06:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) socket$inet(0x2, 0x0, 0x0) 19:06:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) mq_notify(0xffffffffffffffff, &(0x7f0000000200)) 19:06:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getpgid(0xffffffffffffffff) 19:06:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) geteuid() sched_getscheduler(0x0) 19:06:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) socket$inet(0x2, 0x0, 0x0) 19:06:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getpgid(0xffffffffffffffff) 19:06:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) getpgid(0xffffffffffffffff) 19:06:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) setgroups(0x0, &(0x7f0000000340)) 19:06:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) geteuid() sched_getscheduler(0x0) 19:06:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) setgroups(0x0, &(0x7f0000000340)) 19:06:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:31 executing program 4: fchmodat(0xffffffffffffffff, &(0x7f0000007000)='./file0\x00', 0x0) 19:06:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000000), 0x4) 19:06:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000001540)='/dev/full\x00', 0x0, 0x0) syslog(0x0, 0x0, 0x0) 19:06:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) setgroups(0x0, &(0x7f0000000340)) 19:06:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:32 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:32 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:32 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:32 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:33 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:33 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:33 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:33 executing program 6: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:33 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:33 executing program 6: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:33 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:33 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:34 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:34 executing program 6: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:34 executing program 7: openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:34 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:34 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000140)}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:35 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:35 executing program 1: syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:35 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:35 executing program 1: syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:35 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:35 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:35 executing program 1: syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5008c}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:35 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:35 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000140)}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:35 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:35 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) [ 978.931654] kauditd_printk_skb: 8 callbacks suppressed [ 978.931680] audit: type=1326 audit(1529694395.929:2151): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27404 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:35 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:36 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) [ 979.013292] audit: type=1326 audit(1529694395.972:2152): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27410 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:36 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:36 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x5020e}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) [ 979.846284] audit: type=1326 audit(1529694396.844:2153): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27456 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x0, &(0x7f0000000080)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) [ 979.962656] audit: type=1326 audit(1529694396.961:2154): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27472 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50200}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) [ 980.151825] audit: type=1326 audit(1529694397.150:2155): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27480 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000140)=[{0x6}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) setgroups(0x0, &(0x7f0000000340)) 19:06:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) [ 980.779058] audit: type=1326 audit(1529694397.777:2156): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27505 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') write$tun(0xffffffffffffffff, &(0x7f0000000740)={@void, @void, @eth={@random="8df373a2368a", @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "b901e6", 0x8, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @udp={0x0, 0x0, 0x8}}}}}}}, 0x3e) 19:06:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x2000000501f8}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) [ 980.923906] audit: type=1326 audit(1529694397.922:2157): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27517 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) [ 980.988761] audit: type=1326 audit(1529694397.969:2158): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27523 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 981.104883] audit: type=1326 audit(1529694398.096:2159): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27527 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) [ 981.231342] audit: type=1326 audit(1529694398.229:2160): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27541 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x0, &(0x7f00000006c0)}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) inotify_init1(0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 19:06:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) 19:06:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) 19:06:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x0, 0x0, 0x0, 0x50242}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f00000000c0)) 19:06:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) inotify_init1(0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 19:06:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) inotify_init1(0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 19:06:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) inotify_init1(0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 982.743664] device bridge_slave_1 left promiscuous mode [ 982.749582] bridge0: port 2(bridge_slave_1) entered disabled state [ 982.774691] device bridge_slave_0 left promiscuous mode [ 982.780727] bridge0: port 1(bridge_slave_0) entered disabled state 19:06:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) [ 982.912485] team0 (unregistering): Port device team_slave_1 removed [ 982.931606] team0 (unregistering): Port device team_slave_0 removed 19:06:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x10}, 0xc) [ 982.980743] bond0 (unregistering): Releasing backup interface bond_slave_1 19:06:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) [ 983.037235] bond0 (unregistering): Releasing backup interface bond_slave_0 19:06:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) [ 983.160973] bond0 (unregistering): Released all slaves 19:06:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x0, 0x0) splice(0xffffffffffffffff, &(0x7f00000000c0), 0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0) 19:06:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/61) 19:06:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/61) 19:06:40 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/61) 19:06:40 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)) 19:06:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) [ 984.146870] kauditd_printk_skb: 11 callbacks suppressed [ 984.146892] audit: type=1326 audit(1529694401.141:2172): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27661 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 984.169904] IPVS: ftp: loaded support on port[0] = 21 [ 985.156401] device bridge_slave_1 left promiscuous mode [ 985.162286] bridge0: port 2(bridge_slave_1) entered disabled state [ 985.190865] device bridge_slave_0 left promiscuous mode [ 985.196552] bridge0: port 1(bridge_slave_0) entered disabled state [ 985.224370] team0 (unregistering): Port device team_slave_1 removed [ 985.235362] team0 (unregistering): Port device team_slave_0 removed [ 985.245467] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 985.264507] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 985.291156] bond0 (unregistering): Released all slaves [ 985.567243] bridge0: port 1(bridge_slave_0) entered blocking state [ 985.573714] bridge0: port 1(bridge_slave_0) entered disabled state [ 985.581802] device bridge_slave_0 entered promiscuous mode [ 985.642231] bridge0: port 2(bridge_slave_1) entered blocking state [ 985.648733] bridge0: port 2(bridge_slave_1) entered disabled state [ 985.656962] device bridge_slave_1 entered promiscuous mode [ 985.715835] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 985.773409] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 985.936417] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 985.991201] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 986.167959] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 986.175445] team0: Port device team_slave_0 added [ 986.212259] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 986.219798] team0: Port device team_slave_1 added [ 986.256240] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 986.299581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 986.339451] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 986.346753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 986.356146] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 986.390991] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 986.398561] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 986.407932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 986.834558] bridge0: port 2(bridge_slave_1) entered blocking state [ 986.840999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 986.847817] bridge0: port 1(bridge_slave_0) entered blocking state [ 986.854258] bridge0: port 1(bridge_slave_0) entered forwarding state [ 986.861882] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 987.553198] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 988.292713] 8021q: adding VLAN 0 to HW filter on device bond0 [ 988.428581] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 988.559130] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 988.565426] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 988.573744] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 988.699936] 8021q: adding VLAN 0 to HW filter on device team0 19:06:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 19:06:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)) 19:06:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/61) 19:06:46 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000004400)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) 19:06:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6}]}) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='smaps_rollup\x00') ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f0000000080)) 19:06:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x501ea}]}) syz_open_pts(0xffffffffffffffff, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 19:06:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getpgid(0x0) waitid(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)) [ 989.561577] audit: type=1326 audit(1529694406.560:2173): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=27932 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/61) 19:06:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 19:06:46 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)) 19:06:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000004400)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) 19:06:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getpgid(0x0) waitid(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)) 19:06:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/61) 19:06:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000004400)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) 19:06:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) getpgid(0x0) waitid(0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000000140)) 19:06:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 19:06:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000080)) 19:06:47 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:47 executing program 5: inotify_init1(0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 992.849553] IPVS: ftp: loaded support on port[0] = 21 19:06:51 executing program 5: inotify_init1(0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 19:06:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50343}]}) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/61) 19:06:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) recvmmsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000004400)) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) 19:06:51 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000001540)) 19:06:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50200}]}) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000100)={0x0, 'bond0\x00'}, 0x18) 19:06:51 executing program 3: socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000000080)={0x0, 0x0}) close(r1) write$binfmt_script(r0, &(0x7f0000000400)={'#! ', './file0', [], 0xa}, 0xb) write$binfmt_aout(r0, &(0x7f0000000440), 0x20) 19:06:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000140)={'eql\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:06:51 executing program 5: inotify_init1(0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) 19:06:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) [ 994.712845] device bridge_slave_1 left promiscuous mode [ 994.718672] bridge0: port 2(bridge_slave_1) entered disabled state 19:06:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000140)={'eql\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:06:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) [ 994.812742] device bridge_slave_0 left promiscuous mode [ 994.818567] bridge0: port 1(bridge_slave_0) entered disabled state 19:06:51 executing program 6: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, &(0x7f0000000000)=""/61) 19:06:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000700)={0x1, &(0x7f00000006c0)=[{0x6, 0x0, 0x0, 0x50242}]}) ioctl$RNDADDTOENTCNT(0xffffffffffffffff, 0x40045201, &(0x7f0000000080)) 19:06:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5020e}]}) pipe2(&(0x7f0000000000), 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000180), &(0x7f00000000c0)=0xb) 19:06:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000480)=[{0x6, 0x0, 0x0, 0x5008e}]}) arch_prctl(0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000140), &(0x7f0000000040)=0x8) 19:06:52 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl(r0, 0x4000008912, &(0x7f0000000100)="295ee1311f16f477671070") r1 = socket$inet(0x2, 0x6000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000280)='tunl0\x00', 0x10) sendto$inet(r1, &(0x7f00000003c0), 0x53ab, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr}, 0x10) 19:06:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000140)={'eql\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:06:52 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) inotify_init1(0x0) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) [ 995.015850] team0 (unregistering): Port device team_slave_1 removed 19:06:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) [ 995.072041] team0 (unregistering): Port device team_slave_0 removed [ 995.138373] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 995.206954] bond0 (unregistering): Releasing backup interface bond_slave_0 19:06:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000140)={'eql\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 995.357503] bond0 (unregistering): Released all slaves 19:06:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050092}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) 19:06:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000140)={'eql\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:06:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000007080)) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000140)) [ 995.744841] audit: type=1326 audit(1529694412.743:2174): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=28094 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 19:06:52 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000140)={'eql\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 995.933109] IPVS: ftp: loaded support on port[0] = 21 [ 995.933231] IPVS: ftp: loaded support on port[0] = 21 [ 995.953913] IPVS: ftp: loaded support on port[0] = 21 [ 995.971807] IPVS: ftp: loaded support on port[0] = 21 19:06:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050092}]}) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000140)={'eql\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) 19:06:53 executing program 7: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000140)={'eql\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 998.792799] device bridge_slave_1 left promiscuous mode [ 998.798579] bridge0: port 2(bridge_slave_1) entered disabled state [ 998.838269] device bridge_slave_0 left promiscuous mode [ 998.844139] bridge0: port 1(bridge_slave_0) entered disabled state [ 998.871455] device bridge_slave_1 left promiscuous mode [ 998.877281] bridge0: port 2(bridge_slave_1) entered disabled state [ 998.896172] device bridge_slave_0 left promiscuous mode [ 998.901901] bridge0: port 1(bridge_slave_0) entered disabled state [ 998.913800] device bridge_slave_1 left promiscuous mode [ 998.919562] bridge0: port 2(bridge_slave_1) entered disabled state [ 998.932039] device bridge_slave_0 left promiscuous mode [ 998.937829] bridge0: port 1(bridge_slave_0) entered disabled state [ 998.950785] device bridge_slave_1 left promiscuous mode [ 998.956590] bridge0: port 2(bridge_slave_1) entered disabled state [ 998.969110] device bridge_slave_0 left promiscuous mode [ 998.974892] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.083484] team0 (unregistering): Port device team_slave_1 removed [ 999.094493] team0 (unregistering): Port device team_slave_0 removed [ 999.104228] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 999.121301] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 999.162551] bond0 (unregistering): Released all slaves [ 999.267708] IPVS: ftp: loaded support on port[0] = 21 [ 999.279351] bond0 (unregistering): Released all slaves [ 999.299557] team0 (unregistering): Port device team_slave_1 removed [ 999.309259] team0 (unregistering): Port device team_slave_0 removed [ 999.318946] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 999.335955] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 999.361789] bond0 (unregistering): Released all slaves [ 999.384796] team0 (unregistering): Port device team_slave_1 removed [ 999.395001] team0 (unregistering): Port device team_slave_0 removed [ 999.404932] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 999.421501] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 999.445515] bond0 (unregistering): Released all slaves [ 999.463577] team0 (unregistering): Port device team_slave_1 removed [ 999.473729] team0 (unregistering): Port device team_slave_0 removed [ 999.483737] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 999.499119] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 999.527401] bond0 (unregistering): Released all slaves [ 999.822330] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.828863] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.880854] device bridge_slave_0 entered promiscuous mode [ 999.937227] bridge0: port 1(bridge_slave_0) entered blocking state [ 999.943702] bridge0: port 1(bridge_slave_0) entered disabled state [ 999.978213] device bridge_slave_0 entered promiscuous mode [ 1000.023161] bridge0: port 2(bridge_slave_1) entered blocking state [ 1000.029643] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.061352] device bridge_slave_1 entered promiscuous mode [ 1000.107389] bridge0: port 1(bridge_slave_0) entered blocking state [ 1000.113956] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.141285] device bridge_slave_0 entered promiscuous mode [ 1000.166793] bridge0: port 2(bridge_slave_1) entered blocking state [ 1000.173354] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.214132] device bridge_slave_1 entered promiscuous mode [ 1000.238389] bridge0: port 1(bridge_slave_0) entered blocking state [ 1000.245139] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.266144] device bridge_slave_0 entered promiscuous mode [ 1000.288405] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1000.337355] bridge0: port 2(bridge_slave_1) entered blocking state [ 1000.343877] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.395175] device bridge_slave_1 entered promiscuous mode [ 1000.439412] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 1000.450957] bridge0: port 2(bridge_slave_1) entered blocking state [ 1000.457454] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.507803] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1000.519795] syz-executor6 cpuset=/ mems_allowed=0 [ 1000.524820] CPU: 0 PID: 28097 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 1000.531706] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.541091] Call Trace: [ 1000.543728] dump_stack+0x185/0x1d0 [ 1000.547107] device bridge_slave_1 entered promiscuous mode [ 1000.547403] warn_alloc+0x430/0x690 [ 1000.556700] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1000.561628] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.566417] copy_process+0x778/0x9be0 [ 1000.570354] ? prepare_exit_to_usermode+0x271/0x3a0 [ 1000.575425] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 1000.580852] ? do_signal+0x49f/0x1d20 [ 1000.584717] ? __msan_poison_alloca+0x141/0x1d0 [ 1000.589456] _do_fork+0x353/0xf60 [ 1000.593019] __x64_sys_clone+0x15e/0x1b0 [ 1000.597142] ? __ia32_sys_vfork+0x70/0x70 [ 1000.601348] do_syscall_64+0x15b/0x230 [ 1000.605298] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1000.610531] RIP: 0033:0x41f8b9 [ 1000.613745] RSP: 002b:0000000000a3fad0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1000.621508] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 000000000041f8b9 [ 1000.628816] RDX: 0000000000a3fadc RSI: 0000000000000000 RDI: 0000000000100011 [ 1000.636147] RBP: 0000000000a3fc80 R08: 0000000000a44a60 R09: 000000000000001e [ 1000.643486] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000a3fe60 [ 1000.650942] R13: 0000000000a3fe28 R14: 0000000000000000 R15: 0000000000000000 [ 1000.658507] Mem-Info: [ 1000.661061] active_anon:138686 inactive_anon:78 isolated_anon:0 [ 1000.661061] active_file:2621 inactive_file:4677 isolated_file:64 [ 1000.661061] unevictable:0 dirty:32 writeback:0 unstable:0 [ 1000.661061] slab_reclaimable:3312 slab_unreclaimable:8939 [ 1000.661061] mapped:72296 shmem:84 pagetables:1089 bounce:0 [ 1000.661061] free:24767 free_pcp:299 free_cma:0 [ 1000.694511] Node 0 active_anon:554744kB inactive_anon:312kB active_file:10600kB inactive_file:16912kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:287792kB dirty:128kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 249856kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1000.703037] syz-executor3: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1000.722921] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1000.722997] lowmem_reserve[]: 0 2817 7244 [ 1000.735004] syz-executor3 cpuset= [ 1000.761626] 7244 [ 1000.765813] / [ 1000.771357] mems_allowed=0 [ 1000.771391] CPU: 1 PID: 28266 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 1000.773096] Node 0 [ 1000.776012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.776028] Call Trace: [ 1000.776079] dump_stack+0x185/0x1d0 [ 1000.782952] DMA32 free:48612kB min:26224kB low:32780kB high:39336kB active_anon:246308kB inactive_anon:16kB active_file:3304kB inactive_file:8624kB unevictable:0kB writepending:68kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1728kB pagetables:1500kB bounce:0kB free_pcp:688kB local_pcp:0kB free_cma:0kB [ 1000.785121] warn_alloc+0x430/0x690 [ 1000.785174] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1000.794506] lowmem_reserve[]: [ 1000.797114] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.797180] copy_process+0x778/0x9be0 [ 1000.800767] 0 [ 1000.829147] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.829195] ? handle_mm_fault+0x74eb/0x7ed0 [ 1000.832794] 0 [ 1000.837633] ? handle_mm_fault+0x74eb/0x7ed0 [ 1000.837681] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1000.840775] 4426 [ 1000.845458] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 1000.845505] ? handle_mm_fault+0x1eb0/0x7ed0 [ 1000.849367] 4426 [ 1000.851160] ? __msan_poison_alloca+0x141/0x1d0 [ 1000.851215] _do_fork+0x353/0xf60 [ 1000.860261] __x64_sys_clone+0x15e/0x1b0 [ 1000.860299] ? __ia32_sys_vfork+0x70/0x70 [ 1000.862086] Node 0 [ 1000.866477] do_syscall_64+0x15b/0x230 [ 1000.866520] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1000.871921] Normal free:36064kB min:41208kB low:51508kB high:61808kB active_anon:308672kB inactive_anon:296kB active_file:6780kB inactive_file:7884kB unevictable:0kB writepending:60kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7552kB pagetables:2856kB bounce:0kB free_pcp:672kB local_pcp:0kB free_cma:0kB [ 1000.873901] RIP: 0033:0x458429 [ 1000.873914] RSP: 002b:00007ffd736a5b38 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 1000.879915] lowmem_reserve[]: [ 1000.884298] RAX: ffffffffffffffda RBX: 00007ffd736a5bf0 RCX: 0000000000458429 [ 1000.884314] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 1000.884344] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 1000.886414] 0 [ 1000.891056] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 1000.891071] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 1000.995790] 0 0 0 [ 1000.998093] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1001.011574] Node 0 DMA32: 125*4kB (M) 3373*8kB (UM) 340*16kB (UM) 5*32kB (UM) 10*64kB (U) 2*128kB (U) 1*256kB (U) 1*512kB (U) 1*1024kB (U) 3*2048kB (H) 2*4096kB (H) = 50108kB [ 1001.027657] Node 0 Normal: 1781*4kB (UME) 1237*8kB (UME) 359*16kB (UME) 19*32kB (ME) 19*64kB (UM) 24*128kB (UM) 1*256kB (U) 0*512kB 0*1024kB 2*2048kB (UM) 2*4096kB (UM) = 40204kB [ 1001.044008] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1001.052712] 5807 total pagecache pages [ 1001.056711] 0 pages in swap cache [ 1001.060283] Swap cache stats: add 0, delete 0, find 0/0 [ 1001.065735] Free swap = 0kB [ 1001.068867] Total swap = 0kB [ 1001.071969] 1965969 pages RAM [ 1001.075200] 0 pages HighMem/MovableOnly [ 1001.079263] 106316 pages reserved [ 1001.168222] kthreadd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1001.179184] kthreadd cpuset=/ mems_allowed=0 [ 1001.183748] CPU: 1 PID: 2 Comm: kthreadd Not tainted 4.17.0+ #9 [ 1001.189834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.199212] Call Trace: [ 1001.201869] dump_stack+0x185/0x1d0 [ 1001.205539] warn_alloc+0x430/0x690 [ 1001.209238] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1001.214142] ? __msan_poison_alloca+0x15c/0x1d0 [ 1001.218888] copy_process+0x778/0x9be0 [ 1001.222812] ? __list_add_valid+0xb8/0x450 [ 1001.227091] ? pick_next_task_fair+0x22c9/0x2530 [ 1001.231889] ? kthread_blkcg+0xf0/0xf0 [ 1001.235815] ? __msan_poison_alloca+0x140/0x1d0 [ 1001.240535] _do_fork+0x353/0xf60 [ 1001.244033] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1001.249480] ? balance_callback+0x48/0x260 [ 1001.253793] ? kthread_blkcg+0xf0/0xf0 [ 1001.257738] kernel_thread+0xc6/0xe0 [ 1001.261497] ? kthread_blkcg+0xf0/0xf0 [ 1001.265428] kthreadd+0x5df/0x940 [ 1001.268929] ? kthread_stop+0x680/0x680 [ 1001.272956] ret_from_fork+0x35/0x40 [ 1001.277621] BUG: unable to handle kernel NULL pointer dereference at 00000000000008cc [ 1001.285612] PGD 80000001c2691067 P4D 80000001c2691067 PUD 1c2694067 PMD 0 [ 1001.292648] Oops: 0002 [#1] SMP PTI [ 1001.296279] Dumping ftrace buffer: [ 1001.299820] (ftrace buffer empty) [ 1001.303539] Modules linked in: [ 1001.306768] CPU: 1 PID: 1126 Comm: kworker/1:1 Not tainted 4.17.0+ #9 [ 1001.313358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.322749] RIP: 0010:memset_erms+0x9/0x10 [ 1001.326983] RSP: 0018:ffff8801d83dfa50 EFLAGS: 00010046 [ 1001.332343] RAX: 0000000000000000 RBX: ffff8801d8000000 RCX: 0000000000000fb0 [ 1001.339593] RDX: 0000000000000fb0 RSI: 0000000000000000 RDI: 00000000000008cc [ 1001.347645] RBP: ffff8801d83dfa80 R08: 0000000000000000 R09: 00000000000008cc [ 1001.354906] R10: 0000000000000000 R11: ffffffff813553c0 R12: ffff8801d80008d8 [ 1001.362158] R13: 0000000000000000 R14: 0000000000000282 R15: fffffffffffffff4 [ 1001.370017] FS: 0000000000000000(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 1001.378229] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1001.384092] CR2: 00000000000000b0 CR3: 00000001b5454000 CR4: 00000000001406e0 [ 1001.391349] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1001.398601] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1001.405870] Call Trace: [ 1001.408450] ? kmsan_thread_create+0x56/0xb0 [ 1001.412852] __kthread_create_on_node+0x6ba/0x7b0 [ 1001.417697] kthread_create_on_node+0x243/0x270 [ 1001.422354] ? process_one_work+0x1fa0/0x1fa0 [ 1001.426844] create_worker+0x7c6/0x1000 [ 1001.430806] worker_thread+0x876/0x24f0 [ 1001.434775] kthread+0x4db/0x6c0 [ 1001.438153] ? process_one_work+0x1fa0/0x1fa0 [ 1001.442638] ? kthread_blkcg+0xf0/0xf0 [ 1001.446512] ret_from_fork+0x35/0x40 [ 1001.450207] Code: 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 [ 1001.469418] RIP: memset_erms+0x9/0x10 RSP: ffff8801d83dfa50 [ 1001.475120] CR2: 00000000000008cc [ 1001.478576] ---[ end trace c1915eba1ea75ecd ]--- [ 1001.483315] Kernel panic - not syncing: Fatal exception [ 1001.489323] Dumping ftrace buffer: [ 1001.492852] (ftrace buffer empty) [ 1001.496542] Kernel Offset: disabled [ 1001.500155] Rebooting in 86400 seconds..