540)=[{0x0, 0x0, 0x0, 0x50029}]}) socket$inet6(0xa, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 23:17:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) 23:17:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:17:17 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 23:17:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) [ 792.665008] audit: type=1326 audit(1529709437.663:1719): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15466 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:17 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) 23:17:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:17:17 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50029}]}) socket$inet6(0xa, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 23:17:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) [ 792.842945] audit: type=1326 audit(1529709437.841:1720): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15475 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000080)) 23:17:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 23:17:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="2f70726b632f7379732f6e65742f697076342f76732f6c626c635f65787069726174696f6e00ea51c8f3e002debfcaad3bc398a25a01b5a2d61184dbe9fccb0366199aa2da68e38df31fa63fd72fb5b8274392b422c7b91a9ecfabe8f2bb067de67464a93089216aa17e1cad64b0c804aba16045f25952ca2e03debed50196983e36cb6aa3fd93ecdfafddcaada144c7b6f6a7b01b2586ee16b6abeb9923439ce97c9dd1df4bc39c8c000000000000001138b45d0633c3a5e4329f8a35436058d7b87142037523e1ba8fa0f81129ad6f467f791cbb880c3f2c7c776095c152ef4cf422863a1d89a6e03c96f27da47fc34ca907a807b13c492168e34727de5c4b989d96ee50f11d5c9401f4543f46a65e47661538a2d1f62e39a8847ca11defd52572c51d3dd158caccb1efac453e61feb23d69c43e1f329eb5e9b72891be0d9015338e620190973aa607031f25e910ae0ed8", 0x2, 0x0) [ 793.076343] audit: type=1326 audit(1529709438.075:1721): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15496 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50029}]}) socket$inet6(0xa, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 23:17:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) 23:17:18 executing program 4: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 23:17:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) 23:17:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x5}) 23:17:18 executing program 4: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 23:17:18 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) 23:17:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="2f70726b632f7379732f6e65742f697076342f76732f6c626c635f65787069726174696f6e00ea51c8f3e002debfcaad3bc398a25a01b5a2d61184dbe9fccb0366199aa2da68e38df31fa63fd72fb5b8274392b422c7b91a9ecfabe8f2bb067de67464a93089216aa17e1cad64b0c804aba16045f25952ca2e03debed50196983e36cb6aa3fd93ecdfafddcaada144c7b6f6a7b01b2586ee16b6abeb9923439ce97c9dd1df4bc39c8c000000000000001138b45d0633c3a5e4329f8a35436058d7b87142037523e1ba8fa0f81129ad6f467f791cbb880c3f2c7c776095c152ef4cf422863a1d89a6e03c96f27da47fc34ca907a807b13c492168e34727de5c4b989d96ee50f11d5c9401f4543f46a65e47661538a2d1f62e39a8847ca11defd52572c51d3dd158caccb1efac453e61feb23d69c43e1f329eb5e9b72891be0d9015338e620190973aa607031f25e910ae0ed8", 0x2, 0x0) 23:17:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:17:18 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 23:17:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) [ 793.932762] audit: type=1326 audit(1529709438.931:1722): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15537 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000080)) 23:17:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, &(0x7f0000000080)={0x5}) 23:17:19 executing program 4: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpid() setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) 23:17:19 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) [ 794.008301] audit: type=1326 audit(1529709438.988:1723): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15535 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 23:17:19 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) [ 794.139658] audit: type=1326 audit(1529709439.138:1724): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15555 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:19 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpid() setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) 23:17:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 23:17:19 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:19 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="2f70726b632f7379732f6e65742f697076342f76732f6c626c635f65787069726174696f6e00ea51c8f3e002debfcaad3bc398a25a01b5a2d61184dbe9fccb0366199aa2da68e38df31fa63fd72fb5b8274392b422c7b91a9ecfabe8f2bb067de67464a93089216aa17e1cad64b0c804aba16045f25952ca2e03debed50196983e36cb6aa3fd93ecdfafddcaada144c7b6f6a7b01b2586ee16b6abeb9923439ce97c9dd1df4bc39c8c000000000000001138b45d0633c3a5e4329f8a35436058d7b87142037523e1ba8fa0f81129ad6f467f791cbb880c3f2c7c776095c152ef4cf422863a1d89a6e03c96f27da47fc34ca907a807b13c492168e34727de5c4b989d96ee50f11d5c9401f4543f46a65e47661538a2d1f62e39a8847ca11defd52572c51d3dd158caccb1efac453e61feb23d69c43e1f329eb5e9b72891be0d9015338e620190973aa607031f25e910ae0ed8", 0x2, 0x0) 23:17:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:17:19 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 23:17:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpid() setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) 23:17:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) ptrace$peek(0x0, 0x0, &(0x7f0000000080)) 23:17:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:20 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="2f70726b632f7379732f6e65742f697076342f76732f6c626c635f65787069726174696f6e00ea51c8f3e002debfcaad3bc398a25a01b5a2d61184dbe9fccb0366199aa2da68e38df31fa63fd72fb5b8274392b422c7b91a9ecfabe8f2bb067de67464a93089216aa17e1cad64b0c804aba16045f25952ca2e03debed50196983e36cb6aa3fd93ecdfafddcaada144c7b6f6a7b01b2586ee16b6abeb9923439ce97c9dd1df4bc39c8c000000000000001138b45d0633c3a5e4329f8a35436058d7b87142037523e1ba8fa0f81129ad6f467f791cbb880c3f2c7c776095c152ef4cf422863a1d89a6e03c96f27da47fc34ca907a807b13c492168e34727de5c4b989d96ee50f11d5c9401f4543f46a65e47661538a2d1f62e39a8847ca11defd52572c51d3dd158caccb1efac453e61feb23d69c43e1f329eb5e9b72891be0d9015338e620190973aa607031f25e910ae0ed8", 0x2, 0x0) 23:17:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) 23:17:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) 23:17:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) 23:17:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 23:17:20 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) 23:17:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:20 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) socket$inet6(0xa, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 23:17:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) 23:17:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="2f70726b632f7379732f6e65742f697076342f76732f6c626c635f65787069726174696f6e00ea51c8f3e002debfcaad3bc398a25a01b5a2d61184dbe9fccb0366199aa2da68e38df31fa63fd72fb5b8274392b422c7b91a9ecfabe8f2bb067de67464a93089216aa17e1cad64b0c804aba16045f25952ca2e03debed50196983e36cb6aa3fd93ecdfafddcaada144c7b6f6a7b01b2586ee16b6abeb9923439ce97c9dd1df4bc39c8c000000000000001138b45d0633c3a5e4329f8a35436058d7b87142037523e1ba8fa0f81129ad6f467f791cbb880c3f2c7c776095c152ef4cf422863a1d89a6e03c96f27da47fc34ca907a807b13c492168e34727de5c4b989d96ee50f11d5c9401f4543f46a65e47661538a2d1f62e39a8847ca11defd52572c51d3dd158caccb1efac453e61feb23d69c43e1f329eb5e9b72891be0d9015338e620190973aa607031f25e910ae0ed8", 0x2, 0x0) 23:17:20 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:20 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) [ 795.920771] kauditd_printk_skb: 4 callbacks suppressed [ 795.920791] audit: type=1326 audit(1529709440.918:1729): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15657 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) getpid() setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) 23:17:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 796.169971] audit: type=1326 audit(1529709441.168:1730): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15672 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 23:17:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) 23:17:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) [ 796.512389] audit: type=1326 audit(1529709441.511:1731): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15691 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) 23:17:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() [ 796.847834] audit: type=1326 audit(1529709441.846:1732): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15697 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="2f70726b632f7379732f6e65742f697076342f76732f6c626c635f65787069726174696f6e00ea51c8f3e002debfcaad3bc398a25a01b5a2d61184dbe9fccb0366199aa2da68e38df31fa63fd72fb5b8274392b422c7b91a9ecfabe8f2bb067de67464a93089216aa17e1cad64b0c804aba16045f25952ca2e03debed50196983e36cb6aa3fd93ecdfafddcaada144c7b6f6a7b01b2586ee16b6abeb9923439ce97c9dd1df4bc39c8c000000000000001138b45d0633c3a5e4329f8a35436058d7b87142037523e1ba8fa0f81129ad6f467f791cbb880c3f2c7c776095c152ef4cf422863a1d89a6e03c96f27da47fc34ca907a807b13c492168e34727de5c4b989d96ee50f11d5c9401f4543f46a65e47661538a2d1f62e39a8847ca11defd52572c51d3dd158caccb1efac453e61feb23d69c43e1f329eb5e9b72891be0d9015338e620190973aa607031f25e910ae0ed8", 0x2, 0x0) 23:17:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) getpid() setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) 23:17:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) [ 797.197182] audit: type=1326 audit(1529709442.195:1733): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15725 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:22 executing program 1: pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50343}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) 23:17:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) 23:17:22 executing program 1: pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) [ 797.638470] audit: type=1326 audit(1529709442.637:1734): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15755 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:22 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() [ 797.834515] audit: type=1326 audit(1529709442.833:1735): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15768 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) getpid() setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) 23:17:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:23 executing program 1: pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) gettid() 23:17:23 executing program 7: socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) [ 798.183917] audit: type=1326 audit(1529709443.182:1736): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15786 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:23 executing program 7: socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) gettid() 23:17:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:23 executing program 5: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) 23:17:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) [ 798.573031] audit: type=1326 audit(1529709443.571:1737): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15809 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:17:23 executing program 5: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) gettid() 23:17:23 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) [ 798.803790] audit: type=1326 audit(1529709443.802:1738): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15821 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:24 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:24 executing program 7: socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:24 executing program 5: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:24 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:24 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:24 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000400)="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", 0x2, 0x0) 23:17:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) pipe(&(0x7f00000001c0)) 23:17:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) pipe(&(0x7f00000001c0)) 23:17:24 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:24 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:24 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:24 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) pipe(&(0x7f00000001c0)) 23:17:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:25 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 23:17:25 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) 23:17:25 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) [ 801.214950] kauditd_printk_skb: 1 callbacks suppressed [ 801.214974] audit: type=1326 audit(1529709446.213:1740): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=15992 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:26 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) [ 801.790997] audit: type=1326 audit(1529709446.789:1741): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16037 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:27 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) [ 802.177577] audit: type=1326 audit(1529709447.176:1742): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16050 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:27 executing program 6: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:27 executing program 4: getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) [ 802.464393] audit: type=1326 audit(1529709447.463:1743): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16078 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 802.548368] audit: type=1326 audit(1529709447.528:1744): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16083 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:27 executing program 4: getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000140)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000000)={{0x77359400}}, &(0x7f0000000100)) 23:17:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:28 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:28 executing program 4: getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) [ 803.105951] audit: type=1326 audit(1529709448.104:1745): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16099 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:28 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) [ 803.169793] audit: type=1326 audit(1529709448.155:1746): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16109 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:28 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:28 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) [ 803.511363] audit: type=1326 audit(1529709448.509:1747): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16133 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 803.577577] audit: type=1326 audit(1529709448.570:1748): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16141 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00'}, 0x10) 23:17:29 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) [ 804.096733] audit: type=1326 audit(1529709449.095:1749): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16151 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:29 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f0000000080)) 23:17:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) gettid() 23:17:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:29 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:30 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) pipe(&(0x7f00000001c0)) 23:17:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioprio_get$pid(0x0, 0x0) 23:17:30 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:30 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioprio_get$pid(0x0, 0x0) 23:17:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) [ 806.536021] kauditd_printk_skb: 7 callbacks suppressed [ 806.541620] audit: type=1326 audit(1529709451.534:1757): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16300 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:31 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioprio_get$pid(0x0, 0x0) 23:17:31 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:31 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:32 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) [ 807.064673] audit: type=1326 audit(1529709452.062:1758): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16318 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:32 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) [ 807.223715] audit: type=1326 audit(1529709452.222:1759): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16333 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:32 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:32 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000140)) 23:17:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:32 executing program 1: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:32 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:32 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) [ 807.542924] audit: type=1326 audit(1529709452.541:1760): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16357 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:32 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:32 executing program 0: pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:32 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) [ 808.011479] audit: type=1326 audit(1529709453.010:1761): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16376 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) getpid() setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000040), 0x4) 23:17:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:33 executing program 0: pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) [ 808.150990] audit: type=1326 audit(1529709453.149:1762): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16381 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:33 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:33 executing program 0: pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:33 executing program 7: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:33 executing program 7: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:33 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:33 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) 23:17:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) [ 808.944153] audit: type=1326 audit(1529709453.942:1763): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16429 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:34 executing program 7: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:34 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:34 executing program 0: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:34 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:34 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) [ 809.922411] audit: type=1326 audit(1529709454.920:1764): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16482 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) [ 810.372624] audit: type=1326 audit(1529709455.371:1765): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16526 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) [ 810.895162] audit: type=1326 audit(1529709455.893:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16548 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:35 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) 23:17:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioprio_get$pid(0x0, 0x0) 23:17:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) [ 811.862737] kauditd_printk_skb: 2 callbacks suppressed [ 811.862794] audit: type=1326 audit(1529709456.861:1769): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16596 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:36 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) fstat(0xffffffffffffffff, &(0x7f0000000140)) [ 812.054341] audit: type=1326 audit(1529709457.053:1770): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16605 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 812.127756] audit: type=1326 audit(1529709457.094:1771): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16608 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:37 executing program 2: pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) memfd_create(&(0x7f0000000180)='ppp1#ppp0loeth1!\x00', 0x0) [ 812.408916] audit: type=1326 audit(1529709457.407:1772): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16630 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:37 executing program 2: pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:37 executing program 6: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:37 executing program 3: add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:37 executing program 3: add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:37 executing program 6: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:37 executing program 2: pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:38 executing program 0: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) 23:17:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:38 executing program 4: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:38 executing program 3: add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:38 executing program 6: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:38 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) [ 813.122925] audit: type=1326 audit(1529709458.121:1773): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16662 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 813.208249] audit: type=1326 audit(1529709458.143:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16665 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:38 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:38 executing program 4: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:38 executing program 4: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:39 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:39 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f00000002c0)) 23:17:39 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:39 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022b}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) [ 814.150672] audit: type=1326 audit(1529709459.149:1775): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16733 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:39 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022b}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022b}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:40 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:40 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022b}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:40 executing program 1: getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022b}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:40 executing program 1: getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:40 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022b}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:41 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:41 executing program 1: getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) [ 816.122790] audit: type=1326 audit(1529709461.121:1776): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16866 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022b}]}) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) [ 816.276774] audit: type=1326 audit(1529709461.167:1777): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16868 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 816.296769] audit: type=1326 audit(1529709461.273:1778): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16880 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:41 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:41 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:41 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:41 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:41 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) 23:17:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:42 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:42 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) [ 817.038010] audit: type=1326 audit(1529709462.036:1779): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16919 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 817.114049] audit: type=1326 audit(1529709462.112:1780): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16927 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 817.160737] audit: type=1326 audit(1529709462.158:1781): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16925 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:42 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:42 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022b}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:42 executing program 7: pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) [ 817.285930] audit: type=1326 audit(1529709462.284:1782): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16938 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:42 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022b}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:42 executing program 7: pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000080)) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180), 0xfffffffffffffdde) [ 817.975644] audit: type=1326 audit(1529709462.974:1783): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16971 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:17:43 executing program 7: pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5022b}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) [ 818.113370] audit: type=1326 audit(1529709463.112:1784): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16984 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000000)) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000001c0)=""/232, &(0x7f00000002c0)=0xe8) 23:17:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) [ 818.264151] audit: type=1326 audit(1529709463.259:1785): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=16990 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:43 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) [ 818.323655] audit: type=1326 audit(1529709463.312:1786): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17000 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a}, &(0x7f00000001c0), 0x0, 0xfffffffffffffffb) ptrace$cont(0x0, 0x0, 0x0, 0x0) 23:17:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:44 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f00000000c0)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) fstat(0xffffffffffffffff, &(0x7f0000000140)) 23:17:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5022b}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) [ 819.307007] audit: type=1326 audit(1529709464.305:1787): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17045 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5022b}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) [ 819.525939] audit: type=1326 audit(1529709464.524:1788): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17067 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5022b}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:44 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:45 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) getsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000140), &(0x7f0000000180)=0x4) socket$nl_netfilter(0x10, 0x3, 0xc) 23:17:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$PPPIOCGCHAN(0xffffffffffffffff, 0x80047437, &(0x7f0000000080)) 23:17:46 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:46 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:46 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:46 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:46 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:46 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, &(0x7f0000000140)=""/215) 23:17:46 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:46 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:47 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:47 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) [ 822.333757] kauditd_printk_skb: 9 callbacks suppressed [ 822.333781] audit: type=1326 audit(1529709467.332:1798): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17224 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:47 executing program 3: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:47 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:47 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:47 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:47 executing program 4: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000140)) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000580)=""/4096) 23:17:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:48 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:48 executing program 4: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 823.302878] audit: type=1326 audit(1529709468.301:1799): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17278 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:48 executing program 4: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:49 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:49 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:49 executing program 5: socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:49 executing program 5: socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:50 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:50 executing program 5: socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 825.223106] audit: type=1326 audit(1529709470.221:1800): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17417 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) [ 825.324553] audit: type=1326 audit(1529709470.284:1801): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17424 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:50 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:50 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) [ 825.443385] audit: type=1326 audit(1529709470.430:1802): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17433 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:50 executing program 1: openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:50 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:50 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:50 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:50 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) [ 826.118187] audit: type=1326 audit(1529709471.116:1803): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17470 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 826.229639] audit: type=1326 audit(1529709471.228:1804): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17478 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:51 executing program 0: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:51 executing program 7: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) [ 826.421299] audit: type=1326 audit(1529709471.419:1805): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17495 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:51 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 23:17:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)}, &(0x7f0000000400)=0x10) 23:17:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) [ 827.167526] audit: type=1326 audit(1529709472.166:1806): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17528 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 827.221410] audit: type=1326 audit(1529709472.194:1807): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17531 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:52 executing program 7: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioprio_set$uid(0x0, 0x0, 0x0) 23:17:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) [ 827.347280] audit: type=1326 audit(1529709472.345:1808): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17540 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:52 executing program 7: openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) [ 827.403355] audit: type=1326 audit(1529709472.399:1809): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17548 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:53 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) [ 828.290797] audit: type=1326 audit(1529709473.289:1810): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17591 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 828.378708] audit: type=1326 audit(1529709473.377:1811): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17595 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:53 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) [ 828.740263] audit: type=1326 audit(1529709473.738:1812): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17630 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000001500)=@generic) 23:17:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) [ 829.250165] audit: type=1326 audit(1529709474.248:1813): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17646 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) [ 829.324439] audit: type=1326 audit(1529709474.306:1814): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17653 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) [ 829.448568] audit: type=1326 audit(1529709474.443:1815): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17659 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) msgget(0xffffffffffffffff, 0x0) 23:17:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) [ 829.777908] audit: type=1326 audit(1529709474.776:1816): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17685 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) msgget(0xffffffffffffffff, 0x0) 23:17:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) [ 830.251224] audit: type=1326 audit(1529709475.249:1817): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17701 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$key(0xf, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:17:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) msgget(0xffffffffffffffff, 0x0) 23:17:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:17:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:55 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0x0, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) 23:17:55 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:55 executing program 6: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:17:55 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:56 executing program 6: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000140), 0x10) 23:17:56 executing program 6: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:17:56 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:56 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:17:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:56 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:56 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:17:56 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:17:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:56 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:17:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:17:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:57 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:17:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:57 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:17:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) 23:17:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:17:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:17:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x0, 0x0) msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000200)=""/4096) 23:17:57 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:17:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:17:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:57 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:17:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) [ 832.862226] kauditd_printk_skb: 5 callbacks suppressed [ 832.862249] audit: type=1326 audit(1529709477.860:1823): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17878 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:57 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:57 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:17:57 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:17:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:17:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:17:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:17:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:58 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:17:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:58 executing program 4: socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:17:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:17:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:17:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:58 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:17:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:17:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:17:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:17:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:17:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:59 executing program 1: pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:17:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:17:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:59 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:17:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:17:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) [ 834.372635] audit: type=1326 audit(1529709479.371:1824): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17971 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:17:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:17:59 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:17:59 executing program 1: pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:17:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:17:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) [ 834.586575] audit: type=1326 audit(1529709479.585:1825): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17992 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:59 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:17:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) [ 834.668611] audit: type=1326 audit(1529709479.608:1826): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=17993 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:17:59 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:17:59 executing program 1: pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:17:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:18:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:18:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:18:00 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:18:00 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:18:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:00 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) [ 835.326141] audit: type=1326 audit(1529709480.324:1827): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18036 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:18:00 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:18:00 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:18:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:18:00 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:18:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:18:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:00 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:18:00 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) [ 835.539187] audit: type=1326 audit(1529709480.537:1828): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18050 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:00 executing program 5: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x502a5}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) [ 835.634716] audit: type=1326 audit(1529709480.633:1829): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18054 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:01 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, &(0x7f0000000140)}) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) 23:18:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:18:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:18:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:18:01 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) [ 836.307508] audit: type=1326 audit(1529709481.306:1830): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18089 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) msgget(0xffffffffffffffff, 0x0) 23:18:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:18:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:18:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$KDSKBSENT(0xffffffffffffffff, 0x4b49, &(0x7f0000000000)) 23:18:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:18:01 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:18:01 executing program 7: socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:18:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) [ 836.527218] audit: type=1326 audit(1529709481.525:1831): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18104 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:01 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) [ 836.641465] audit: type=1326 audit(1529709481.640:1832): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18115 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:01 executing program 7: socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:02 executing program 7: socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:02 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:18:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:18:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:18:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:18:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:18:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:18:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:18:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:18:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:02 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:18:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:18:02 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:18:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:18:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:18:03 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:18:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:18:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) [ 838.431468] kauditd_printk_skb: 2 callbacks suppressed [ 838.431491] audit: type=1326 audit(1529709483.429:1835): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18206 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:03 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:18:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) [ 838.657746] audit: type=1326 audit(1529709483.656:1836): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18230 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:18:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:18:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ftruncate(0xffffffffffffffff, 0x0) [ 838.825044] audit: type=1326 audit(1529709483.823:1837): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18242 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000100)) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000000)) 23:18:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:18:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ftruncate(0xffffffffffffffff, 0x0) [ 839.364723] audit: type=1326 audit(1529709484.363:1838): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18255 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ftruncate(0xffffffffffffffff, 0x0) 23:18:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) [ 839.427837] audit: type=1326 audit(1529709484.402:1839): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18261 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:04 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:18:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) [ 839.695392] audit: type=1326 audit(1529709484.693:1840): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18282 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe2(&(0x7f00000000c0), 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x0, 0x4) 23:18:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:04 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) [ 839.835234] audit: type=1326 audit(1529709484.833:1841): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18294 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:05 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:05 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:05 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:18:05 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) [ 840.354807] audit: type=1326 audit(1529709485.353:1842): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18314 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:05 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:05 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:05 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x6}]}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000e00)={{{@in6, @in=@loopback}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @empty, @broadcast}, &(0x7f00000001c0)=0xc) 23:18:05 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:05 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:05 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:05 executing program 2: openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) [ 840.684688] audit: type=1326 audit(1529709485.682:1843): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18338 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 840.781149] audit: type=1326 audit(1529709485.779:1844): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18342 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:05 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:05 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(0xffffffffffffffff, 0x402c5342, &(0x7f0000000040)={0x0, 0x0, 0x0, {0x77359400}}) 23:18:06 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:06 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:06 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:06 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:06 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:07 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e, 0x0, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80) 23:18:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:07 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:07 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:08 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setns(0xffffffffffffffff, 0x0) 23:18:08 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) 23:18:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:08 executing program 1: socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) [ 843.945888] kauditd_printk_skb: 4 callbacks suppressed [ 843.945908] audit: type=1326 audit(1529709488.944:1849): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18521 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:09 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) [ 844.073353] audit: type=1326 audit(1529709489.018:1850): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18531 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:09 executing program 1: socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:09 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:09 executing program 5: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) [ 844.406715] audit: type=1326 audit(1529709489.404:1851): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18559 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ftruncate(0xffffffffffffffff, 0x0) 23:18:09 executing program 1: socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:09 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:09 executing program 5: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) [ 844.952606] audit: type=1326 audit(1529709489.950:1852): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18580 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:10 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:10 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:10 executing program 5: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) [ 845.024045] audit: type=1326 audit(1529709490.003:1853): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18590 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:10 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:10 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:10 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) [ 845.423969] audit: type=1326 audit(1529709490.422:1854): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18621 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:10 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:10 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:10 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:10 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$ppp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/ppp\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000140)=@nfc={0x27}, 0x80, &(0x7f0000000b40)}, 0x0) [ 845.949404] audit: type=1326 audit(1529709490.948:1855): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18631 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:11 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:11 executing program 0: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @rand_addr, 0x0, 0x0, 'lblcr\x00'}, 0x2c) 23:18:11 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 846.470876] audit: type=1326 audit(1529709491.468:1856): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18681 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:11 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:11 executing program 7: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:11 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:11 executing program 7: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:12 executing program 7: shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:12 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:12 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) [ 847.608013] audit: type=1326 audit(1529709492.606:1857): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18751 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) 23:18:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:13 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) [ 848.140204] audit: type=1326 audit(1529709493.138:1858): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18799 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:13 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:13 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:13 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f00000000c0)}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:13 executing program 6: syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) [ 849.048087] kauditd_printk_skb: 2 callbacks suppressed [ 849.048110] audit: type=1326 audit(1529709494.046:1861): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18854 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:14 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x0, 0x0, 0x0, 0x0, {0xc}}, 0x14}, 0x1}, 0x0) 23:18:14 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:14 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) [ 849.518764] audit: type=1326 audit(1529709494.517:1862): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18865 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:14 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) [ 849.577507] audit: type=1326 audit(1529709494.538:1863): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18863 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 849.597521] audit: type=1326 audit(1529709494.556:1864): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18869 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:14 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:14 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:14 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)={0x14}, 0x14}, 0x1}, 0x0) [ 850.022804] audit: type=1326 audit(1529709495.021:1865): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18903 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:15 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:15 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) socket(0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000200)=""/255, &(0x7f0000000300)=""/66, &(0x7f0000000380)}) 23:18:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) [ 850.517739] audit: type=1326 audit(1529709495.516:1866): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18915 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:15 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:15 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) [ 850.563385] audit: type=1326 audit(1529709495.543:1867): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18918 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 850.583300] audit: type=1326 audit(1529709495.544:1868): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18920 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:15 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:16 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:18:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:16 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) [ 851.511759] audit: type=1326 audit(1529709496.510:1869): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18976 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) [ 851.581736] audit: type=1326 audit(1529709496.573:1870): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=18980 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6}]}) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_INFO(0x0, 0x3, &(0x7f0000000100)=""/20) 23:18:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:17 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:18 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:18 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0) 23:18:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:19 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) [ 854.480632] kauditd_printk_skb: 5 callbacks suppressed [ 854.480660] audit: type=1326 audit(1529709499.479:1876): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19130 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:19 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:19 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:19 executing program 1: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:19 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:19 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:19 executing program 1: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') [ 854.979143] audit: type=1326 audit(1529709499.977:1877): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19162 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 855.060619] audit: type=1326 audit(1529709500.059:1878): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19160 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:20 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:20 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:20 executing program 1: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:20 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'btrfs.'}, &(0x7f0000000100)=""/47, 0x2f) 23:18:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140), &(0x7f0000000180)=0x8) 23:18:20 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:20 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) [ 855.989025] audit: type=1326 audit(1529709500.987:1879): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19228 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:21 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:21 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') [ 856.056762] audit: type=1326 audit(1529709501.030:1880): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19232 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:21 executing program 7: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:21 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:21 executing program 7: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:21 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:21 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:21 executing program 7: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) [ 857.237120] audit: type=1326 audit(1529709502.235:1881): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19293 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50236}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50236}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50236}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:23 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50236}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) [ 858.222849] audit: type=1326 audit(1529709503.221:1882): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19360 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:23 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50236}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50236}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:23 executing program 6: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) [ 858.650944] audit: type=1326 audit(1529709503.649:1883): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19390 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)) 23:18:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$inet6(0xa, 0x0, 0x0) 23:18:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) [ 859.212393] audit: type=1326 audit(1529709504.210:1884): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19405 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) [ 859.268038] audit: type=1326 audit(1529709504.239:1885): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19409 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$inet6(0xa, 0x0, 0x0) 23:18:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:24 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) socket$inet6(0xa, 0x0, 0x0) [ 859.676281] kauditd_printk_skb: 1 callbacks suppressed [ 859.676302] audit: type=1326 audit(1529709504.674:1887): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19439 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:25 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:25 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) [ 860.190681] audit: type=1326 audit(1529709505.189:1888): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19450 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:25 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:25 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:25 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) [ 860.458193] audit: type=1326 audit(1529709505.456:1889): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19476 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 23:18:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) [ 860.583038] audit: type=1326 audit(1529709505.581:1890): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19483 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) [ 860.707731] audit: type=1326 audit(1529709505.706:1891): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19497 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:25 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffa) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00') 23:18:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) [ 861.184402] audit: type=1326 audit(1529709506.182:1892): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19524 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f00000000c0)) 23:18:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) [ 861.386771] audit: type=1326 audit(1529709506.385:1893): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19536 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) [ 861.510200] audit: type=1326 audit(1529709506.508:1894): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19547 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:26 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) [ 861.688517] audit: type=1326 audit(1529709506.686:1895): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19554 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:27 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000004900)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000140)=0x1e) 23:18:27 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) [ 862.517356] audit: type=1326 audit(1529709507.515:1896): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19608 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:27 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000004900)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:27 executing program 4: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000004900)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000000040)={0xaa}) 23:18:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:28 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:29 executing program 5: setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:29 executing program 5: setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:29 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) ioctl$BLKBSZGET(0xffffffffffffffff, 0x80081270, &(0x7f00000000c0)) 23:18:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:30 executing program 5: setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:30 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) [ 865.098604] kauditd_printk_skb: 5 callbacks suppressed [ 865.098627] audit: type=1326 audit(1529709510.097:1902): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19766 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:30 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:30 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:30 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:30 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:31 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:31 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) 23:18:31 executing program 7: clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:31 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) [ 866.977414] audit: type=1326 audit(1529709511.976:1903): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19839 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:32 executing program 7: clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:32 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) [ 867.244409] audit: type=1326 audit(1529709512.242:1904): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19859 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:32 executing program 6: clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:32 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:32 executing program 7: clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:33 executing program 6: clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:33 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:33 executing program 6: clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) [ 868.277591] audit: type=1326 audit(1529709513.276:1905): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19912 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:33 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:33 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:33 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:33 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) [ 868.648240] audit: type=1326 audit(1529709513.646:1906): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19942 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req3, 0x1c) 23:18:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:34 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) [ 869.265736] audit: type=1326 audit(1529709514.264:1907): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19976 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:34 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) [ 869.374620] audit: type=1326 audit(1529709514.373:1908): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=19982 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:34 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:34 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) [ 869.608863] audit: type=1326 audit(1529709514.607:1909): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20005 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) [ 870.449998] audit: type=1326 audit(1529709515.448:1910): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20039 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f00000001c0)=ANY=[], 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000200), 0x8) 23:18:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x5022c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) [ 870.634736] audit: type=1326 audit(1529709515.629:1911): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20050 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:35 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) [ 870.703566] audit: type=1326 audit(1529709515.682:1912): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20060 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:35 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) creat(&(0x7f0000000080)='./file0\x00', 0x0) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000), 0x4) 23:18:36 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) [ 871.351711] audit: type=1326 audit(1529709516.349:1913): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20085 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 871.394193] audit: type=1326 audit(1529709516.376:1914): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20091 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:36 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:36 executing program 3: openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) [ 871.629803] audit: type=1326 audit(1529709516.626:1915): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20104 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) [ 871.765846] audit: type=1326 audit(1529709516.764:1916): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20116 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:36 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) [ 872.308807] audit: type=1326 audit(1529709517.307:1917): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20142 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000040)) 23:18:37 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x5022c}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) [ 872.586321] audit: type=1326 audit(1529709517.585:1918): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20162 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:37 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:37 executing program 4: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:37 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:37 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:37 executing program 4: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) [ 872.831644] audit: type=1326 audit(1529709517.822:1919): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20175 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:38 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000180)) setxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00', &(0x7f0000000140)='b:cpuset.securitytrusted\x00', 0x19, 0x0) 23:18:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:38 executing program 4: shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:38 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:38 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000180)) vmsplice(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x0) 23:18:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:38 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) pkey_alloc(0x0, 0x0) 23:18:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) pkey_alloc(0x0, 0x0) 23:18:39 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:39 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:39 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) pkey_alloc(0x0, 0x0) 23:18:39 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f00000000c0)) 23:18:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:39 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:39 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:39 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:39 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:40 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:40 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:40 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:40 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) [ 875.830769] kauditd_printk_skb: 6 callbacks suppressed [ 875.830790] audit: type=1326 audit(1529709520.829:1926): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20338 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:40 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:41 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:41 executing program 1: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000080)) 23:18:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:41 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:41 executing program 7: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) [ 876.774229] audit: type=1326 audit(1529709521.772:1927): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20390 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:41 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:41 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:41 executing program 7: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:42 executing program 0: openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:42 executing program 7: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) [ 877.713764] audit: type=1326 audit(1529709522.712:1928): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20442 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:42 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:42 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:43 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:43 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:43 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:43 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:43 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) [ 878.656836] audit: type=1326 audit(1529709523.655:1929): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20501 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:43 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) [ 878.736479] audit: type=1326 audit(1529709523.715:1930): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20514 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:43 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:43 executing program 6: openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) [ 878.856748] audit: type=1326 audit(1529709523.850:1931): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20520 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:43 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:43 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) shmget(0xffffffffffffffff, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, 0xffffffffffffffff) 23:18:44 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:44 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) [ 879.664308] audit: type=1326 audit(1529709524.662:1932): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20554 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:44 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) [ 879.745660] audit: type=1326 audit(1529709524.718:1933): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20556 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:44 executing program 6: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:44 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:44 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:44 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) [ 879.925828] audit: type=1326 audit(1529709524.924:1934): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20578 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:45 executing program 2: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) 23:18:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:45 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)}) 23:18:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) fcntl$getown(0xffffffffffffffff, 0x9) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x0, 0x4) 23:18:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) [ 880.689043] audit: type=1326 audit(1529709525.685:1935): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20615 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) pkey_alloc(0x0, 0x0) 23:18:45 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:45 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)}) 23:18:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000004fe8)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:46 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) [ 880.979179] kauditd_printk_skb: 1 callbacks suppressed [ 880.979255] audit: type=1326 audit(1529709525.977:1937): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20640 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)}) 23:18:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) [ 881.105891] audit: type=1326 audit(1529709526.104:1938): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20647 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) [ 881.711839] audit: type=1326 audit(1529709526.710:1939): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20678 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:46 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)}) 23:18:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:46 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:46 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) [ 881.915114] audit: type=1326 audit(1529709526.913:1940): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20688 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:47 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x0, 0x0, 0x0, 0x5000f}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:47 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) [ 882.089022] audit: type=1326 audit(1529709527.087:1941): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20698 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) [ 882.317138] audit: type=1326 audit(1529709527.315:1942): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20719 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000200)) [ 882.648929] audit: type=1326 audit(1529709527.647:1943): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20731 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:47 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) [ 882.868252] audit: type=1326 audit(1529709527.866:1944): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20736 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:48 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) 23:18:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) [ 883.145747] audit: type=1326 audit(1529709528.144:1945): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20760 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) [ 883.334745] audit: type=1326 audit(1529709528.333:1946): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20772 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 23:18:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:48 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:48 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:49 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:49 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 23:18:49 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:49 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:49 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:49 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:49 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:49 executing program 4: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:49 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:49 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:50 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) 23:18:50 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:50 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:50 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:50 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:50 executing program 4: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:50 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:50 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000140)}) getrandom(&(0x7f0000001180)=""/216, 0xd8, 0x0) [ 886.307353] kauditd_printk_skb: 4 callbacks suppressed [ 886.307376] audit: type=1326 audit(1529709531.306:1951): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=20944 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:51 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:51 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) sched_setparam(0x0, &(0x7f0000000040)) 23:18:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50255}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:52 executing program 7: pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:52 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:52 executing program 7: pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:52 executing program 0: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:52 executing program 7: pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50255}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) sched_setparam(0x0, &(0x7f0000000040)) 23:18:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50255}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) sched_setparam(0x0, &(0x7f0000000040)) 23:18:52 executing program 6: socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:52 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:52 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) [ 887.872101] audit: type=1326 audit(1529709532.870:1952): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21044 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:52 executing program 2: gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:53 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:53 executing program 6: socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:53 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:53 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) [ 888.106690] audit: type=1326 audit(1529709533.105:1953): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21066 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:53 executing program 2: gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) [ 888.171364] audit: type=1326 audit(1529709533.140:1954): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21070 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:53 executing program 6: socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:53 executing program 2: gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:53 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:53 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() sched_setparam(0x0, &(0x7f0000000040)) [ 888.787978] audit: type=1326 audit(1529709533.786:1955): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21097 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:18:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50255}]}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:54 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:54 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:54 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50255}]}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) [ 889.080864] audit: type=1326 audit(1529709534.079:1956): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21121 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) [ 889.156223] audit: type=1326 audit(1529709534.149:1957): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21134 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50255}]}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000100)={{}, 'port1\x00'}) 23:18:54 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:54 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:18:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) [ 889.735503] audit: type=1326 audit(1529709534.734:1958): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21153 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 889.746463] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 889.765774] syz-executor5 cpuset=syz5 mems_allowed=0 [ 889.772016] CPU: 1 PID: 21158 Comm: syz-executor5 Not tainted 4.17.0+ #9 23:18:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) gettid() sched_setparam(0x0, &(0x7f0000000040)) [ 889.778857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 889.788933] Call Trace: [ 889.791539] dump_stack+0x185/0x1d0 [ 889.795280] warn_alloc+0x430/0x690 [ 889.798933] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 889.803816] ? kernel_poison_pages+0x40/0x360 [ 889.808327] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 889.813790] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 889.818766] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 889.823717] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.828576] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.833275] kmsan_alloc_page+0x82/0xe0 [ 889.837372] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 889.842147] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.847010] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.851699] ? __should_failslab+0x278/0x2a0 [ 889.856124] ? should_fail+0x57/0xab0 [ 889.859942] ? __should_failslab+0x278/0x2a0 [ 889.864370] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.869228] ? __msan_poison_alloca+0x15c/0x1d0 [ 889.873921] ? kmsan_set_origin+0x9e/0x160 [ 889.878174] alloc_pages_vma+0x1555/0x17f0 [ 889.882430] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 889.887551] handle_mm_fault+0x44ca/0x7ed0 [ 889.891804] ? kmsan_set_origin_inline+0x6b/0x120 [ 889.896701] __do_page_fault+0xec6/0x1a10 [ 889.900869] do_page_fault+0xb7/0x250 [ 889.904684] ? page_fault+0x8/0x30 [ 889.908238] page_fault+0x1e/0x30 [ 889.911698] RIP: 0033:0x4075fa [ 889.914905] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 889.920270] RAX: 0000000020000040 RBX: 0000000000000000 RCX: 0000000000000001 [ 889.927556] RDX: 6f10799c7022d961 RSI: 0000000000000000 RDI: 0000000000a7e848 [ 889.934839] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 889.942120] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d96b2 [ 889.949576] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 889.956857] Mem-Info: [ 889.959286] active_anon:156767 inactive_anon:78 isolated_anon:0 [ 889.959286] active_file:4684 inactive_file:3753 isolated_file:0 [ 889.959286] unevictable:0 dirty:28 writeback:0 unstable:0 [ 889.959286] slab_reclaimable:3502 slab_unreclaimable:9448 [ 889.959286] mapped:73402 shmem:84 pagetables:1331 bounce:0 [ 889.959286] free:71582 free_pcp:456 free_cma:0 [ 889.992384] Node 0 active_anon:627068kB inactive_anon:312kB active_file:18736kB inactive_file:15012kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:293608kB dirty:112kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 272384kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 890.020499] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 890.046638] lowmem_reserve[]: 0 2817 7244 7244 [ 890.051230] Node 0 DMA32 free:226488kB min:26224kB low:32780kB high:39336kB active_anon:228640kB inactive_anon:36kB active_file:576kB inactive_file:184kB unevictable:0kB writepending:84kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2368kB pagetables:2516kB bounce:0kB free_pcp:808kB local_pcp:132kB free_cma:0kB [ 890.080391] lowmem_reserve[]: 0 0 4426 4426 [ 890.084737] Node 0 Normal free:51488kB min:41208kB low:51508kB high:61808kB active_anon:396324kB inactive_anon:276kB active_file:18160kB inactive_file:14828kB unevictable:0kB writepending:28kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2808kB bounce:0kB free_pcp:1176kB local_pcp:544kB free_cma:0kB [ 890.114352] lowmem_reserve[]: 0 0 0 0 [ 890.118177] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 890.131387] Node 0 DMA32: 2608*4kB (UME) 6272*8kB (UM) 1494*16kB (UME) 565*32kB (UME) 343*64kB (UME) 172*128kB (UME) 80*256kB (UM) 33*512kB (UM) 20*1024kB (UME) 12*2048kB (UM) 1*4096kB (U) = 233088kB [ 890.149335] Node 0 Normal: 6302*4kB (MEH) 2385*8kB (UMEH) 304*16kB (UMEH) 15*32kB (UM) 7*64kB (UM) 1*128kB (M) 1*256kB (M) 0*512kB 1*1024kB (U) 0*2048kB 0*4096kB = 51488kB [ 890.164938] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 890.173520] 8521 total pagecache pages [ 890.177410] 0 pages in swap cache [ 890.180859] Swap cache stats: add 0, delete 0, find 0/0 23:18:55 executing program 4: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) capget(&(0x7f0000000040), &(0x7f0000000080)) 23:18:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:18:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast2=0xe0000002}}}, 0x88) 23:18:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) [ 890.186216] Free swap = 0kB [ 890.189217] Total swap = 0kB [ 890.192222] 1965969 pages RAM [ 890.195307] 0 pages HighMem/MovableOnly [ 890.199261] 106316 pages reserved [ 890.210922] audit: type=1326 audit(1529709535.208:1959): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21158 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) [ 890.316976] audit: type=1326 audit(1529709535.290:1960): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21171 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socket$key(0xf, 0x3, 0x2) 23:18:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socket$key(0xf, 0x3, 0x2) 23:18:55 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 23:18:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socket$key(0xf, 0x3, 0x2) 23:18:56 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 23:18:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:18:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:18:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) 23:18:56 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) gettid() sched_setparam(0x0, &(0x7f0000000040)) [ 891.517715] kauditd_printk_skb: 3 callbacks suppressed [ 891.517735] audit: type=1326 audit(1529709536.516:1964): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21246 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 891.598594] audit: type=1326 audit(1529709536.566:1965): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21245 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) pipe(&(0x7f0000000140)) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, &(0x7f0000000100)) 23:18:56 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:18:56 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 23:18:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:18:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:18:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:56 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) [ 891.762196] audit: type=1326 audit(1529709536.760:1966): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21263 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:56 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:18:56 executing program 5: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000000)) 23:18:56 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) [ 891.927707] audit: type=1326 audit(1529709536.926:1967): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21271 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:57 executing program 3: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) [ 892.035242] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 892.045882] syz-executor5 cpuset=syz5 mems_allowed=0 [ 892.051025] CPU: 0 PID: 21278 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 892.057868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.067232] Call Trace: [ 892.069840] dump_stack+0x185/0x1d0 [ 892.073484] warn_alloc+0x430/0x690 [ 892.077137] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 892.081990] ? kernel_poison_pages+0x40/0x360 [ 892.086501] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 892.091969] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 892.096932] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 892.101976] ? kmsan_set_origin_inline+0x6b/0x120 [ 892.106835] ? __msan_poison_alloca+0x15c/0x1d0 [ 892.111525] kmsan_alloc_page+0x82/0xe0 [ 892.115542] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 892.120313] ? kmsan_set_origin_inline+0x6b/0x120 [ 892.125257] ? __msan_poison_alloca+0x15c/0x1d0 [ 892.129938] ? __should_failslab+0x278/0x2a0 [ 892.134366] ? should_fail+0x57/0xab0 [ 892.138181] ? __should_failslab+0x278/0x2a0 [ 892.142626] ? kmsan_set_origin_inline+0x6b/0x120 [ 892.147486] ? __msan_poison_alloca+0x15c/0x1d0 [ 892.152173] ? kmsan_set_origin+0x9e/0x160 [ 892.156439] alloc_pages_vma+0x1555/0x17f0 [ 892.160696] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 892.165824] handle_mm_fault+0x44ca/0x7ed0 [ 892.170088] ? kmsan_set_origin_inline+0x6b/0x120 [ 892.174960] __do_page_fault+0xec6/0x1a10 [ 892.179133] do_page_fault+0xb7/0x250 [ 892.182948] ? page_fault+0x8/0x30 [ 892.186498] page_fault+0x1e/0x30 [ 892.189956] RIP: 0033:0x4075fa [ 892.193234] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 892.198773] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 892.206487] RDX: 6f10799c7022d961 RSI: 0000000000000000 RDI: 0000000000a7e848 [ 892.213765] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 892.221043] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000d9f9d [ 892.228325] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 892.235613] Mem-Info: [ 892.238049] active_anon:157858 inactive_anon:76 isolated_anon:0 [ 892.238049] active_file:3855 inactive_file:3856 isolated_file:0 [ 892.238049] unevictable:0 dirty:36 writeback:0 unstable:0 [ 892.238049] slab_reclaimable:3500 slab_unreclaimable:9447 [ 892.238049] mapped:72837 shmem:84 pagetables:1381 bounce:0 [ 892.238049] free:68495 free_pcp:459 free_cma:0 [ 892.271328] Node 0 active_anon:631432kB inactive_anon:304kB active_file:15420kB inactive_file:15424kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:291232kB dirty:144kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 276480kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 892.299467] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 892.325697] lowmem_reserve[]: 0 2817 7244 7244 [ 892.330331] Node 0 DMA32 free:204604kB min:26224kB low:32780kB high:39336kB active_anon:234452kB inactive_anon:0kB active_file:576kB inactive_file:184kB unevictable:0kB writepending:108kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2688kB pagetables:1956kB bounce:0kB free_pcp:1284kB local_pcp:652kB free_cma:0kB [ 892.359623] lowmem_reserve[]: 0 0 4426 4426 [ 892.363963] Node 0 Normal free:55992kB min:41208kB low:51508kB high:61808kB active_anon:396796kB inactive_anon:304kB active_file:14412kB inactive_file:15080kB unevictable:0kB writepending:36kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7360kB pagetables:3568kB bounce:0kB free_pcp:776kB local_pcp:128kB free_cma:0kB [ 892.393492] lowmem_reserve[]: 0 0 0 0 [ 892.397326] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 892.410590] Node 0 DMA32: 2787*4kB (UME) 6308*8kB (UM) 1518*16kB (UME) 571*32kB (UME) 339*64kB (UME) 167*128kB (UME) 79*256kB (M) 33*512kB (UM) 20*1024kB (UME) 3*2048kB (UM) 0*4096kB = 210988kB 23:18:57 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, &(0x7f0000000080)) [ 892.428009] Node 0 Normal: 6986*4kB (UMEH) 2546*8kB (UMEH) 354*16kB (UMEH) 34*32kB (UMH) 5*64kB (M) 2*128kB (UM) 2*256kB (UM) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 56664kB [ 892.443808] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 892.452387] 7505 total pagecache pages [ 892.456277] 0 pages in swap cache [ 892.459760] Swap cache stats: add 0, delete 0, find 0/0 [ 892.465112] Free swap = 0kB [ 892.468116] Total swap = 0kB [ 892.471146] 1965969 pages RAM [ 892.474240] 0 pages HighMem/MovableOnly [ 892.478202] 106316 pages reserved [ 892.508668] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 892.519211] syz-executor0 cpuset=syz0 mems_allowed=0 [ 892.524344] CPU: 1 PID: 21287 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 892.531189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 892.540550] Call Trace: [ 892.543155] dump_stack+0x185/0x1d0 [ 892.546789] warn_alloc+0x430/0x690 [ 892.550434] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 892.555287] ? kernel_poison_pages+0x40/0x360 [ 892.559929] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 892.565373] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 892.570313] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 892.575469] ? kmsan_set_origin_inline+0x6b/0x120 [ 892.580304] ? __msan_poison_alloca+0x15c/0x1d0 [ 892.584967] kmsan_alloc_page+0x82/0xe0 [ 892.588930] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 892.593671] ? kmsan_set_origin_inline+0x6b/0x120 [ 892.598508] ? __msan_poison_alloca+0x15c/0x1d0 [ 892.603161] ? __should_failslab+0x278/0x2a0 [ 892.607559] ? should_fail+0x57/0xab0 [ 892.611356] ? __should_failslab+0x278/0x2a0 [ 892.615747] ? kmsan_set_origin_inline+0x6b/0x120 [ 892.620575] ? __msan_poison_alloca+0x15c/0x1d0 [ 892.625252] ? kmsan_set_origin+0x9e/0x160 [ 892.629480] alloc_pages_vma+0x1555/0x17f0 [ 892.633773] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 892.638886] handle_mm_fault+0x44ca/0x7ed0 [ 892.643115] ? kmsan_set_origin_inline+0x6b/0x120 [ 892.647954] __do_page_fault+0xec6/0x1a10 [ 892.652184] do_page_fault+0xb7/0x250 [ 892.655973] ? page_fault+0x8/0x30 23:18:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) [ 892.659504] page_fault+0x1e/0x30 [ 892.662959] RIP: 0033:0x4075fa [ 892.666147] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 892.671495] RAX: 0000000020000300 RBX: 0000000000000000 RCX: 0000000000000001 [ 892.678838] RDX: 3e28e215ea4e1bb2 RSI: 0000000000000000 RDI: 0000000001d98848 [ 892.686105] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 892.693368] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000da17b [ 892.700653] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 23:18:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:18:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:57 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:18:57 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:18:57 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:18:57 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) [ 892.863899] audit: type=1326 audit(1529709537.862:1968): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21300 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 892.979194] audit: type=1326 audit(1529709537.962:1969): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21311 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:18:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:18:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) [ 893.076480] audit: type=1326 audit(1529709538.027:1970): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21287 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:18:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:18:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:18:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:18:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:18:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:18:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:18:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:18:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:18:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) gettid() sched_setparam(0x0, &(0x7f0000000040)) 23:18:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:18:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) [ 893.809341] audit: type=1326 audit(1529709538.808:1971): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21365 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:58 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)) 23:18:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:18:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:18:58 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:18:58 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:18:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:18:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) [ 893.969333] audit: type=1326 audit(1529709538.968:1972): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21377 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:18:59 executing program 4: mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:18:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:18:59 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:18:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:18:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:18:59 executing program 4: mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:18:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:18:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:18:59 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:18:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:18:59 executing program 4: mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:18:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:18:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:18:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:18:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:18:59 executing program 1: clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:18:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000180)) [ 894.905370] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 894.916051] syz-executor4 cpuset=syz4 mems_allowed=0 [ 894.921239] CPU: 0 PID: 21435 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 894.928073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 894.937427] Call Trace: [ 894.940011] dump_stack+0x185/0x1d0 [ 894.943641] warn_alloc+0x430/0x690 [ 894.947275] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 894.952110] ? kernel_poison_pages+0x40/0x360 [ 894.956602] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 894.962067] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 894.967089] ? kmsan_set_origin_inline+0x6b/0x120 [ 894.971921] ? __msan_poison_alloca+0x15c/0x1d0 [ 894.976600] kmsan_alloc_page+0x82/0xe0 [ 894.980583] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 894.985332] ? __x64_sys_mincore+0xd8/0x110 [ 894.989823] ? kmsan_set_origin_inline+0x6b/0x120 [ 894.994654] ? __msan_poison_alloca+0x15c/0x1d0 [ 894.999343] ? __should_failslab+0x278/0x2a0 [ 895.003746] ? should_fail+0x57/0xab0 [ 895.007547] ? __should_failslab+0x278/0x2a0 [ 895.011957] ? kmsan_set_origin_inline+0x6b/0x120 [ 895.016877] ? __msan_poison_alloca+0x15c/0x1d0 [ 895.021533] ? kmsan_set_origin+0x9e/0x160 [ 895.025760] alloc_pages_vma+0x1555/0x17f0 [ 895.029985] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 895.035085] handle_mm_fault+0x44ca/0x7ed0 [ 895.039397] ? kmsan_set_origin_inline+0x6b/0x120 [ 895.044236] __do_page_fault+0xec6/0x1a10 [ 895.048411] do_page_fault+0xb7/0x250 [ 895.052204] page_fault+0x1e/0x30 [ 895.055644] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 895.061250] RSP: 0018:ffff880058c5fd28 EFLAGS: 00010206 [ 895.066623] RAX: ffffffff83ffaf00 RBX: 0000000020000000 RCX: 0000000000000003 [ 895.073880] RDX: 0000000000000003 RSI: ffff880056749000 RDI: 0000000020000000 [ 895.081138] RBP: ffff880058c5fd90 R08: 0000000020ffffff R09: 0000000000000000 [ 895.088423] R10: 0000000000000000 R11: ffffffff81ac5b60 R12: 0000000000000000 [ 895.095682] R13: ffff880058c5fd30 R14: 0000000000000000 R15: ffff880071b288d8 [ 895.102958] ? mincore_pte_range+0x1110/0x1110 [ 895.107542] ? _copy_to_user+0x20/0x180 [ 895.111528] ? _copy_to_user+0xed/0x180 [ 895.115497] __se_sys_mincore+0x76e/0x9d0 [ 895.119640] ? __ia32_sys_mincore+0x110/0x110 [ 895.124154] ? mincore_pte_range+0x1110/0x1110 [ 895.128996] ? mincore_unmapped_range+0x5b0/0x5b0 [ 895.133845] __x64_sys_mincore+0xd8/0x110 [ 895.137990] ? fault_around_bytes_set+0x130/0x130 [ 895.142825] do_syscall_64+0x15b/0x230 [ 895.146709] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 895.151905] RIP: 0033:0x455a99 [ 895.155086] RSP: 002b:00007f8dccca1c68 EFLAGS: 00000246 ORIG_RAX: 000000000000001b [ 895.162797] RAX: ffffffffffffffda RBX: 00007f8dccca26d4 RCX: 0000000000455a99 [ 895.170069] RDX: 0000000020000000 RSI: 0000000000003000 RDI: 0000000020ffb000 [ 895.177350] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 895.184625] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 895.191916] R13: 00000000004bff72 R14: 00000000004cf360 R15: 0000000000000000 [ 895.199745] warn_alloc_show_mem: 1 callbacks suppressed [ 895.199749] Mem-Info: [ 895.207618] active_anon:156263 inactive_anon:78 isolated_anon:0 [ 895.207618] active_file:3772 inactive_file:3735 isolated_file:0 [ 895.207618] unevictable:0 dirty:45 writeback:0 unstable:0 [ 895.207618] slab_reclaimable:3492 slab_unreclaimable:9453 [ 895.207618] mapped:72552 shmem:84 pagetables:1380 bounce:0 [ 895.207618] free:67770 free_pcp:185 free_cma:0 [ 895.240710] Node 0 active_anon:625052kB inactive_anon:312kB active_file:15088kB inactive_file:14940kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:290208kB dirty:180kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 895.268814] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 895.294945] lowmem_reserve[]: 0 2817 7244 7244 [ 895.299528] Node 0 DMA32 free:203748kB min:26224kB low:32780kB high:39336kB active_anon:228348kB inactive_anon:0kB active_file:576kB inactive_file:48kB unevictable:0kB writepending:112kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2880kB pagetables:2072kB bounce:0kB free_pcp:260kB local_pcp:196kB free_cma:0kB [ 895.328515] lowmem_reserve[]: 0 0 4426 4426 [ 895.332834] Node 0 Normal free:51428kB min:41208kB low:51508kB high:61808kB active_anon:396600kB inactive_anon:312kB active_file:14512kB inactive_file:14892kB unevictable:0kB writepending:68kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7360kB pagetables:3448kB bounce:0kB free_pcp:480kB local_pcp:112kB free_cma:0kB [ 895.362340] lowmem_reserve[]: 0 0 0 0 [ 895.366136] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 895.379601] Node 0 DMA32: 2637*4kB (UME) 6316*8kB (UM) 1519*16kB (UME) 571*32kB (UME) 332*64kB (ME) 166*128kB (ME) 79*256kB (M) 33*512kB (UM) 20*1024kB (UME) 0*2048kB 0*4096kB = 203748kB [ 895.396517] Node 0 Normal: 6297*4kB (UMEH) 2414*8kB (MEH) 313*16kB (UMEH) 30*32kB (MH) 5*64kB (UM) 3*128kB (UM) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51428kB [ 895.411754] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 895.420326] 7591 total pagecache pages [ 895.424194] 0 pages in swap cache [ 895.427657] Swap cache stats: add 0, delete 0, find 0/0 [ 895.432999] Free swap = 0kB [ 895.435996] Total swap = 0kB [ 895.439014] 1965969 pages RAM [ 895.442124] 0 pages HighMem/MovableOnly [ 895.446081] 106316 pages reserved [ 895.455332] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 895.465849] syz-executor6 cpuset=syz6 mems_allowed=0 [ 895.470968] CPU: 0 PID: 21428 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 895.477827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 895.487173] Call Trace: [ 895.489764] dump_stack+0x185/0x1d0 [ 895.493378] warn_alloc+0x430/0x690 [ 895.497004] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 895.501834] ? kernel_poison_pages+0x40/0x360 [ 895.506323] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 895.511776] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 895.516787] ? kmsan_set_origin_inline+0x6b/0x120 [ 895.521614] ? __msan_poison_alloca+0x15c/0x1d0 [ 895.526289] kmsan_alloc_page+0x82/0xe0 [ 895.530253] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 895.535000] ? kmsan_set_origin_inline+0x6b/0x120 [ 895.539833] ? __msan_poison_alloca+0x15c/0x1d0 [ 895.544493] ? __should_failslab+0x278/0x2a0 [ 895.548900] ? should_fail+0x57/0xab0 [ 895.552694] ? __should_failslab+0x278/0x2a0 [ 895.557091] ? kmsan_set_origin_inline+0x6b/0x120 [ 895.561926] ? __msan_poison_alloca+0x15c/0x1d0 [ 895.566589] ? kmsan_set_origin+0x9e/0x160 [ 895.570834] alloc_pages_vma+0x1555/0x17f0 [ 895.575083] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 895.581497] handle_mm_fault+0x44ca/0x7ed0 [ 895.585723] ? kmsan_set_origin_inline+0x6b/0x120 [ 895.590565] __do_page_fault+0xec6/0x1a10 [ 895.594717] do_page_fault+0xb7/0x250 [ 895.598514] ? page_fault+0x8/0x30 [ 895.602044] page_fault+0x1e/0x30 [ 895.605483] RIP: 0033:0x4075fa [ 895.608656] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 895.614003] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 895.621275] RDX: 9c83da96dca644fa RSI: 0000000000000000 RDI: 0000000001c57848 [ 895.628533] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 895.635794] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dacfe [ 895.643056] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 895.653138] audit: type=1326 audit(1529709540.651:1973): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21423 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:00 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:19:00 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:00 executing program 7: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:19:00 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:19:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:19:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:00 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:19:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:01 executing program 7: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:19:01 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:19:01 executing program 7: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:19:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 23:19:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:01 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:19:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:19:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:19:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000180)}) socket$key(0xf, 0x3, 0x2) 23:19:01 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:01 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:19:01 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:19:01 executing program 0: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, &(0x7f0000000040)) 23:19:01 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) [ 896.955370] kauditd_printk_skb: 1 callbacks suppressed [ 896.955391] audit: type=1326 audit(1529709541.954:1975): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21513 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 896.990408] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 897.001056] syz-executor0 cpuset=syz0 mems_allowed=0 [ 897.006199] CPU: 0 PID: 21521 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 897.013041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 897.022402] Call Trace: [ 897.024994] dump_stack+0x185/0x1d0 [ 897.028678] warn_alloc+0x430/0x690 [ 897.032308] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 897.037157] ? kernel_poison_pages+0x40/0x360 [ 897.041643] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 897.047095] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 897.052106] ? kmsan_set_origin_inline+0x6b/0x120 [ 897.056935] ? __msan_poison_alloca+0x15c/0x1d0 [ 897.061604] kmsan_alloc_page+0x82/0xe0 [ 897.065585] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 897.070330] ? do_syscall_64+0x15b/0x230 [ 897.074379] ? kmsan_set_origin_inline+0x6b/0x120 [ 897.079222] ? __msan_poison_alloca+0x15c/0x1d0 [ 897.083891] ? __should_failslab+0x278/0x2a0 [ 897.088300] ? should_fail+0x57/0xab0 [ 897.092097] ? __should_failslab+0x278/0x2a0 [ 897.096492] ? kmsan_set_origin_inline+0x6b/0x120 [ 897.101335] ? __msan_poison_alloca+0x15c/0x1d0 [ 897.106084] ? kmsan_set_origin+0x9e/0x160 [ 897.110326] alloc_pages_vma+0x1555/0x17f0 [ 897.114566] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 897.119752] handle_mm_fault+0x44ca/0x7ed0 [ 897.123973] ? kmsan_set_origin_inline+0x6b/0x120 [ 897.128814] __do_page_fault+0xec6/0x1a10 [ 897.132959] do_page_fault+0xb7/0x250 [ 897.136847] page_fault+0x1e/0x30 [ 897.140297] RIP: 0010:__put_user_4+0x1c/0x30 [ 897.144684] RSP: 0018:ffff88005c84fdb0 EFLAGS: 00010293 [ 897.150030] RAX: 0000000000000013 RBX: 00007fffffffeffd RCX: 0000000020000180 [ 897.157305] RDX: 0000000000000000 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 897.164564] RBP: ffff88005c84fe78 R08: 0000000001080020 R09: 0000000000000002 [ 897.171822] R10: 0000000000000000 R11: ffffffff87d2e2c0 R12: 0000000000000002 [ 897.179092] R13: 0000000000000000 R14: 0000000020000180 R15: 0000000000000013 [ 897.186358] ? __sys_socketpair+0x1490/0x1490 [ 897.190845] ? __sys_socketpair+0x1cb/0x1490 [ 897.195247] __x64_sys_socketpair+0x117/0x170 [ 897.199744] ? __sys_socketpair+0x1490/0x1490 [ 897.204224] do_syscall_64+0x15b/0x230 [ 897.208103] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 897.213276] RIP: 0033:0x455a99 [ 897.216469] RSP: 002b:00007f9ef7937c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 897.224166] RAX: ffffffffffffffda RBX: 00007f9ef79386d4 RCX: 0000000000455a99 [ 897.231422] RDX: 0000000000000088 RSI: 0000000000000002 RDI: 000000000000000a [ 897.238688] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 897.245944] R10: 0000000020000180 R11: 0000000000000246 R12: 00000000ffffffff [ 897.253200] R13: 00000000004c1ce5 R14: 00000000004d2df8 R15: 0000000000000000 [ 897.260475] warn_alloc_show_mem: 1 callbacks suppressed [ 897.260477] Mem-Info: [ 897.268226] active_anon:156743 inactive_anon:78 isolated_anon:0 [ 897.268226] active_file:3807 inactive_file:3706 isolated_file:0 [ 897.268226] unevictable:0 dirty:55 writeback:0 unstable:0 [ 897.268226] slab_reclaimable:3492 slab_unreclaimable:9458 [ 897.268226] mapped:72521 shmem:84 pagetables:1319 bounce:0 [ 897.268226] free:66718 free_pcp:277 free_cma:0 [ 897.301315] Node 0 active_anon:626972kB inactive_anon:312kB active_file:15228kB inactive_file:14824kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:290084kB dirty:220kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 268288kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 897.329508] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 897.355625] lowmem_reserve[]: 0 2817 7244 7244 [ 897.360216] Node 0 DMA32 free:199568kB min:26224kB low:32780kB high:39336kB active_anon:230612kB inactive_anon:12kB active_file:720kB inactive_file:88kB unevictable:0kB writepending:152kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2688kB pagetables:2408kB bounce:0kB free_pcp:300kB local_pcp:188kB free_cma:0kB [ 897.389476] lowmem_reserve[]: 0 0 4426 4426 [ 897.393789] Node 0 Normal free:51400kB min:41208kB low:51508kB high:61808kB active_anon:396448kB inactive_anon:300kB active_file:14508kB inactive_file:14736kB unevictable:0kB writepending:68kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7360kB pagetables:2868kB bounce:0kB free_pcp:808kB local_pcp:256kB free_cma:0kB [ 897.423375] lowmem_reserve[]: 0 0 0 0 [ 897.427258] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 897.440462] Node 0 DMA32: 2327*4kB (UM) 6229*8kB (M) 1485*16kB (UM) 562*32kB (UM) 332*64kB (UM) 166*128kB (UM) 79*256kB (M) 32*512kB (M) 19*1024kB (UM) 0*2048kB 0*4096kB = 199444kB [ 897.456715] Node 0 Normal: 6304*4kB (UMEH) 2411*8kB (UMEH) 317*16kB (UMEH) 33*32kB (UMH) 4*64kB (M) 2*128kB (M) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51400kB [ 897.471936] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 897.480496] 7597 total pagecache pages [ 897.484365] 0 pages in swap cache [ 897.487800] Swap cache stats: add 0, delete 0, find 0/0 [ 897.493143] Free swap = 0kB [ 897.496160] Total swap = 0kB [ 897.499161] 1965969 pages RAM [ 897.502246] 0 pages HighMem/MovableOnly [ 897.506196] 106316 pages reserved [ 897.513012] syz-executor2: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 897.523525] syz-executor2 cpuset=syz2 mems_allowed=0 [ 897.528630] CPU: 0 PID: 21519 Comm: syz-executor2 Not tainted 4.17.0+ #9 [ 897.535451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 897.544790] Call Trace: [ 897.547372] dump_stack+0x185/0x1d0 [ 897.551084] warn_alloc+0x430/0x690 [ 897.554712] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 897.559539] ? kernel_poison_pages+0x40/0x360 [ 897.564023] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 897.569464] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 897.574400] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 897.579415] ? kmsan_set_origin_inline+0x6b/0x120 [ 897.584240] ? __msan_poison_alloca+0x15c/0x1d0 [ 897.588910] kmsan_alloc_page+0x82/0xe0 [ 897.592948] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 897.597692] ? kmsan_set_origin_inline+0x6b/0x120 [ 897.602529] ? __msan_poison_alloca+0x15c/0x1d0 [ 897.607182] ? __should_failslab+0x278/0x2a0 [ 897.611577] ? should_fail+0x57/0xab0 [ 897.615358] ? __should_failslab+0x278/0x2a0 [ 897.619767] ? kmsan_set_origin_inline+0x6b/0x120 [ 897.624591] ? __msan_poison_alloca+0x15c/0x1d0 [ 897.629246] ? kmsan_set_origin+0x9e/0x160 [ 897.633482] alloc_pages_vma+0x1555/0x17f0 [ 897.637715] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 897.642805] handle_mm_fault+0x44ca/0x7ed0 [ 897.647023] ? kmsan_set_origin_inline+0x6b/0x120 [ 897.651860] __do_page_fault+0xec6/0x1a10 [ 897.655996] do_page_fault+0xb7/0x250 [ 897.659788] ? page_fault+0x8/0x30 [ 897.663314] page_fault+0x1e/0x30 [ 897.666747] RIP: 0033:0x4075fa [ 897.669919] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 897.675264] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 897.682517] RDX: bd0ff3c574cb8bec RSI: 0000000000000000 RDI: 0000000001d57848 [ 897.689767] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 897.697018] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000db508 [ 897.704272] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 23:19:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:19:02 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:19:02 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:19:02 executing program 0: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:19:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:19:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:19:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:19:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:19:03 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:19:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:19:03 executing program 0: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:19:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:19:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:19:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:19:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:19:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:03 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) [ 898.970634] audit: type=1326 audit(1529709543.969:1976): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21614 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:19:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) [ 899.216871] audit: type=1326 audit(1529709544.215:1977): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21633 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:04 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) [ 899.406222] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 899.416762] syz-executor7 cpuset=syz7 mems_allowed=0 [ 899.421909] CPU: 1 PID: 21652 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 899.428873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 899.438244] Call Trace: [ 899.440841] dump_stack+0x185/0x1d0 [ 899.444477] warn_alloc+0x430/0x690 [ 899.448129] __alloc_pages_nodemask+0x5b1c/0x5cc0 23:19:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) [ 899.452979] ? kernel_poison_pages+0x40/0x360 [ 899.457492] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 899.462953] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 899.468957] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 899.473999] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.478863] ? __msan_poison_alloca+0x15c/0x1d0 [ 899.483643] kmsan_alloc_page+0x82/0xe0 [ 899.487637] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 899.492410] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.497270] ? __msan_poison_alloca+0x15c/0x1d0 [ 899.501947] ? __should_failslab+0x278/0x2a0 23:19:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) [ 899.506368] ? should_fail+0x57/0xab0 [ 899.510181] ? __should_failslab+0x278/0x2a0 [ 899.514601] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.519541] ? __msan_poison_alloca+0x15c/0x1d0 [ 899.524310] ? kmsan_set_origin+0x9e/0x160 [ 899.528565] alloc_pages_vma+0x1555/0x17f0 [ 899.532816] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 899.537943] handle_mm_fault+0x44ca/0x7ed0 [ 899.542194] ? kmsan_set_origin_inline+0x6b/0x120 [ 899.547055] __do_page_fault+0xec6/0x1a10 [ 899.551225] do_page_fault+0xb7/0x250 [ 899.555040] ? page_fault+0x8/0x30 [ 899.558592] page_fault+0x1e/0x30 [ 899.562048] RIP: 0033:0x4075fa [ 899.565240] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 899.570606] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 899.577876] RDX: bf7ff7ac8bf812a5 RSI: 0000000000000000 RDI: 000000000236d848 [ 899.585152] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 899.592418] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dbc6d [ 899.599685] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 899.606958] warn_alloc_show_mem: 1 callbacks suppressed [ 899.606961] Mem-Info: [ 899.614806] active_anon:156764 inactive_anon:75 isolated_anon:0 [ 899.614806] active_file:3184 inactive_file:3391 isolated_file:3 [ 899.614806] unevictable:0 dirty:58 writeback:0 unstable:0 [ 899.614806] slab_reclaimable:3474 slab_unreclaimable:9466 [ 899.614806] mapped:71581 shmem:84 pagetables:1431 bounce:0 [ 899.614806] free:69502 free_pcp:422 free_cma:0 [ 899.647876] Node 0 active_anon:627056kB inactive_anon:300kB active_file:12736kB inactive_file:13564kB unevictable:0kB isolated(anon):0kB isolated(file):12kB mapped:286324kB dirty:232kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 268288kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 899.676062] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 899.702181] lowmem_reserve[]: 0 2817 7244 7244 [ 899.706757] Node 0 DMA32 free:208048kB min:26224kB low:32780kB high:39336kB active_anon:230252kB inactive_anon:8kB active_file:724kB inactive_file:120kB unevictable:0kB writepending:180kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2240kB pagetables:2076kB bounce:0kB free_pcp:1360kB local_pcp:696kB free_cma:0kB [ 899.735907] lowmem_reserve[]: 0 0 4426 4426 [ 899.740225] Node 0 Normal free:54056kB min:41208kB low:51508kB high:61808kB active_anon:396968kB inactive_anon:292kB active_file:12364kB inactive_file:13492kB unevictable:0kB writepending:52kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7808kB pagetables:3648kB bounce:0kB free_pcp:328kB local_pcp:220kB free_cma:0kB [ 899.770714] lowmem_reserve[]: 0 0 0 0 [ 899.774511] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 899.787719] Node 0 DMA32: 2586*4kB (UM) 6271*8kB (UM) 1503*16kB (UM) 563*32kB (UM) 348*64kB (UM) 170*128kB (UM) 80*256kB (UM) 32*512kB (M) 18*1024kB (M) 3*2048kB (UM) 0*4096kB = 208048kB 23:19:04 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) [ 899.804494] Node 0 Normal: 6352*4kB (UMEH) 2522*8kB (UMEH) 389*16kB (UMEH) 53*32kB (UMH) 4*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 53760kB [ 899.819088] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 899.827658] 6681 total pagecache pages [ 899.831523] 0 pages in swap cache [ 899.834966] Swap cache stats: add 0, delete 0, find 0/0 [ 899.840306] Free swap = 0kB [ 899.843304] Total swap = 0kB [ 899.846304] 1965969 pages RAM [ 899.849389] 0 pages HighMem/MovableOnly [ 899.853345] 106316 pages reserved 23:19:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) 23:19:05 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:05 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) [ 900.125452] audit: type=1326 audit(1529709545.123:1978): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21680 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:19:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:19:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:05 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:05 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') [ 900.228518] audit: type=1326 audit(1529709545.227:1979): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21683 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 900.309832] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 900.320427] syz-executor0 cpuset=syz0 mems_allowed=0 [ 900.325568] CPU: 0 PID: 21695 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 900.332421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.341775] Call Trace: [ 900.344371] dump_stack+0x185/0x1d0 [ 900.348021] warn_alloc+0x430/0x690 [ 900.351671] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 900.356538] ? msan_get_shadow_origin_ptr+0x8/0x230 [ 900.361560] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 900.362804] audit: type=1326 audit(1529709545.254:1980): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21684 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 900.367013] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 900.367047] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 900.367072] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.367084] ? __msan_poison_alloca+0x15c/0x1d0 [ 900.367105] kmsan_alloc_page+0x82/0xe0 [ 900.367119] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 900.367132] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.367144] ? __msan_poison_alloca+0x15c/0x1d0 [ 900.367155] ? __should_failslab+0x278/0x2a0 [ 900.367168] ? should_fail+0x57/0xab0 [ 900.367195] ? __should_failslab+0x278/0x2a0 [ 900.386880] audit: type=1326 audit(1529709545.292:1981): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21688 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 900.391723] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.391733] ? __msan_poison_alloca+0x15c/0x1d0 [ 900.391747] ? kmsan_set_origin+0x9e/0x160 [ 900.391768] alloc_pages_vma+0x1555/0x17f0 [ 900.391795] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 900.479590] handle_mm_fault+0x44ca/0x7ed0 [ 900.483811] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.488648] __do_page_fault+0xec6/0x1a10 [ 900.492786] do_page_fault+0xb7/0x250 [ 900.496571] ? page_fault+0x8/0x30 [ 900.500097] page_fault+0x1e/0x30 [ 900.503578] RIP: 0033:0x4075fa 23:19:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) [ 900.506748] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 900.512111] RAX: 0000000020007ff0 RBX: 0000000000000000 RCX: 0000000000000001 [ 900.519398] RDX: 3e28e215ea4e1bb2 RSI: 0000000000000000 RDI: 0000000001d98848 [ 900.526653] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 900.533910] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dbff5 [ 900.541163] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 23:19:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) [ 900.634184] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 900.644733] syz-executor0 cpuset=syz0 mems_allowed=0 [ 900.649858] CPU: 0 PID: 21703 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 900.656691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 900.666045] Call Trace: [ 900.668646] dump_stack+0x185/0x1d0 [ 900.672295] warn_alloc+0x430/0x690 [ 900.675942] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 900.680803] ? kernel_poison_pages+0x40/0x360 [ 900.685323] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 900.690786] ? __jbd2_journal_temp_unlink_buffer+0x814/0x920 [ 900.696616] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 900.701653] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.706500] ? __msan_poison_alloca+0x15c/0x1d0 [ 900.711181] kmsan_alloc_page+0x82/0xe0 [ 900.715160] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 900.719918] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.724763] ? __msan_poison_alloca+0x15c/0x1d0 [ 900.729431] ? __should_failslab+0x278/0x2a0 [ 900.733843] ? should_fail+0x57/0xab0 [ 900.738421] ? __should_failslab+0x278/0x2a0 [ 900.742830] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.747670] ? __msan_poison_alloca+0x15c/0x1d0 [ 900.752340] ? kmsan_set_origin+0x9e/0x160 [ 900.756582] alloc_pages_vma+0x1555/0x17f0 [ 900.760827] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 900.765942] handle_mm_fault+0x44ca/0x7ed0 [ 900.770180] ? kmsan_set_origin_inline+0x6b/0x120 [ 900.775042] __do_page_fault+0xec6/0x1a10 [ 900.779207] do_page_fault+0xb7/0x250 [ 900.783014] ? page_fault+0x8/0x30 [ 900.786562] page_fault+0x1e/0x30 [ 900.790014] RIP: 0033:0x4075fa [ 900.793211] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 900.799799] RAX: 0000000020007ff0 RBX: 0000000000000000 RCX: 0000000000000000 [ 900.807075] RDX: 3e28e215ea4e1bb2 RSI: 0000000000000000 RDI: 0000000001d98848 [ 900.814352] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 900.821628] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000dc139 [ 900.828904] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 900.836210] warn_alloc_show_mem: 1 callbacks suppressed [ 900.836214] Mem-Info: [ 900.843993] active_anon:157852 inactive_anon:76 isolated_anon:0 [ 900.843993] active_file:3213 inactive_file:3365 isolated_file:0 [ 900.843993] unevictable:0 dirty:58 writeback:0 unstable:0 [ 900.843993] slab_reclaimable:3471 slab_unreclaimable:9455 [ 900.843993] mapped:71650 shmem:84 pagetables:1324 bounce:0 [ 900.843993] free:66838 free_pcp:561 free_cma:0 [ 900.877098] Node 0 active_anon:631408kB inactive_anon:304kB active_file:12852kB inactive_file:13460kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:286600kB dirty:232kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 276480kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 900.905411] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 900.931546] lowmem_reserve[]: 0 2817 7244 7244 [ 900.936139] Node 0 DMA32 free:200376kB min:26224kB low:32780kB high:39336kB active_anon:234320kB inactive_anon:0kB active_file:660kB inactive_file:184kB unevictable:0kB writepending:180kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2560kB pagetables:1924kB bounce:0kB free_pcp:1296kB local_pcp:740kB free_cma:0kB [ 900.965315] lowmem_reserve[]: 0 0 4426 4426 [ 900.969651] Node 0 Normal free:51072kB min:41208kB low:51508kB high:61808kB active_anon:397036kB inactive_anon:304kB active_file:12192kB inactive_file:13276kB unevictable:0kB writepending:52kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7488kB pagetables:3372kB bounce:0kB free_pcp:924kB local_pcp:280kB free_cma:0kB [ 900.999175] lowmem_reserve[]: 0 0 0 0 [ 901.002995] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 901.016240] Node 0 DMA32: 2415*4kB (UM) 6268*8kB (UM) 1502*16kB (UM) 564*32kB (UM) 332*64kB (UM) 170*128kB (UM) 80*256kB (UM) 32*512kB (M) 18*1024kB (M) 0*2048kB 0*4096kB = 200188kB 23:19:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:06 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000000)) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000140)) [ 901.032624] Node 0 Normal: 6056*4kB (UMEH) 2335*8kB (MEH) 351*16kB (UMEH) 55*32kB (UMH) 20*64kB (UM) 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51560kB [ 901.047265] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 901.055865] 6662 total pagecache pages [ 901.059755] 0 pages in swap cache [ 901.063214] Swap cache stats: add 0, delete 0, find 0/0 [ 901.068575] Free swap = 0kB [ 901.071589] Total swap = 0kB [ 901.074599] 1965969 pages RAM [ 901.077693] 0 pages HighMem/MovableOnly [ 901.081655] 106316 pages reserved 23:19:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) [ 901.149962] audit: type=1326 audit(1529709546.148:1982): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21716 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:06 executing program 3: mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) openat$full(0xffffffffffffff9c, &(0x7f0000000300)='/dev/full\x00', 0x0, 0x0) 23:19:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:19:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000004900)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) [ 901.388777] audit: type=1326 audit(1529709546.387:1983): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21733 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:06 executing program 3: mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:06 executing program 6: pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) [ 901.471003] audit: type=1326 audit(1529709546.416:1984): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21735 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:06 executing program 3: mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000004900)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:06 executing program 6: pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000004900)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:07 executing program 6: pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, &(0x7f00000001c0)) 23:19:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 23:19:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) bind(0xffffffffffffffff, &(0x7f0000000000)=@nfc={0x27}, 0x80) 23:19:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) [ 902.411681] kauditd_printk_skb: 1 callbacks suppressed [ 902.411703] audit: type=1326 audit(1529709547.410:1986): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21795 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:07 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:07 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) [ 902.526428] audit: type=1326 audit(1529709547.444:1987): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21800 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:07 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 23:19:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x0, 0x0, 0x0, 0x50232}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) [ 902.644679] audit: type=1326 audit(1529709547.642:1988): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21817 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:07 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 23:19:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) [ 903.384459] audit: type=1326 audit(1529709548.383:1989): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21844 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:08 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)={0x10}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x14, 0x0, 0x0, 0x0, 0x0, {0xf}}, 0x14}, 0x1}, 0x0) 23:19:08 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:08 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) [ 903.683335] audit: type=1326 audit(1529709548.682:1990): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21876 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d2}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) [ 904.362749] audit: type=1326 audit(1529709549.361:1991): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21913 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) 23:19:09 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:09 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') [ 904.648824] audit: type=1326 audit(1529709549.647:1992): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21924 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:09 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) [ 904.747958] audit: type=1326 audit(1529709549.688:1993): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21936 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000004900)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000004800)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 23:19:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d2}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:10 executing program 1: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) [ 905.348591] audit: type=1326 audit(1529709550.347:1994): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21961 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:10 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) [ 905.461817] audit: type=1326 audit(1529709550.456:1995): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=21965 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:10 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:10 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:10 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:11 executing program 7: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:11 executing program 7: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:11 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x6}]}) mincore(&(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000000)=""/64) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') 23:19:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:11 executing program 7: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:11 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:11 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0xc02c5341, &(0x7f0000000140)) 23:19:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:12 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:12 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) [ 907.469333] kauditd_printk_skb: 3 callbacks suppressed [ 907.469356] audit: type=1326 audit(1529709552.467:1999): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22084 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:12 executing program 4: syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:12 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:13 executing program 4: syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) [ 908.431492] audit: type=1326 audit(1529709553.430:2000): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22135 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:13 executing program 4: syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:13 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:13 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:13 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:13 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:14 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:14 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:14 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) 23:19:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) [ 909.384769] audit: type=1326 audit(1529709554.383:2001): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22201 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:14 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:14 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) [ 909.478179] audit: type=1326 audit(1529709554.476:2002): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22211 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:14 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:14 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:14 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x0, 0x0) ioctl$BLKFRASET(0xffffffffffffffff, 0x1264, &(0x7f0000000080)) 23:19:15 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:15 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:15 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) [ 910.392493] audit: type=1326 audit(1529709555.391:2003): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22251 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) [ 910.444225] audit: type=1326 audit(1529709555.414:2004): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22248 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 910.464276] audit: type=1326 audit(1529709555.419:2005): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22260 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:15 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:15 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:16 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:16 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:16 executing program 6: ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:16 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000001c0)={0x0, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}}, 0x10) [ 911.390897] audit: type=1326 audit(1529709556.389:2006): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22299 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:16 executing program 6: ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) [ 911.471758] audit: type=1326 audit(1529709556.411:2007): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22302 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:16 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:16 executing program 3: seccomp(0x0, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:16 executing program 6: ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001540)={&(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001480), 0x0, &(0x7f00000014c0)=""/126, 0x7e}, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) 23:19:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:17 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:17 executing program 3: seccomp(0x0, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() [ 912.352027] audit: type=1326 audit(1529709557.350:2008): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22352 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:17 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:17 executing program 3: seccomp(0x0, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:17 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:17 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:17 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) 23:19:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) [ 913.355599] kauditd_printk_skb: 1 callbacks suppressed [ 913.355623] audit: type=1326 audit(1529709558.354:2010): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22404 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) [ 913.435194] audit: type=1326 audit(1529709558.402:2011): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22399 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:18 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:18 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:18 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:19 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) sched_yield() 23:19:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000080)={0x0, @rand_addr, 0x0, 0x0, 'wrr\x00'}, 0x2c) [ 914.311914] audit: type=1326 audit(1529709559.310:2012): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22450 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) [ 914.361947] audit: type=1326 audit(1529709559.343:2013): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22453 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 914.382001] audit: type=1326 audit(1529709559.354:2014): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22461 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) sched_yield() 23:19:19 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:19 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:19 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) sched_yield() 23:19:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/zero\x00', 0x0, 0x0) setsockopt$sock_void(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) 23:19:20 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50259}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:20 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) [ 915.284452] audit: type=1326 audit(1529709560.283:2015): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22502 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:20 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:20 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) [ 915.365765] audit: type=1326 audit(1529709560.318:2016): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22511 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 915.388022] audit: type=1326 audit(1529709560.325:2017): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22503 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:20 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) [ 915.511192] audit: type=1326 audit(1529709560.508:2018): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22525 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:20 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:21 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) getsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, &(0x7f0000000000), &(0x7f0000000040)=0x8) 23:19:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:21 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) [ 916.421529] audit: type=1326 audit(1529709561.420:2019): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22560 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:21 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:21 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:21 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:21 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:21 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:22 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000080)={'\x00', {0x2}}) 23:19:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:22 executing program 3: seccomp(0x1, 0x0, &(0x7f00000002c0)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) ioctl$PIO_UNIMAPCLR(0xffffffffffffffff, 0x4b68, &(0x7f0000000280)) 23:19:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) 23:19:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:22 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:22 executing program 4: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:22 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:23 executing program 4: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:23 executing program 4: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:23 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) [ 918.691861] kauditd_printk_skb: 4 callbacks suppressed [ 918.691892] audit: type=1326 audit(1529709563.690:2024): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22708 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:23 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:23 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:23 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x400000050229}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:23 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:24 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:24 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:24 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:24 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) inotify_init1(0x0) 23:19:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:24 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) [ 919.647529] audit: type=1326 audit(1529709564.645:2025): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22773 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:24 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) sched_getscheduler(0x0) 23:19:24 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) [ 919.726996] audit: type=1326 audit(1529709564.671:2026): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22770 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:24 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) inotify_init1(0x0) [ 919.827255] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 919.838063] syz-executor0 cpuset=syz0 mems_allowed=0 [ 919.843220] CPU: 0 PID: 22792 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 919.850067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.859521] Call Trace: [ 919.862136] dump_stack+0x185/0x1d0 [ 919.865781] warn_alloc+0x430/0x690 [ 919.869439] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 919.874295] ? kernel_poison_pages+0x40/0x360 [ 919.878802] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 919.884294] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 919.889341] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.894216] ? __msan_poison_alloca+0x15c/0x1d0 [ 919.898910] kmsan_alloc_page+0x82/0xe0 [ 919.902920] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 919.907688] ? do_syscall_64+0x15b/0x230 [ 919.911769] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.916633] ? __msan_poison_alloca+0x15c/0x1d0 [ 919.921318] ? __should_failslab+0x278/0x2a0 [ 919.925743] ? should_fail+0x57/0xab0 [ 919.929538] ? __should_failslab+0x278/0x2a0 [ 919.933940] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.940152] ? __msan_poison_alloca+0x15c/0x1d0 [ 919.944817] ? kmsan_set_origin+0x9e/0x160 [ 919.949053] alloc_pages_vma+0x1555/0x17f0 [ 919.953286] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 919.958389] handle_mm_fault+0x44ca/0x7ed0 [ 919.962613] ? kmsan_set_origin_inline+0x6b/0x120 [ 919.967457] __do_page_fault+0xec6/0x1a10 [ 919.971605] do_page_fault+0xb7/0x250 [ 919.975401] page_fault+0x1e/0x30 [ 919.978851] RIP: 0010:__put_user_4+0x1c/0x30 [ 919.983244] RSP: 0018:ffff88005ca6fdb0 EFLAGS: 00010297 [ 919.988591] RAX: 0000000000000013 RBX: 00007fffffffeffd RCX: 0000000020000000 [ 919.995852] RDX: 0000000000000000 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 920.003115] RBP: ffff88005ca6fe78 R08: 0000000001080020 R09: 0000000000000002 [ 920.010374] R10: 0000000000000000 R11: ffffffff87d2e2c0 R12: 0000000000000001 [ 920.017637] R13: 0000000000000000 R14: 0000000020000000 R15: 0000000000000013 [ 920.025059] ? __sys_socketpair+0x1490/0x1490 [ 920.029675] ? __sys_socketpair+0x1cb/0x1490 [ 920.034171] __x64_sys_socketpair+0x117/0x170 [ 920.038708] ? __sys_socketpair+0x1490/0x1490 [ 920.043222] do_syscall_64+0x15b/0x230 [ 920.047126] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 920.052322] RIP: 0033:0x455a99 [ 920.055510] RSP: 002b:00007f9ef7937c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 920.063229] RAX: ffffffffffffffda RBX: 00007f9ef79386d4 RCX: 0000000000455a99 [ 920.070501] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000002 [ 920.077776] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 920.085062] R10: 0000000020000000 R11: 0000000000000246 R12: 00000000ffffffff [ 920.092339] R13: 00000000004c1d6a R14: 00000000004d2e88 R15: 0000000000000000 [ 920.099620] Mem-Info: [ 920.102048] active_anon:156566 inactive_anon:76 isolated_anon:0 [ 920.102048] active_file:3749 inactive_file:3722 isolated_file:0 [ 920.102048] unevictable:0 dirty:35 writeback:0 unstable:0 [ 920.102048] slab_reclaimable:3427 slab_unreclaimable:9453 [ 920.102048] mapped:72193 shmem:84 pagetables:1378 bounce:0 [ 920.102048] free:63189 free_pcp:370 free_cma:0 [ 920.135165] Node 0 active_anon:626264kB inactive_anon:304kB active_file:14996kB inactive_file:14888kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:288772kB dirty:140kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 272384kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 920.163269] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 920.189481] lowmem_reserve[]: 0 2817 7244 7244 [ 920.194066] Node 0 DMA32 free:187532kB min:26224kB low:32780kB high:39336kB active_anon:228824kB inactive_anon:24kB active_file:4180kB inactive_file:2652kB unevictable:0kB writepending:76kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2752kB pagetables:2704kB bounce:0kB free_pcp:164kB local_pcp:72kB free_cma:0kB [ 920.223240] lowmem_reserve[]: 0 0 4426 4426 [ 920.227563] Node 0 Normal free:49320kB min:41208kB low:51508kB high:61808kB active_anon:397424kB inactive_anon:280kB active_file:10816kB inactive_file:12236kB unevictable:0kB writepending:64kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7360kB pagetables:2808kB bounce:0kB free_pcp:1316kB local_pcp:680kB free_cma:0kB [ 920.258195] lowmem_reserve[]: 0 0 0 0 [ 920.261990] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 920.275212] Node 0 DMA32: 761*4kB (UM) 6237*8kB (UM) 1482*16kB (UM) 555*32kB (UM) 326*64kB (UM) 164*128kB (UM) 78*256kB (M) 29*512kB (M) 16*1024kB (UM) 0*2048kB 0*4096kB = 187468kB [ 920.291471] Node 0 Normal: 2368*4kB (UMEH) 2257*8kB (UMEH) 604*16kB (UMEH) 157*32kB (UMH) 83*64kB (UM) 8*128kB (UM) 1*256kB (U) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 49320kB [ 920.307389] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 920.315965] 7555 total pagecache pages [ 920.319843] 0 pages in swap cache [ 920.323289] Swap cache stats: add 0, delete 0, find 0/0 23:19:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) [ 920.328719] Free swap = 0kB [ 920.331716] Total swap = 0kB [ 920.334912] 1965969 pages RAM [ 920.337998] 0 pages HighMem/MovableOnly [ 920.341971] 106316 pages reserved [ 920.374052] audit: type=1326 audit(1529709565.372:2027): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22791 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 920.404121] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 920.414651] syz-executor3 cpuset=syz3 mems_allowed=0 [ 920.419775] CPU: 1 PID: 22799 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 920.426724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 920.436104] Call Trace: [ 920.438725] dump_stack+0x185/0x1d0 [ 920.442370] warn_alloc+0x430/0x690 [ 920.446035] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 920.450892] ? kernel_poison_pages+0x40/0x360 [ 920.455397] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 920.460861] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 920.465821] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 920.470861] ? kmsan_set_origin_inline+0x6b/0x120 [ 920.475718] ? __msan_poison_alloca+0x15c/0x1d0 [ 920.480406] kmsan_alloc_page+0x82/0xe0 [ 920.484389] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 920.489155] ? kmsan_set_origin_inline+0x6b/0x120 [ 920.494009] ? __msan_poison_alloca+0x15c/0x1d0 [ 920.498688] ? __should_failslab+0x278/0x2a0 [ 920.503113] ? should_fail+0x57/0xab0 [ 920.506943] ? __should_failslab+0x278/0x2a0 [ 920.511371] ? kmsan_set_origin_inline+0x6b/0x120 [ 920.516314] ? __msan_poison_alloca+0x15c/0x1d0 [ 920.521002] ? kmsan_set_origin+0x9e/0x160 [ 920.525258] alloc_pages_vma+0x1555/0x17f0 [ 920.529509] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 920.534716] handle_mm_fault+0x44ca/0x7ed0 [ 920.538959] ? kmsan_set_origin_inline+0x6b/0x120 [ 920.543822] __do_page_fault+0xec6/0x1a10 [ 920.547987] do_page_fault+0xb7/0x250 [ 920.551797] ? page_fault+0x8/0x30 [ 920.555349] page_fault+0x1e/0x30 [ 920.558806] RIP: 0033:0x4075fa [ 920.561995] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 920.567366] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 23:19:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) inotify_init1(0x0) 23:19:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) [ 920.574648] RDX: 55626a35b0ed2fec RSI: 0000000000000000 RDI: 0000000000c04848 [ 920.581925] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 920.589321] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e0e71 [ 920.596601] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 23:19:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) sched_yield() 23:19:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) sched_getscheduler(0x0) 23:19:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) get_thread_area(&(0x7f00000000c0)) 23:19:25 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:25 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) [ 920.833012] audit: type=1326 audit(1529709565.831:2028): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22815 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:25 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) [ 920.923047] audit: type=1326 audit(1529709565.912:2029): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22829 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:26 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:26 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) sched_getscheduler(0x0) 23:19:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) get_thread_area(&(0x7f00000000c0)) [ 921.002832] audit: type=1326 audit(1529709565.978:2030): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22819 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:26 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:26 executing program 2: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:26 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000240)) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0x0) 23:19:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) get_thread_area(&(0x7f00000000c0)) 23:19:26 executing program 6: socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) mkdirat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0) 23:19:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) [ 921.854852] audit: type=1326 audit(1529709566.853:2031): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22876 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:26 executing program 3: clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:26 executing program 6: socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:26 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) [ 921.918993] audit: type=1326 audit(1529709566.884:2032): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22868 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 921.940024] audit: type=1326 audit(1529709566.911:2033): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=22867 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:27 executing program 6: socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:27 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:27 executing program 3: clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:27 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:27 executing program 3: clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:27 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:27 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:27 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:28 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f00000000c0)) 23:19:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:28 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:28 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) [ 923.961673] kauditd_printk_skb: 1 callbacks suppressed [ 923.961697] audit: type=1326 audit(1529709568.960:2035): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23001 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:29 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:29 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) [ 924.142022] audit: type=1326 audit(1529709569.140:2036): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23013 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 924.188451] syz-executor6: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 924.199105] syz-executor6 cpuset=syz6 mems_allowed=0 [ 924.204230] CPU: 1 PID: 23015 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 924.211191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 924.220558] Call Trace: [ 924.223163] dump_stack+0x185/0x1d0 [ 924.226795] warn_alloc+0x430/0x690 [ 924.230427] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 924.235386] ? kernel_poison_pages+0x40/0x360 [ 924.239899] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 924.245344] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 924.250280] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 924.255297] ? kmsan_set_origin_inline+0x6b/0x120 [ 924.260125] ? __msan_poison_alloca+0x15c/0x1d0 [ 924.264786] kmsan_alloc_page+0x82/0xe0 [ 924.268750] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 924.273667] ? kmsan_set_origin_inline+0x6b/0x120 [ 924.278508] ? __msan_poison_alloca+0x15c/0x1d0 [ 924.283161] ? __should_failslab+0x278/0x2a0 [ 924.287554] ? should_fail+0x57/0xab0 [ 924.291338] ? __should_failslab+0x278/0x2a0 [ 924.295745] ? kmsan_set_origin_inline+0x6b/0x120 [ 924.300585] ? __msan_poison_alloca+0x15c/0x1d0 [ 924.305241] ? kmsan_set_origin+0x9e/0x160 [ 924.309470] alloc_pages_vma+0x1555/0x17f0 [ 924.313693] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 924.318783] handle_mm_fault+0x44ca/0x7ed0 [ 924.323000] ? kmsan_set_origin_inline+0x6b/0x120 [ 924.327834] __do_page_fault+0xec6/0x1a10 [ 924.331973] do_page_fault+0xb7/0x250 [ 924.335774] ? page_fault+0x8/0x30 [ 924.339297] page_fault+0x1e/0x30 [ 924.342733] RIP: 0033:0x4075fa [ 924.345915] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 924.351276] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000000 [ 924.358531] RDX: 9c83da96dca644fa RSI: 0000000000000000 RDI: 0000000001c57848 [ 924.365782] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 924.373050] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e1d3b [ 924.380306] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 924.387569] warn_alloc_show_mem: 1 callbacks suppressed [ 924.387571] Mem-Info: [ 924.395320] active_anon:156106 inactive_anon:78 isolated_anon:0 [ 924.395320] active_file:3523 inactive_file:3504 isolated_file:0 [ 924.395320] unevictable:0 dirty:44 writeback:0 unstable:0 [ 924.395320] slab_reclaimable:3421 slab_unreclaimable:9453 [ 924.395320] mapped:72184 shmem:84 pagetables:1337 bounce:0 [ 924.395320] free:62617 free_pcp:443 free_cma:0 [ 924.428391] Node 0 active_anon:624424kB inactive_anon:312kB active_file:14092kB inactive_file:14016kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:288736kB dirty:176kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 924.456479] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 924.482606] lowmem_reserve[]: 0 2817 7244 7244 [ 924.487191] Node 0 DMA32 free:185152kB min:26224kB low:32780kB high:39336kB active_anon:227020kB inactive_anon:32kB active_file:3932kB inactive_file:2932kB unevictable:0kB writepending:100kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2752kB pagetables:2368kB bounce:0kB free_pcp:732kB local_pcp:308kB free_cma:0kB [ 924.516512] lowmem_reserve[]: 0 0 4426 4426 [ 924.520850] Node 0 Normal free:49412kB min:41208kB low:51508kB high:61808kB active_anon:397392kB inactive_anon:280kB active_file:10724kB inactive_file:10736kB unevictable:0kB writepending:76kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2980kB bounce:0kB free_pcp:1040kB local_pcp:716kB free_cma:0kB [ 924.550448] lowmem_reserve[]: 0 0 0 0 [ 924.554323] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 924.567524] Node 0 DMA32: 678*4kB (UM) 6221*8kB (UM) 1480*16kB (UM) 554*32kB (UM) 325*64kB (UM) 162*128kB (UM) 78*256kB (UM) 28*512kB (M) 15*1024kB (UM) 0*2048kB 0*4096kB = 185088kB [ 924.583974] Node 0 Normal: 2743*4kB (UMEH) 2158*8kB (MEH) 546*16kB (UMEH) 157*32kB (UMH) 90*64kB (UM) 9*128kB (UM) 1*256kB (U) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 49676kB [ 924.599793] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 924.608351] 7165 total pagecache pages [ 924.612312] 0 pages in swap cache [ 924.615749] Swap cache stats: add 0, delete 0, find 0/0 [ 924.621096] Free swap = 0kB [ 924.624099] Total swap = 0kB [ 924.627201] 1965969 pages RAM [ 924.630296] 0 pages HighMem/MovableOnly [ 924.634250] 106316 pages reserved 23:19:29 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) [ 924.741312] audit: type=1326 audit(1529709569.737:2037): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23025 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:29 executing program 5: ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:29 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:29 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:30 executing program 5: ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:30 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:30 executing program 5: ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) [ 925.185501] audit: type=1326 audit(1529709570.183:2038): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23064 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:30 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:30 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:30 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:30 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:30 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:30 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) [ 925.710627] audit: type=1326 audit(1529709570.708:2039): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23096 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:30 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:30 executing program 7: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:30 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:30 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) [ 925.845838] audit: type=1326 audit(1529709570.844:2040): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23100 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:31 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) ioctl$VHOST_SET_FEATURES(0xffffffffffffffff, 0x4008af00, &(0x7f0000000080)) 23:19:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:31 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:31 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) [ 926.135047] audit: type=1326 audit(1529709571.133:2041): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23125 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:31 executing program 7: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:31 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000100)}) inotify_init1(0x0) 23:19:31 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:31 executing program 1: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) [ 926.656929] audit: type=1326 audit(1529709571.655:2042): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23135 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) [ 926.721911] audit: type=1326 audit(1529709571.680:2043): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23143 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:31 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:31 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:31 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:31 executing program 7: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:31 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) [ 926.862801] audit: type=1326 audit(1529709571.861:2044): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23156 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:32 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:32 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:32 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:32 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:32 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) sched_getscheduler(0x0) 23:19:32 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:32 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:32 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:32 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:32 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:32 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:32 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:33 executing program 4: syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:33 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) clock_gettime(0x0, &(0x7f0000000000)) get_thread_area(&(0x7f00000000c0)) 23:19:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:33 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:33 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:33 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:33 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:33 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:33 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:33 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:34 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) eventfd(0x0) [ 929.134153] kauditd_printk_skb: 4 callbacks suppressed [ 929.134177] audit: type=1326 audit(1529709574.131:2049): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23287 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) eventfd(0x0) 23:19:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:34 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:34 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:34 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:34 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:34 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) eventfd(0x0) 23:19:34 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) [ 929.696001] audit: type=1326 audit(1529709574.694:2050): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23315 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:34 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:34 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:35 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000004c0)={@dev={0xfe, 0x80}}) 23:19:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:35 executing program 2: accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:35 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:35 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) [ 930.073595] audit: type=1326 audit(1529709575.072:2051): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23343 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:35 executing program 2: accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) [ 930.141313] audit: type=1326 audit(1529709575.123:2052): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23352 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:35 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:35 executing program 2: accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:35 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:35 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:35 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:35 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:35 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) [ 930.688763] audit: type=1326 audit(1529709575.687:2053): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23377 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:36 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:36 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) [ 931.086927] audit: type=1326 audit(1529709576.085:2054): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23399 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:36 executing program 0: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:36 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:36 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000200)={0x0, @loopback, @multicast2}, &(0x7f0000000240)=0xc) 23:19:36 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:36 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) [ 931.630951] audit: type=1326 audit(1529709576.629:2055): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23426 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:36 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) [ 931.690653] audit: type=1326 audit(1529709576.688:2056): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23435 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:36 executing program 6: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:36 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:36 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:36 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:37 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)) 23:19:37 executing program 0: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:37 executing program 6: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) [ 932.146913] audit: type=1326 audit(1529709577.145:2057): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23465 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:37 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:37 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:37 executing program 6: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:37 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) [ 932.654714] audit: type=1326 audit(1529709577.653:2058): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23476 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:37 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:37 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:37 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:37 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:37 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:38 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:38 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000010680)={{{@in=@multicast2, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000010780)=0xe8) 23:19:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:38 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:38 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:38 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:38 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:38 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:38 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:38 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:38 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:38 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:38 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:39 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:39 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:39 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:39 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:39 executing program 5: openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:39 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:39 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:39 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:39 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:39 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) [ 934.918538] kauditd_printk_skb: 2 callbacks suppressed [ 934.918560] audit: type=1326 audit(1529709579.917:2061): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23609 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:40 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:40 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:40 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 935.125697] audit: type=1326 audit(1529709580.124:2062): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23623 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:40 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:40 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) accept4(0xffffffffffffffff, &(0x7f0000000100)=@in6={0x0, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x80, 0x0) eventfd(0x0) 23:19:40 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:40 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:40 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:40 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x5025c}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:40 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:40 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) [ 935.882441] audit: type=1326 audit(1529709580.880:2063): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23661 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:40 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) [ 935.988043] audit: type=1326 audit(1529709580.986:2064): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23668 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:41 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:41 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:41 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) [ 936.164313] audit: type=1326 audit(1529709581.163:2065): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23683 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:41 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:41 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:41 executing program 7: pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:41 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:41 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x500ee}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000000)={0x0, &(0x7f0000000140)}, 0x10) 23:19:41 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:41 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:41 executing program 7: pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 937.073842] audit: type=1326 audit(1529709582.072:2066): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23726 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 23:19:42 executing program 4: socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:42 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:42 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x500ee}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000000)={0x0, &(0x7f0000000140)}, 0x10) 23:19:42 executing program 7: pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 937.168362] audit: type=1326 audit(1529709582.166:2067): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23735 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:42 executing program 4: socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') [ 937.265214] audit: type=1326 audit(1529709582.203:2068): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23740 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:42 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x500ee}]}) dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f0000000000)={0x0, &(0x7f0000000140)}, 0x10) 23:19:42 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:42 executing program 4: socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:42 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001240)) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000200)={'syz1'}, 0x4) 23:19:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) [ 938.006783] audit: type=1326 audit(1529709583.005:2069): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23776 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:43 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:43 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:43 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) [ 938.145849] audit: type=1326 audit(1529709583.144:2070): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23785 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:43 executing program 7: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:43 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:43 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:43 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:43 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:43 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:43 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:44 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @loopback=0x7f000001}}}, &(0x7f0000000240)=0x98) 23:19:44 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:44 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:44 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:44 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:44 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:44 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:44 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:45 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, 0x0, 0x0, 0x0, 0x0, {0xa}}, 0x14}, 0x1}, 0x0) 23:19:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:45 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) [ 940.114784] kauditd_printk_skb: 4 callbacks suppressed [ 940.114805] audit: type=1326 audit(1529709585.113:2075): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23887 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:45 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:45 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50029}]}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:45 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') [ 940.396868] audit: type=1326 audit(1529709585.395:2076): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23910 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:45 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) [ 940.554417] audit: type=1326 audit(1529709585.553:2077): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23926 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:46 executing program 2: socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) [ 941.049746] audit: type=1326 audit(1529709586.048:2078): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23939 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:46 executing program 2: socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:46 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:46 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='vegas\x00', 0x6) 23:19:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:46 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:46 executing program 2: socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) [ 941.397658] audit: type=1326 audit(1529709586.396:2079): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23971 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:46 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:46 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:46 executing program 0: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) [ 941.577577] audit: type=1326 audit(1529709586.567:2080): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=23981 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:46 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:46 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:46 executing program 6: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:46 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:47 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) [ 942.036862] audit: type=1326 audit(1529709587.035:2081): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24002 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:47 executing program 6: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:47 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:47 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:47 executing program 7: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000080)) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 23:19:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) [ 942.607977] audit: type=1326 audit(1529709587.606:2082): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24039 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:47 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) symlinkat(&(0x7f00000024c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000002500)='./file0\x00') 23:19:47 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:47 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:47 executing program 6: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:47 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:47 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:47 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) [ 943.023648] audit: type=1326 audit(1529709588.021:2083): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24057 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:48 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:48 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:48 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:48 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:48 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:48 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:48 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:48 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:48 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:48 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:48 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:49 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:49 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:49 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:49 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:49 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:49 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:49 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:49 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) [ 944.753612] audit: type=1326 audit(1529709589.748:2084): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24169 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:49 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:49 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:49 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:49 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:49 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:50 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:50 executing program 1: add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:50 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:50 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:50 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:50 executing program 1: add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:50 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:50 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:50 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:50 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) [ 945.705028] kauditd_printk_skb: 1 callbacks suppressed [ 945.710542] audit: type=1326 audit(1529709590.703:2086): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24227 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:50 executing program 1: add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:50 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) [ 945.835567] audit: type=1326 audit(1529709590.732:2087): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24237 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:51 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:51 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:51 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) [ 946.071986] audit: type=1326 audit(1529709591.070:2088): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24261 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:51 executing program 4: pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:51 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:51 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:51 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) socket$packet(0x11, 0x0, 0x300) syslog(0x0, &(0x7f0000000000)=""/107, 0x6b) 23:19:51 executing program 7: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) [ 946.696177] audit: type=1326 audit(1529709591.694:2089): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24278 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:51 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:51 executing program 4: pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) [ 946.793485] audit: type=1326 audit(1529709591.754:2090): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24291 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 946.884895] audit: type=1326 audit(1529709591.883:2091): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24297 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:51 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)}, 0x20) 23:19:51 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:51 executing program 7: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:51 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:51 executing program 4: pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:52 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) [ 947.027863] audit: type=1326 audit(1529709592.025:2092): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24313 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:52 executing program 7: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:52 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0xffffffffffffff9c, 0x0, 0x0, 0x0, &(0x7f0000000100)}, 0x20) lookup_dcookie(0x0, &(0x7f0000000000)=""/153, 0x99) 23:19:52 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) [ 947.680871] audit: type=1326 audit(1529709592.679:2093): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24337 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:52 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) [ 947.880716] audit: type=1326 audit(1529709592.879:2094): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24356 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:52 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:52 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:52 executing program 4: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006, 0x0, 0x0, 0x502a5}]}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:52 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:52 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:52 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 23:19:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 23:19:53 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) sysfs$2(0x2, 0x0, &(0x7f00000002c0)=""/193) 23:19:53 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000140)}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:53 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 23:19:53 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:53 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:53 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:53 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) [ 948.928944] audit: type=1326 audit(1529709593.927:2095): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24425 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:53 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETNOCSUM(0xffffffffffffffff, 0x400454c8, 0x0) 23:19:54 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:54 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:54 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:54 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:19:54 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:54 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:19:54 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:54 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x502a5}]}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:55 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:55 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:19:55 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 23:19:55 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006}]}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:19:55 executing program 2: munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:19:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:19:55 executing program 2: munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:55 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:19:55 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:55 executing program 2: munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:55 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:19:55 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) [ 950.944001] kauditd_printk_skb: 6 callbacks suppressed [ 950.944024] audit: type=1326 audit(1529709595.942:2102): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24535 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000400)) 23:19:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:19:56 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) [ 951.119941] audit: type=1326 audit(1529709596.118:2103): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24546 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:56 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006}]}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:56 executing program 6: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) time(&(0x7f0000000000)) [ 951.226486] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 951.237034] syz-executor4 cpuset=syz4 mems_allowed=0 [ 951.242173] CPU: 0 PID: 24557 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 951.249026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.258391] Call Trace: [ 951.260997] dump_stack+0x185/0x1d0 [ 951.264640] warn_alloc+0x430/0x690 [ 951.268291] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 951.273147] ? kernel_poison_pages+0x40/0x360 [ 951.277664] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 951.283136] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 951.288103] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 951.293168] kmsan_alloc_page+0x82/0xe0 [ 951.297158] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 951.301930] ? kmsan_set_origin_inline+0x6b/0x120 [ 951.306783] ? __msan_poison_alloca+0x15c/0x1d0 [ 951.311464] ? __should_failslab+0x278/0x2a0 [ 951.315881] ? should_fail+0x57/0xab0 [ 951.319685] ? __should_failslab+0x278/0x2a0 [ 951.324099] ? kmsan_set_origin_inline+0x6b/0x120 [ 951.328956] ? __msan_poison_alloca+0x15c/0x1d0 [ 951.333645] ? kmsan_set_origin+0x9e/0x160 [ 951.337895] alloc_pages_vma+0x1555/0x17f0 [ 951.342147] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 951.347272] handle_mm_fault+0x44ca/0x7ed0 [ 951.351518] ? kmsan_set_origin_inline+0x6b/0x120 [ 951.356388] __do_page_fault+0xec6/0x1a10 [ 951.360551] do_page_fault+0xb7/0x250 [ 951.364365] ? page_fault+0x8/0x30 [ 951.367913] page_fault+0x1e/0x30 [ 951.371416] RIP: 0033:0x4075fa [ 951.374602] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 951.379965] RAX: 00000000200000c0 RBX: 0000000000000000 RCX: 0000000000000001 [ 951.387241] RDX: 64875bfaa44c3dc5 RSI: 0000000000000000 RDI: 00000000013c6848 [ 951.394559] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 951.401835] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e86d9 [ 951.409111] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 951.416385] Mem-Info: [ 951.418815] active_anon:156540 inactive_anon:75 isolated_anon:0 [ 951.418815] active_file:1033 inactive_file:963 isolated_file:32 [ 951.418815] unevictable:0 dirty:25 writeback:0 unstable:0 [ 951.418815] slab_reclaimable:3386 slab_unreclaimable:9460 [ 951.418815] mapped:67289 shmem:84 pagetables:1409 bounce:0 [ 951.418815] free:53647 free_pcp:491 free_cma:0 [ 951.451915] Node 0 active_anon:626160kB inactive_anon:300kB active_file:4132kB inactive_file:3468kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:268808kB dirty:100kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 951.480023] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 951.506165] lowmem_reserve[]: 0 2817 7244 7244 [ 951.510745] Node 0 DMA32 free:151376kB min:26224kB low:32780kB high:39336kB active_anon:228812kB inactive_anon:20kB active_file:1160kB inactive_file:1836kB unevictable:0kB writepending:76kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2880kB pagetables:2656kB bounce:0kB free_pcp:832kB local_pcp:184kB free_cma:0kB [ 951.539981] lowmem_reserve[]: 0 0 4426 4426 [ 951.544298] Node 0 Normal free:47308kB min:41208kB low:51508kB high:61808kB active_anon:397368kB inactive_anon:280kB active_file:3632kB inactive_file:1976kB unevictable:0kB writepending:24kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2980kB bounce:0kB free_pcp:1128kB local_pcp:484kB free_cma:0kB [ 951.573712] lowmem_reserve[]: 0 0 0 0 [ 951.577503] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 951.590712] Node 0 DMA32: 1176*4kB (UMH) 5770*8kB (UM) 1348*16kB (UM) 510*32kB (UM) 309*64kB (UM) 146*128kB (UM) 62*256kB (UM) 17*512kB (UM) 0*1024kB 0*2048kB 0*4096kB = 151792kB [ 951.606783] Node 0 Normal: 5185*4kB (UMEH) 2081*8kB (UMEH) 341*16kB (MEH) 49*32kB (UMEH) 25*64kB (UM) 8*128kB (UM) 1*256kB (U) 1*512kB (U) 0*1024kB 0*2048kB 0*4096kB = 47804kB [ 951.622709] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 951.631260] 2017 total pagecache pages [ 951.635126] 0 pages in swap cache [ 951.638556] Swap cache stats: add 0, delete 0, find 0/0 [ 951.643895] Free swap = 0kB [ 951.646908] Total swap = 0kB [ 951.649904] 1965969 pages RAM [ 951.652983] 0 pages HighMem/MovableOnly [ 951.656933] 106316 pages reserved 23:19:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) [ 951.667241] audit: type=1326 audit(1529709596.665:2104): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24558 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) time(&(0x7f0000000000)) [ 951.714409] audit: type=1326 audit(1529709596.703:2105): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24557 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:56 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:19:56 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) time(&(0x7f0000000000)) 23:19:56 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000001c0)) 23:19:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) [ 952.028410] audit: type=1326 audit(1529709597.026:2106): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24576 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:19:57 executing program 0: syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:19:57 executing program 3: pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:19:57 executing program 4: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000140)=[{0x400000006}]}) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)={0x0, 0x989680}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) getdents(0xffffffffffffffff, &(0x7f0000000080)=""/57, 0x39) 23:19:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:19:57 executing program 6: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) [ 952.316835] audit: type=1326 audit(1529709597.314:2107): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24603 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:57 executing program 3: pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:19:57 executing program 0: syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:19:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:19:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:57 executing program 6: socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:19:57 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:19:57 executing program 3: pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:19:57 executing program 0: syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:19:57 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:57 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:19:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:19:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:19:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:58 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:19:58 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:58 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:19:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:19:58 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) [ 953.285825] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 953.296646] syz-executor4 cpuset=syz4 mems_allowed=0 [ 953.301912] CPU: 1 PID: 24678 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 953.308749] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.318118] Call Trace: [ 953.320718] dump_stack+0x185/0x1d0 [ 953.324355] warn_alloc+0x430/0x690 [ 953.328000] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 953.332856] ? kernel_poison_pages+0x40/0x360 [ 953.337450] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 953.343385] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 953.348352] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 953.353393] ? kmsan_set_origin_inline+0x6b/0x120 [ 953.358238] ? __msan_poison_alloca+0x15c/0x1d0 [ 953.362919] kmsan_alloc_page+0x82/0xe0 [ 953.366898] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 953.371659] ? kmsan_set_origin_inline+0x6b/0x120 [ 953.376507] ? __msan_poison_alloca+0x15c/0x1d0 [ 953.381177] ? __should_failslab+0x278/0x2a0 23:19:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) [ 953.385589] ? should_fail+0x57/0xab0 [ 953.389390] ? __should_failslab+0x278/0x2a0 [ 953.393819] ? kmsan_set_origin_inline+0x6b/0x120 [ 953.398678] ? __msan_poison_alloca+0x15c/0x1d0 [ 953.403360] ? kmsan_set_origin+0x9e/0x160 [ 953.407675] alloc_pages_vma+0x1555/0x17f0 [ 953.411977] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 953.417095] handle_mm_fault+0x44ca/0x7ed0 [ 953.421344] ? kmsan_set_origin_inline+0x6b/0x120 [ 953.426212] __do_page_fault+0xec6/0x1a10 [ 953.430375] do_page_fault+0xb7/0x250 23:19:58 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) [ 953.434183] ? page_fault+0x8/0x30 [ 953.437727] page_fault+0x1e/0x30 [ 953.441182] RIP: 0033:0x4075fa [ 953.444367] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 953.449733] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 953.457012] RDX: 64875bfaa44c3dc5 RSI: 0000000000000000 RDI: 00000000013c6848 [ 953.464391] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 953.471669] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e8ee5 [ 953.478945] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 23:19:58 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:19:58 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) [ 953.486221] Mem-Info: [ 953.488715] active_anon:155455 inactive_anon:78 isolated_anon:0 [ 953.488715] active_file:1194 inactive_file:753 isolated_file:0 [ 953.488715] unevictable:0 dirty:29 writeback:0 unstable:0 [ 953.488715] slab_reclaimable:3376 slab_unreclaimable:9453 [ 953.488715] mapped:66922 shmem:84 pagetables:1331 bounce:0 [ 953.488715] free:55331 free_pcp:465 free_cma:0 23:19:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) [ 953.521720] Node 0 active_anon:619756kB inactive_anon:312kB active_file:4776kB inactive_file:3012kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267688kB dirty:116kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 953.549744] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 953.575889] lowmem_reserve[]: 0 2817 7244 7244 [ 953.580493] Node 0 DMA32 free:160184kB min:26224kB low:32780kB high:39336kB active_anon:222456kB inactive_anon:36kB active_file:1500kB inactive_file:1852kB unevictable:0kB writepending:100kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2944kB pagetables:2424kB bounce:0kB free_pcp:208kB local_pcp:160kB free_cma:0kB [ 953.609856] lowmem_reserve[]: 0 0 4426 4426 [ 953.614196] Node 0 Normal free:50948kB min:41208kB low:51508kB high:61808kB active_anon:397392kB inactive_anon:276kB active_file:3456kB inactive_file:996kB unevictable:0kB writepending:16kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2808kB bounce:0kB free_pcp:1284kB local_pcp:656kB free_cma:0kB [ 953.643555] lowmem_reserve[]: 0 0 0 0 [ 953.647375] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 953.660609] Node 0 DMA32: 1042*4kB (UMH) 5764*8kB (UM) 1352*16kB (UM) 510*32kB (UM) 303*64kB (UM) 147*128kB (UM) 61*256kB (M) 16*512kB (M) 1*1024kB (U) 1*2048kB (M) 0*4096kB = 153320kB 23:19:58 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) [ 953.677270] Node 0 Normal: 5241*4kB (MEH) 2072*8kB (UMEH) 336*16kB (MEH) 45*32kB (UMEH) 21*64kB (UM) 9*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 46852kB [ 953.692343] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 953.700947] 2004 total pagecache pages [ 953.704922] 0 pages in swap cache [ 953.708375] Swap cache stats: add 0, delete 0, find 0/0 [ 953.713737] Free swap = 0kB [ 953.716754] Total swap = 0kB [ 953.719773] 1965969 pages RAM [ 953.722873] 0 pages HighMem/MovableOnly [ 953.726847] 106316 pages reserved [ 953.762019] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 953.773874] syz-executor3 cpuset=syz3 mems_allowed=0 [ 953.779005] CPU: 1 PID: 24696 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 953.785850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 953.795209] Call Trace: [ 953.797810] dump_stack+0x185/0x1d0 [ 953.801459] warn_alloc+0x430/0x690 [ 953.805106] __alloc_pages_nodemask+0x5b1c/0x5cc0 23:19:58 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) [ 953.809960] ? kernel_poison_pages+0x40/0x360 [ 953.814470] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 953.819937] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 953.824903] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 953.829877] ? kmsan_set_origin_inline+0x6b/0x120 [ 953.834735] ? __msan_poison_alloca+0x15c/0x1d0 [ 953.839439] kmsan_alloc_page+0x82/0xe0 [ 953.843429] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 953.848200] ? kmsan_set_origin_inline+0x6b/0x120 [ 953.853058] ? __msan_poison_alloca+0x15c/0x1d0 [ 953.857742] ? __should_failslab+0x278/0x2a0 23:19:58 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) [ 953.862171] ? should_fail+0x57/0xab0 [ 953.865987] ? __should_failslab+0x278/0x2a0 [ 953.870407] ? kmsan_set_origin_inline+0x6b/0x120 [ 953.875263] ? __msan_poison_alloca+0x15c/0x1d0 [ 953.879953] ? kmsan_set_origin+0x9e/0x160 [ 953.884213] alloc_pages_vma+0x1555/0x17f0 [ 953.888469] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 953.893597] handle_mm_fault+0x44ca/0x7ed0 [ 953.897883] ? kmsan_set_origin_inline+0x6b/0x120 [ 953.902749] __do_page_fault+0xec6/0x1a10 [ 953.906921] do_page_fault+0xb7/0x250 [ 953.910734] ? page_fault+0x8/0x30 [ 953.914284] page_fault+0x1e/0x30 [ 953.917736] RIP: 0033:0x4075fa [ 953.920923] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 953.926284] RAX: 0000000020000500 RBX: 0000000000000000 RCX: 0000000000000001 [ 953.933555] RDX: 55626a35b0ed2fec RSI: 0000000000000000 RDI: 0000000000c04848 [ 953.940828] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 953.948136] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000e90c1 [ 953.955415] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 23:19:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) [ 953.976583] audit: type=1326 audit(1529709598.975:2108): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24700 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:19:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:19:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:19:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:19:59 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50229}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:19:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:19:59 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:19:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:19:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:19:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:19:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:19:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:19:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:19:59 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:19:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:19:59 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:19:59 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:19:59 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:19:59 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:19:59 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:19:59 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:19:59 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) [ 954.968731] audit: type=1326 audit(1529709599.967:2109): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24776 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:00 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:20:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:20:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:00 executing program 5: setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x0, &(0x7f0000000540)}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:20:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:20:00 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:20:00 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) munlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0x0, &(0x7f0000000200)}, 0x10) 23:20:00 executing program 5: setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:00 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:00 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:00 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:20:00 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x501d1}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:20:00 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:20:01 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) [ 955.982923] audit: type=1326 audit(1529709600.981:2110): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24830 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:20:01 executing program 5: setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:01 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:01 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:20:01 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 956.104409] audit: type=1326 audit(1529709601.099:2111): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24837 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:20:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) [ 956.266625] audit: type=1326 audit(1529709601.210:2112): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24844 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:01 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:01 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:01 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:01 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:20:01 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50229}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:20:01 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:01 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:01 executing program 7: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:20:02 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:20:02 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:02 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:20:02 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:20:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:02 executing program 4: openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) [ 957.220565] audit: type=1326 audit(1529709602.212:2113): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24899 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:20:02 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) [ 957.353479] audit: type=1326 audit(1529709602.308:2114): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24905 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 957.373514] audit: type=1326 audit(1529709602.310:2115): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24907 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:02 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:20:02 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:02 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:02 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:20:03 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) syslog(0x0, &(0x7f0000000340)=""/155, 0x9b) time(&(0x7f0000000000)) 23:20:03 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) [ 958.133937] audit: type=1326 audit(1529709603.132:2116): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24948 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:20:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:03 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) pipe(&(0x7f0000000000)) ioctl$SG_GET_REQUEST_TABLE(0xffffffffffffffff, 0x2286, &(0x7f0000000080)) 23:20:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50255}]}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:03 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:20:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) [ 958.309450] audit: type=1326 audit(1529709603.308:2117): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24959 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:03 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:20:03 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x2000050196}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:03 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:03 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50255}]}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) [ 958.411048] audit: type=1326 audit(1529709603.328:2118): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24963 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:03 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50255}]}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) [ 959.081944] audit: type=1326 audit(1529709604.078:2119): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=24997 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:04 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000500)={0x1, &(0x7f0000000540)=[{0x6}]}) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000080)) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(0xffffffffffffffff, 0x111, 0x2, 0x0, 0x4) 23:20:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:04 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:04 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:04 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:04 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:04 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:04 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:04 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:04 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:20:05 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:05 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:05 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x2000050196}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:05 executing program 2: openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:05 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:05 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:05 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:05 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:05 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:05 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6}]}) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:20:06 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:06 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:06 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) setrlimit(0x0, &(0x7f0000000080)) prctl$setmm(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) 23:20:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) ptrace$peekuser(0x3, 0x0, 0x0) [ 961.226372] kauditd_printk_skb: 7 callbacks suppressed [ 961.226394] audit: type=1326 audit(1529709606.225:2127): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25118 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) ptrace$peekuser(0x3, 0x0, 0x0) [ 961.298982] audit: type=1326 audit(1529709606.264:2128): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25124 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:06 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) ptrace$peekuser(0x3, 0x0, 0x0) 23:20:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:06 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:06 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:06 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) [ 961.706953] audit: type=1326 audit(1529709606.705:2129): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25150 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:06 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x0, &(0x7f0000000100)}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:07 executing program 0: gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:07 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 23:20:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:07 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:07 executing program 0: gettid() ptrace$peekuser(0x3, 0x0, 0x0) [ 962.236624] audit: type=1326 audit(1529709607.235:2130): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25174 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:07 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:07 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:07 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:07 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f00000001c0)=""/110) 23:20:07 executing program 0: gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:07 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:07 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x50228}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:07 executing program 3: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 962.733191] audit: type=1326 audit(1529709607.729:2131): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25213 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x70}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:20:08 executing program 6: gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:08 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) [ 963.194152] audit: type=1326 audit(1529709608.192:2132): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25224 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:08 executing program 6: gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) [ 963.333908] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 963.344648] syz-executor0 cpuset=syz0 mems_allowed=0 [ 963.349774] CPU: 0 PID: 25238 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 963.356613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 963.365969] Call Trace: [ 963.368573] dump_stack+0x185/0x1d0 [ 963.372213] warn_alloc+0x430/0x690 [ 963.375856] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 963.380706] ? kernel_poison_pages+0x40/0x360 [ 963.385215] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 963.390673] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 963.395638] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 963.400683] ? kmsan_set_origin_inline+0x6b/0x120 [ 963.405540] ? __msan_poison_alloca+0x15c/0x1d0 [ 963.410230] kmsan_alloc_page+0x82/0xe0 [ 963.414217] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 963.418984] ? kmsan_set_origin_inline+0x6b/0x120 [ 963.423832] ? __msan_poison_alloca+0x15c/0x1d0 [ 963.428503] ? __should_failslab+0x278/0x2a0 [ 963.432917] ? should_fail+0x57/0xab0 [ 963.436720] ? __should_failslab+0x278/0x2a0 [ 963.441133] ? kmsan_set_origin_inline+0x6b/0x120 [ 963.445982] ? __msan_poison_alloca+0x15c/0x1d0 [ 963.450662] ? kmsan_set_origin+0x9e/0x160 [ 963.454913] alloc_pages_vma+0x1555/0x17f0 [ 963.459160] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 963.464277] handle_mm_fault+0x44ca/0x7ed0 [ 963.468516] ? kmsan_set_origin_inline+0x6b/0x120 [ 963.473383] __do_page_fault+0xec6/0x1a10 [ 963.477544] do_page_fault+0xb7/0x250 [ 963.481357] ? page_fault+0x8/0x30 [ 963.484900] page_fault+0x1e/0x30 [ 963.488352] RIP: 0033:0x4075fa [ 963.491536] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 963.496921] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 963.504193] RDX: 3e28e215ea4e1bb2 RSI: 0000000000000000 RDI: 0000000001d98848 [ 963.511474] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 963.518748] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000eb625 [ 963.526027] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 963.533315] warn_alloc_show_mem: 1 callbacks suppressed [ 963.533318] Mem-Info: [ 963.541120] active_anon:155479 inactive_anon:78 isolated_anon:0 [ 963.541120] active_file:869 inactive_file:963 isolated_file:32 [ 963.541120] unevictable:0 dirty:29 writeback:0 unstable:0 [ 963.541120] slab_reclaimable:3361 slab_unreclaimable:9467 [ 963.541120] mapped:67117 shmem:84 pagetables:1356 bounce:0 [ 963.541120] free:48725 free_pcp:603 free_cma:0 [ 963.574742] Node 0 active_anon:621916kB inactive_anon:312kB active_file:3324kB inactive_file:3764kB unevictable:0kB isolated(anon):0kB isolated(file):128kB mapped:268004kB dirty:116kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 268288kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 963.602840] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 963.628955] lowmem_reserve[]: 0 2817 7244 7244 [ 963.633541] Node 0 DMA32 free:130852kB min:26224kB low:32780kB high:39336kB active_anon:224544kB inactive_anon:36kB active_file:1748kB inactive_file:2688kB unevictable:0kB writepending:100kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2688kB pagetables:2616kB bounce:0kB free_pcp:1040kB local_pcp:248kB free_cma:0kB [ 963.662964] lowmem_reserve[]: 0 0 4426 4426 [ 963.667275] Node 0 Normal free:48144kB min:41208kB low:51508kB high:61808kB active_anon:397356kB inactive_anon:276kB active_file:1928kB inactive_file:660kB unevictable:0kB writepending:16kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2808kB bounce:0kB free_pcp:1340kB local_pcp:668kB free_cma:0kB [ 963.696685] lowmem_reserve[]: 0 0 0 0 [ 963.700484] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 963.713691] Node 0 DMA32: 875*4kB (UMH) 5688*8kB (UM) 1313*16kB (UM) 472*32kB (UM) 273*64kB (UM) 119*128kB (UM) 44*256kB (M) 2*512kB (UM) 1*1024kB (U) 0*2048kB 0*4096kB = 131132kB [ 963.729863] Node 0 Normal: 5552*4kB (UMEH) 2096*8kB (UMEH) 346*16kB (UMEH) 47*32kB (UMEH) 21*64kB (UM) 10*128kB (UM) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 48640kB [ 963.745167] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 963.753739] 1850 total pagecache pages [ 963.757605] 0 pages in swap cache [ 963.761039] Swap cache stats: add 0, delete 0, find 0/0 [ 963.766389] Free swap = 0kB [ 963.769393] Total swap = 0kB [ 963.772395] 1965969 pages RAM [ 963.775489] 0 pages HighMem/MovableOnly [ 963.779440] 106316 pages reserved 23:20:08 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:08 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:08 executing program 6: gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:08 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:08 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:08 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50236}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:08 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:09 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:09 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) [ 964.301517] audit: type=1326 audit(1529709609.297:2133): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25283 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:09 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:09 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:09 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:09 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:09 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:09 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:09 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:09 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:10 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) 23:20:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50236}]}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50236}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:10 executing program 1: gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:10 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) [ 965.251571] audit: type=1326 audit(1529709610.250:2134): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25338 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:10 executing program 1: gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:10 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50236}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:10 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:10 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50236}]}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:10 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:10 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:10 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50236}]}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:11 executing program 1: gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50236}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:11 executing program 5: seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:11 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:11 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:11 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:11 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) [ 966.419685] audit: type=1326 audit(1529709611.418:2135): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25416 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) [ 966.532744] audit: type=1326 audit(1529709611.480:2136): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25417 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:11 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:11 executing program 7: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:11 executing program 4: add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:11 executing program 1: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x500f1}]}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:11 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:11 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:11 executing program 7: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:11 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) [ 966.832679] audit: type=1326 audit(1529709611.831:2137): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25450 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:12 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:12 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:12 executing program 4: add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:12 executing program 7: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) [ 967.361110] audit: type=1326 audit(1529709612.359:2138): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25469 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 967.429807] audit: type=1326 audit(1529709612.428:2139): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25482 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:12 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:12 executing program 4: add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:12 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:12 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:12 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:12 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:12 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) [ 967.827735] audit: type=1326 audit(1529709612.825:2140): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25513 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:13 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) gettid() ptrace$peekuser(0x3, 0x0, 0x0) 23:20:13 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:13 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002400)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f00000023c0)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 23:20:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000080)}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:13 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) [ 968.291143] audit: type=1326 audit(1529709613.289:2141): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25519 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 968.387536] audit: type=1326 audit(1529709613.379:2142): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25533 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:13 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:13 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:13 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:13 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:13 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) gettid() getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}, &(0x7f0000000180)=0xb0) 23:20:13 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:13 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) [ 968.785992] audit: type=1326 audit(1529709613.784:2143): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25561 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 968.826362] audit: type=1326 audit(1529709613.807:2144): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25564 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:14 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x500f1}]}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:14 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:14 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:14 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:14 executing program 2: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:14 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:14 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:14 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:14 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:14 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:14 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:15 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:15 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:15 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:15 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) [ 970.487904] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 970.498540] syz-executor3 cpuset=syz3 mems_allowed=0 [ 970.503654] CPU: 1 PID: 25659 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 970.510480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 970.519847] Call Trace: [ 970.522451] dump_stack+0x185/0x1d0 [ 970.526073] warn_alloc+0x430/0x690 [ 970.529697] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 970.534540] ? kernel_poison_pages+0x40/0x360 [ 970.539027] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 970.544468] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 970.549399] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 970.554425] ? kmsan_set_origin_inline+0x6b/0x120 [ 970.559253] ? __msan_poison_alloca+0x15c/0x1d0 [ 970.563913] kmsan_alloc_page+0x82/0xe0 [ 970.567877] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 970.572636] ? kmsan_set_origin_inline+0x6b/0x120 [ 970.577465] ? __msan_poison_alloca+0x15c/0x1d0 [ 970.582130] ? __should_failslab+0x278/0x2a0 [ 970.587598] ? should_fail+0x57/0xab0 [ 970.591540] ? __should_failslab+0x278/0x2a0 [ 970.596064] ? kmsan_set_origin_inline+0x6b/0x120 [ 970.606115] ? __msan_poison_alloca+0x15c/0x1d0 [ 970.610775] ? kmsan_set_origin+0x9e/0x160 [ 970.615002] alloc_pages_vma+0x1555/0x17f0 [ 970.619228] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 970.624322] handle_mm_fault+0x44ca/0x7ed0 [ 970.628544] ? kmsan_set_origin_inline+0x6b/0x120 [ 970.633381] __do_page_fault+0xec6/0x1a10 [ 970.637535] do_page_fault+0xb7/0x250 [ 970.641321] ? page_fault+0x8/0x30 [ 970.644852] page_fault+0x1e/0x30 [ 970.648287] RIP: 0033:0x4075fa [ 970.651477] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 970.656844] RAX: 0000000020000a00 RBX: 0000000000000000 RCX: 0000000000000001 [ 970.664099] RDX: 55626a35b0ed2fec RSI: 0000000000000000 RDI: 0000000000c04848 [ 970.671353] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 970.678610] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ed217 [ 970.686039] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 970.693303] Mem-Info: [ 970.695716] active_anon:155471 inactive_anon:77 isolated_anon:0 [ 970.695716] active_file:1153 inactive_file:1267 isolated_file:0 [ 970.695716] unevictable:0 dirty:16 writeback:0 unstable:0 [ 970.695716] slab_reclaimable:3348 slab_unreclaimable:9468 [ 970.695716] mapped:67265 shmem:84 pagetables:1269 bounce:0 [ 970.695716] free:42879 free_pcp:403 free_cma:0 [ 970.728789] Node 0 active_anon:621884kB inactive_anon:308kB active_file:4612kB inactive_file:5068kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:269060kB dirty:64kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 268288kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 970.756618] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 970.782732] lowmem_reserve[]: 0 2817 7244 7244 [ 970.787304] Node 0 DMA32 free:107540kB min:26224kB low:32780kB high:39336kB active_anon:224540kB inactive_anon:32kB active_file:1636kB inactive_file:4372kB unevictable:0kB writepending:64kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2496kB pagetables:2268kB bounce:0kB free_pcp:360kB local_pcp:108kB free_cma:0kB [ 970.816555] lowmem_reserve[]: 0 0 4426 4426 [ 970.820865] Node 0 Normal free:48072kB min:41208kB low:51508kB high:61808kB active_anon:397344kB inactive_anon:276kB active_file:2860kB inactive_file:696kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2808kB bounce:0kB free_pcp:1252kB local_pcp:736kB free_cma:0kB [ 970.850100] lowmem_reserve[]: 0 0 0 0 [ 970.853892] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 970.867109] Node 0 DMA32: 585*4kB (UMH) 5479*8kB (UM) 1163*16kB (UM) 373*32kB (UM) 200*64kB (UM) 91*128kB (UM) 25*256kB (UM) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 107564kB [ 970.882495] Node 0 Normal: 5220*4kB (UMEH) 2105*8kB (UMEH) 345*16kB (UMEH) 49*32kB (UMEH) 23*64kB (UM) 12*128kB (UM) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 48072kB [ 970.898145] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 970.906702] 2508 total pagecache pages [ 970.910616] 0 pages in swap cache [ 970.914070] Swap cache stats: add 0, delete 0, find 0/0 [ 970.919415] Free swap = 0kB [ 970.922422] Total swap = 0kB [ 970.925418] 1965969 pages RAM [ 970.928501] 0 pages HighMem/MovableOnly [ 970.932723] 106316 pages reserved 23:20:15 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:15 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) seccomp(0x0, 0x0, &(0x7f00000001c0)={0x0, &(0x7f0000000040)}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040), 0x4) 23:20:15 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:16 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:16 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) syncfs(0xffffffffffffffff) 23:20:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) syncfs(0xffffffffffffffff) 23:20:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:16 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x6}]}) gettid() ioctl$VT_RELDISP(0xffffffffffffffff, 0x5605) 23:20:16 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) syncfs(0xffffffffffffffff) 23:20:16 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) [ 971.562786] kauditd_printk_skb: 8 callbacks suppressed [ 971.562808] audit: type=1326 audit(1529709616.561:2153): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25710 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:16 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) socket$inet(0x2, 0x0, 0x0) 23:20:16 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:17 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) ioctl$TCSETSW(0xffffffffffffffff, 0x5403, &(0x7f00000001c0)) 23:20:17 executing program 0: ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:17 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000001440)={'filter\x00'}, &(0x7f00000014c0)=0x54) 23:20:17 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) socket$inet(0x2, 0x0, 0x0) 23:20:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50257}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:17 executing program 0: ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) [ 972.075005] audit: type=1326 audit(1529709617.073:2154): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25735 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:17 executing program 0: ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) [ 972.207060] audit: type=1326 audit(1529709617.205:2155): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25749 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:17 executing program 3: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:17 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) [ 972.319229] audit: type=1326 audit(1529709617.317:2156): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25756 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:17 executing program 3: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:17 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) socket$inet(0x2, 0x0, 0x0) 23:20:17 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:17 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:17 executing program 3: socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:17 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:18 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:18 executing program 6: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:18 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000700)) prctl$getreaper(0x0, &(0x7f0000000040)) 23:20:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:18 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000700)) prctl$getreaper(0x0, &(0x7f0000000040)) 23:20:18 executing program 6: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:18 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) [ 973.388852] audit: type=1326 audit(1529709618.387:2157): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25815 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:18 executing program 3: seccomp(0x0, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x200005009c}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:18 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:18 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000700)) prctl$getreaper(0x0, &(0x7f0000000040)) 23:20:18 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x0, &(0x7f00000000c0)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:18 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:18 executing program 6: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:18 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:18 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f00000000c0)}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:19 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000080)=0x6e) 23:20:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x0, &(0x7f00000000c0)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:19 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:19 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x0, &(0x7f00000000c0)}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) [ 974.325641] audit: type=1326 audit(1529709619.323:2158): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25889 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:19 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:19 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:19 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:19 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:19 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:19 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:19 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x200005009c}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x40000000050256}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:20 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:20 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:20 executing program 6: seccomp(0x0, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50255}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x200005009c}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x200005009c}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:20 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:20 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:20 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:20 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) [ 975.485821] audit: type=1326 audit(1529709620.484:2159): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25951 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:20 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:20 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:20 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:20 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:20 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) [ 975.729505] audit: type=1326 audit(1529709620.728:2160): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=25978 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:20 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:20 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:20 executing program 1: accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:20 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:20 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:21 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:21 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:21 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:21 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x0, &(0x7f00000000c0)}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) [ 976.475024] audit: type=1326 audit(1529709621.473:2161): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26025 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:21 executing program 5: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:21 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:21 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:21 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:21 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:21 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:21 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50255}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:21 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 976.755665] audit: type=1326 audit(1529709621.754:2162): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26046 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:21 executing program 1: seccomp(0x0, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6, 0x0, 0x0, 0x50029}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:22 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) syncfs(0xffffffffffffffff) 23:20:22 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:22 executing program 7: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50255}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:22 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) [ 977.446958] audit: type=1326 audit(1529709622.445:2163): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26078 comm="syz-executor0" exe="/root/syz-executor0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:22 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000a00)={0x1, &(0x7f00000000c0)=[{0x6}]}) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000080), &(0x7f0000000100)=0x14) 23:20:22 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:22 executing program 4: seccomp(0x0, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d7}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:22 executing program 7: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:22 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x50255}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:22 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:22 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) [ 977.744622] audit: type=1326 audit(1529709622.743:2164): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26099 comm="syz-executor3" exe="/root/syz-executor3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:22 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:23 executing program 7: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:23 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:23 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x0, &(0x7f0000000540)}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:23 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') 23:20:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) [ 978.397793] audit: type=1326 audit(1529709623.396:2165): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26122 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:23 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) semget$private(0x0, 0x0, 0x0) 23:20:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000280)}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:23 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50029}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:23 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:23 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:23 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) 23:20:23 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:23 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) [ 978.949946] audit: type=1326 audit(1529709623.948:2166): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26166 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 979.455196] syz-executor4: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 979.465731] syz-executor4 cpuset=syz4 mems_allowed=0 [ 979.470869] CPU: 1 PID: 26177 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 979.477734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.487096] Call Trace: [ 979.489701] dump_stack+0x185/0x1d0 [ 979.493346] warn_alloc+0x430/0x690 [ 979.496998] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 979.501870] ? kernel_poison_pages+0x40/0x360 [ 979.506376] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 979.511832] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 979.516769] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 979.521703] ? kmsan_set_origin_inline+0x6b/0x120 [ 979.526545] ? __msan_poison_alloca+0x15c/0x1d0 [ 979.531207] kmsan_alloc_page+0x82/0xe0 [ 979.535173] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 979.539944] ? should_fail+0x57/0xab0 [ 979.543727] ? __should_failslab+0x278/0x2a0 [ 979.548136] ? __msan_poison_alloca+0x15c/0x1d0 [ 979.552795] ? kmsan_set_origin+0x9e/0x160 [ 979.557024] alloc_pages_vma+0x1555/0x17f0 [ 979.561253] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 979.566348] handle_mm_fault+0x44ca/0x7ed0 [ 979.570590] ? kmsan_set_origin_inline+0x6b/0x120 [ 979.575518] __do_page_fault+0xec6/0x1a10 [ 979.579656] do_page_fault+0xb7/0x250 [ 979.583441] ? page_fault+0x8/0x30 [ 979.587063] page_fault+0x1e/0x30 [ 979.590526] RIP: 0033:0x4075fa [ 979.593700] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 979.599050] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 [ 979.606323] RDX: 64875bfaa44c3dc5 RSI: 0000000000000000 RDI: 00000000013c6848 [ 979.613589] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 979.620843] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ef51e [ 979.628114] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 979.635376] Mem-Info: [ 979.637786] active_anon:154987 inactive_anon:76 isolated_anon:0 [ 979.637786] active_file:593 inactive_file:1756 isolated_file:0 [ 979.637786] unevictable:0 dirty:3 writeback:0 unstable:0 [ 979.637786] slab_reclaimable:3331 slab_unreclaimable:9454 [ 979.637786] mapped:66961 shmem:84 pagetables:1232 bounce:0 [ 979.637786] free:36289 free_pcp:390 free_cma:0 [ 979.670691] Node 0 active_anon:619948kB inactive_anon:304kB active_file:2372kB inactive_file:7024kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:267844kB dirty:12kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 979.698610] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 979.724741] lowmem_reserve[]: 0 2817 7244 7244 [ 979.729316] Node 0 DMA32 free:78716kB min:26224kB low:32780kB high:39336kB active_anon:222604kB inactive_anon:28kB active_file:1188kB inactive_file:6720kB unevictable:0kB writepending:12kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2560kB pagetables:2120kB bounce:0kB free_pcp:248kB local_pcp:128kB free_cma:0kB [ 979.758477] lowmem_reserve[]: 0 0 4426 4426 [ 979.762798] Node 0 Normal free:50536kB min:41208kB low:51508kB high:61808kB active_anon:397344kB inactive_anon:276kB active_file:836kB inactive_file:600kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2808kB bounce:0kB free_pcp:1312kB local_pcp:620kB free_cma:0kB [ 979.792849] lowmem_reserve[]: 0 0 0 0 [ 979.796667] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 979.809870] Node 0 DMA32: 5*4kB (UH) 4958*8kB (M) 978*16kB (UM) 251*32kB (UM) 122*64kB (UM) 43*128kB (UM) 3*256kB (UM) 0*512kB 1*1024kB (U) 0*2048kB 0*4096kB = 78468kB [ 979.824994] Node 0 Normal: 5769*4kB (UMEH) 2208*8kB (UMEH) 382*16kB (UMEH) 52*32kB (UMEH) 17*64kB (UMH) 5*128kB (MH) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 50244kB [ 979.840303] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 979.848944] 2461 total pagecache pages [ 979.852808] 0 pages in swap cache [ 979.856244] Swap cache stats: add 0, delete 0, find 0/0 [ 979.861586] Free swap = 0kB [ 979.864598] Total swap = 0kB [ 979.867596] 1965969 pages RAM [ 979.870680] 0 pages HighMem/MovableOnly [ 979.874632] 106316 pages reserved [ 979.879703] audit: type=1326 audit(1529709624.878:2167): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26178 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 979.881453] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 979.909853] syz-executor3 cpuset=syz3 mems_allowed=0 [ 979.914976] CPU: 1 PID: 26180 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 979.921814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 979.931179] Call Trace: [ 979.933784] dump_stack+0x185/0x1d0 [ 979.937430] warn_alloc+0x430/0x690 [ 979.941165] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 979.946036] ? kernel_poison_pages+0x40/0x360 [ 979.950541] ? __msan_metadata_ptr_for_store_8+0x13/0x20 23:20:24 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) 23:20:24 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:24 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) 23:20:24 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50029}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:24 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) 23:20:24 executing program 7: seccomp(0x0, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:24 executing program 2: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) [ 979.956014] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 979.960968] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 979.965913] ? kmsan_set_origin_inline+0x6b/0x120 [ 979.970763] ? __msan_poison_alloca+0x15c/0x1d0 [ 979.975449] kmsan_alloc_page+0x82/0xe0 [ 979.979434] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 979.984202] ? should_fail+0x57/0xab0 [ 979.988002] ? __should_failslab+0x278/0x2a0 [ 979.992417] ? __msan_poison_alloca+0x15c/0x1d0 [ 979.997097] ? kmsan_set_origin+0x9e/0x160 [ 980.001342] alloc_pages_vma+0x1555/0x17f0 23:20:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d7}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) [ 980.005627] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 980.010754] handle_mm_fault+0x44ca/0x7ed0 [ 980.015003] ? kmsan_set_origin_inline+0x6b/0x120 [ 980.019868] __do_page_fault+0xec6/0x1a10 [ 980.024121] do_page_fault+0xb7/0x250 [ 980.027937] ? page_fault+0x8/0x30 [ 980.031485] page_fault+0x1e/0x30 [ 980.034937] RIP: 0033:0x4075fa [ 980.038121] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 980.043487] RAX: 0000000020007ff0 RBX: 0000000000000000 RCX: 0000000000000001 [ 980.050759] RDX: 55626a35b0ed2fec RSI: 0000000000000000 RDI: 0000000000c04848 23:20:25 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x0, 0x0, 0x0, 0x50029}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) [ 980.058028] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 980.065298] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000ef6c9 [ 980.072571] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 23:20:25 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) [ 980.247936] audit: type=1326 audit(1529709625.246:2168): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26200 comm="syz-executor5" exe="/root/syz-executor5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:25 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) 23:20:25 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:25 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x6}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000300)=0xc) socket$inet(0x2, 0x0, 0x0) [ 980.505459] audit: type=1326 audit(1529709625.504:2169): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26216 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:25 executing program 2: seccomp(0x0, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) [ 980.598014] audit: type=1326 audit(1529709625.595:2170): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26224 comm="syz-executor6" exe="/root/syz-executor6" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:25 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) [ 980.747826] audit: type=1326 audit(1529709625.746:2171): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26210 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:25 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) 23:20:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x0, &(0x7f0000000280)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:25 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:26 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) 23:20:26 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) 23:20:26 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x0, &(0x7f0000000040)}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:26 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:26 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:26 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000040)) 23:20:26 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) [ 981.586725] kworker/u4:6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 981.598123] kworker/u4:6 cpuset=/ mems_allowed=0 [ 981.603125] CPU: 1 PID: 712 Comm: kworker/u4:6 Not tainted 4.17.0+ #9 [ 981.609739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.619167] Workqueue: events_unbound call_usermodehelper_exec_work [ 981.625614] Call Trace: [ 981.628266] dump_stack+0x185/0x1d0 [ 981.631942] warn_alloc+0x430/0x690 [ 981.635665] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 981.640588] ? __msan_poison_alloca+0x15c/0x1d0 [ 981.645348] copy_process+0x778/0x9be0 [ 981.649283] ? update_load_avg+0x1bd6/0x2cc0 [ 981.649756] syz-executor5: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 981.653733] ? proc_cap_handler+0x6a0/0x6a0 [ 981.653770] ? __msan_poison_alloca+0x140/0x1d0 [ 981.665194] syz-executor5 cpuset= [ 981.669393] _do_fork+0x353/0xf60 [ 981.669445] ? proc_cap_handler+0x6a0/0x6a0 [ 981.669476] kernel_thread+0xc6/0xe0 [ 981.669511] ? proc_cap_handler+0x6a0/0x6a0 [ 981.674188] syz5 [ 981.677645] call_usermodehelper_exec_work+0x146/0x520 [ 981.681095] mems_allowed=0 [ 981.685399] ? __list_del_entry_valid+0x123/0x440 [ 981.685434] ? process_one_work+0x1290/0x1fa0 [ 981.712918] ? call_usermodehelper_setup+0x4d0/0x4d0 [ 981.718051] process_one_work+0x12e4/0x1fa0 [ 981.722417] worker_thread+0x113c/0x24f0 [ 981.726508] kthread+0x4db/0x6c0 [ 981.729884] ? process_one_work+0x1fa0/0x1fa0 [ 981.734412] ? kthread_blkcg+0xf0/0xf0 [ 981.738668] ret_from_fork+0x35/0x40 [ 981.742410] CPU: 0 PID: 4548 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 981.742462] warn_alloc_show_mem: 1 callbacks suppressed [ 981.742469] Mem-Info: [ 981.749362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 981.749374] Call Trace: [ 981.749414] dump_stack+0x185/0x1d0 [ 981.749454] warn_alloc+0x430/0x690 [ 981.754978] active_anon:154949 inactive_anon:79 isolated_anon:0 [ 981.754978] active_file:874 inactive_file:1391 isolated_file:38 [ 981.754978] unevictable:0 dirty:8 writeback:0 unstable:0 [ 981.754978] slab_reclaimable:3329 slab_unreclaimable:9451 [ 981.754978] mapped:67065 shmem:83 pagetables:1252 bounce:0 [ 981.754978] free:35797 free_pcp:171 free_cma:0 [ 981.757358] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 981.757416] ? __msan_poison_alloca+0x15c/0x1d0 [ 981.766828] Node 0 active_anon:619796kB inactive_anon:316kB active_file:3496kB inactive_file:5564kB unevictable:0kB isolated(anon):0kB isolated(file):152kB mapped:268260kB dirty:32kB writeback:0kB shmem:332kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 981.769417] copy_process+0x778/0x9be0 [ 981.769467] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 981.773105] Node 0 [ 981.776736] ? filemap_map_pages+0x1a5a/0x1ac0 [ 981.776831] ? kmsan_set_origin_inline+0x6b/0x120 [ 981.809867] DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 981.814656] ? handle_mm_fault+0x1eb0/0x7ed0 [ 981.814692] ? __msan_poison_alloca+0x141/0x1d0 [ 981.819354] lowmem_reserve[]: [ 981.847570] _do_fork+0x353/0xf60 [ 981.847615] __x64_sys_clone+0x15e/0x1b0 [ 981.851495] 0 [ 981.856847] ? __ia32_sys_vfork+0x70/0x70 [ 981.856870] do_syscall_64+0x15b/0x230 [ 981.856911] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 981.859140] 2817 [ 981.863694] RIP: 0033:0x45414a [ 981.863709] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 981.868588] 7244 [ 981.894082] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 981.894098] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 981.894113] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000000a7e940 [ 981.894127] R10: 0000000000a7ec10 R11: 0000000000000246 R12: 0000000000000001 [ 981.894154] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 981.898573] 7244 [ 981.983449] Node 0 DMA32 free:76436kB min:26224kB low:32780kB high:39336kB active_anon:222064kB inactive_anon:32kB active_file:2260kB inactive_file:6460kB unevictable:0kB writepending:44kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2496kB pagetables:2260kB bounce:0kB free_pcp:688kB local_pcp:116kB free_cma:0kB [ 982.012775] lowmem_reserve[]: 0 0 4426 4426 [ 982.017249] Node 0 Normal free:51132kB min:41208kB low:51508kB high:61808kB active_anon:397344kB inactive_anon:276kB active_file:620kB inactive_file:340kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2808kB bounce:0kB free_pcp:120kB local_pcp:0kB free_cma:0kB [ 982.046313] lowmem_reserve[]: 0 0 0 0 [ 982.050248] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 982.063719] Node 0 DMA32: 321*4kB (UMH) 4836*8kB (UME) 966*16kB (UME) 250*32kB (UME) 118*64kB (UME) 41*128kB (ME) 1*256kB (E) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 76484kB 23:20:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) [ 982.079413] Node 0 Normal: 5843*4kB (UMEH) 2263*8kB (UMEH) 404*16kB (UMEH) 57*32kB (UMEH) 10*64kB (UMH) 7*128kB (UH) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51300kB [ 982.095000] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 982.103677] 2447 total pagecache pages [ 982.107649] 0 pages in swap cache [ 982.111182] Swap cache stats: add 0, delete 0, find 0/0 [ 982.116621] Free swap = 0kB [ 982.119712] Total swap = 0kB [ 982.122799] 1965969 pages RAM [ 982.125973] 0 pages HighMem/MovableOnly [ 982.130013] 106316 pages reserved 23:20:27 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) [ 982.190293] syz-executor1: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 982.201966] syz-executor1 cpuset=syz1 mems_allowed=0 [ 982.207251] CPU: 0 PID: 26267 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 982.214122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 982.223513] Call Trace: [ 982.226158] dump_stack+0x185/0x1d0 [ 982.229836] warn_alloc+0x430/0x690 [ 982.233535] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 982.238448] ? __msan_poison_alloca+0x15c/0x1d0 [ 982.243214] copy_process+0x778/0x9be0 [ 982.247164] ? __msan_poison_alloca+0x15c/0x1d0 [ 982.251895] ? handle_mm_fault+0x74eb/0x7ed0 [ 982.256370] ? handle_mm_fault+0x74eb/0x7ed0 [ 982.260851] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 982.266293] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 982.272346] ? handle_mm_fault+0x1eb0/0x7ed0 [ 982.276814] ? __msan_poison_alloca+0x140/0x1d0 [ 982.281565] _do_fork+0x353/0xf60 [ 982.285088] __x64_sys_clone+0x15e/0x1b0 [ 982.289202] ? __ia32_sys_vfork+0x70/0x70 [ 982.293396] do_syscall_64+0x15b/0x230 [ 982.297343] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 982.302567] RIP: 0033:0x458429 [ 982.305899] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 982.313660] RAX: ffffffffffffffda RBX: 00007f7306983700 RCX: 0000000000458429 [ 982.320965] RDX: 00007f73069839d0 RSI: 00007f7306982db0 RDI: 00000000003d0f00 [ 982.328278] RBP: 0000000000a3e8a0 R08: 00007f7306983700 R09: 00007f7306983700 [ 982.335591] R10: 00007f73069839d0 R11: 0000000000000202 R12: 0000000000000000 [ 982.342901] R13: 0000000000a3e81f R14: 00007f73069839c0 R15: 0000000000000000 [ 982.353139] audit: type=1326 audit(1529709627.350:2172): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26271 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) 23:20:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:27 executing program 1: seccomp(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000540)=[{0x6}]}) accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast1}, &(0x7f0000000100)=0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'team0\x00'}) 23:20:27 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) 23:20:27 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) [ 982.655467] audit: type=1326 audit(1529709627.654:2173): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26288 comm="syz-executor1" exe="/root/syz-executor1" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:27 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:27 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) 23:20:27 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x0, 0x501d1}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) [ 982.828466] device bridge_slave_1 left promiscuous mode [ 982.834405] bridge0: port 2(bridge_slave_1) entered disabled state 23:20:27 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) [ 982.935736] device bridge_slave_0 left promiscuous mode [ 982.941672] bridge0: port 1(bridge_slave_0) entered disabled state 23:20:28 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6}]}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/67, 0x43) 23:20:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x50257}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) 23:20:28 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) 23:20:28 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x500ee}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) semop(0x0, &(0x7f0000000040), 0x0) 23:20:28 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) [ 983.161002] audit: type=1326 audit(1529709628.159:2174): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26316 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) [ 983.222659] team0 (unregistering): Port device team_slave_1 removed [ 983.256258] audit: type=1326 audit(1529709628.209:2175): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26325 comm="syz-executor4" exe="/root/syz-executor4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 23:20:28 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) [ 983.295137] team0 (unregistering): Port device team_slave_0 removed 23:20:28 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) [ 983.353796] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 983.375047] audit: type=1326 audit(1529709628.373:2176): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26332 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 983.439835] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 983.546935] bond0 (unregistering): Released all slaves 23:20:28 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) 23:20:28 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) 23:20:28 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) 23:20:28 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 23:20:28 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) 23:20:28 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) [ 983.795942] syz-executor0: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 983.806494] syz-executor0 cpuset=syz0 mems_allowed=0 [ 983.811624] CPU: 0 PID: 26352 Comm: syz-executor0 Not tainted 4.17.0+ #9 [ 983.818469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 983.827831] Call Trace: [ 983.830428] dump_stack+0x185/0x1d0 [ 983.834060] warn_alloc+0x430/0x690 [ 983.838747] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 983.843595] ? kernel_poison_pages+0x40/0x360 [ 983.848104] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 983.853561] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 983.858521] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 983.863563] ? kmsan_set_origin_inline+0x6b/0x120 [ 983.868431] kmsan_alloc_page+0x82/0xe0 [ 983.872423] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 983.877199] ? kmsan_set_origin_inline+0x6b/0x120 [ 983.882066] ? __msan_poison_alloca+0x15c/0x1d0 [ 983.886836] ? __should_failslab+0x278/0x2a0 [ 983.891258] ? should_fail+0x57/0xab0 23:20:28 executing program 3: socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) [ 983.895072] ? __should_failslab+0x278/0x2a0 [ 983.899499] ? kmsan_set_origin_inline+0x6b/0x120 [ 983.904444] ? __msan_poison_alloca+0x15c/0x1d0 [ 983.909128] ? kmsan_set_origin+0x9e/0x160 [ 983.913410] alloc_pages_vma+0x1555/0x17f0 [ 983.917667] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 983.922822] handle_mm_fault+0x44ca/0x7ed0 [ 983.927091] ? kmsan_set_origin_inline+0x6b/0x120 [ 983.931969] __do_page_fault+0xec6/0x1a10 [ 983.937969] do_page_fault+0xb7/0x250 [ 983.941797] ? page_fault+0x8/0x30 [ 983.945370] page_fault+0x1e/0x30 [ 983.948836] RIP: 0033:0x4075fa [ 983.952031] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 983.957403] RAX: 0000000020000180 RBX: 0000000000000000 RCX: 0000000000000001 [ 983.964687] RDX: 3e28e215ea4e1bb2 RSI: 0000000000000000 RDI: 0000000001d98848 [ 983.972053] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 983.979344] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f0612 [ 983.986641] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 983.993930] warn_alloc_show_mem: 2 callbacks suppressed [ 983.993933] Mem-Info: [ 984.001732] active_anon:155013 inactive_anon:76 isolated_anon:5 [ 984.001732] active_file:1280 inactive_file:1245 isolated_file:0 [ 984.001732] unevictable:0 dirty:43 writeback:0 unstable:0 [ 984.001732] slab_reclaimable:3329 slab_unreclaimable:9371 [ 984.001732] mapped:66497 shmem:84 pagetables:1339 bounce:0 [ 984.001732] free:36736 free_pcp:450 free_cma:0 [ 984.034847] Node 0 active_anon:620052kB inactive_anon:304kB active_file:4876kB inactive_file:4812kB unevictable:0kB isolated(anon):20kB isolated(file):128kB mapped:267960kB dirty:172kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 984.063136] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 984.089275] lowmem_reserve[]: 0 2817 7244 7244 [ 984.093883] Node 0 DMA32 free:69792kB min:26224kB low:32780kB high:39336kB active_anon:222724kB inactive_anon:28kB active_file:4004kB inactive_file:4528kB unevictable:0kB writepending:156kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2368kB pagetables:2436kB bounce:0kB free_pcp:884kB local_pcp:260kB free_cma:0kB [ 984.123151] lowmem_reserve[]: 0 0 4426 4426 [ 984.127491] Node 0 Normal free:51420kB min:41208kB low:51508kB high:61808kB active_anon:397344kB inactive_anon:276kB active_file:652kB inactive_file:464kB unevictable:0kB writepending:16kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7296kB pagetables:2920kB bounce:0kB free_pcp:840kB local_pcp:184kB free_cma:0kB [ 984.156676] lowmem_reserve[]: 0 0 0 0 [ 984.160492] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 984.173743] Node 0 DMA32: 466*4kB (UMH) 3338*8kB (UM) 542*16kB (UM) 182*32kB (M) 99*64kB (UM) 47*128kB (UM) 15*256kB (M) 13*512kB (M) 5*1024kB (M) 0*2048kB 0*4096kB = 71032kB [ 984.189512] Node 0 Normal: 5695*4kB (UMEH) 2285*8kB (UMEH) 401*16kB (UMEH) 55*32kB (UMEH) 18*64kB (UMH) 10*128kB (UH) 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51668kB [ 984.204936] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 984.213513] 1847 total pagecache pages [ 984.217400] 0 pages in swap cache [ 984.220854] Swap cache stats: add 0, delete 0, find 0/0 [ 984.226215] Free swap = 0kB [ 984.229230] Total swap = 0kB [ 984.232242] 1965969 pages RAM [ 984.235341] 0 pages HighMem/MovableOnly [ 984.239302] 106316 pages reserved [ 984.280047] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 984.290855] udevd cpuset=/ mems_allowed=0 [ 984.295207] CPU: 1 PID: 2595 Comm: udevd Not tainted 4.17.0+ #9 [ 984.301295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.310684] Call Trace: [ 984.313335] dump_stack+0x185/0x1d0 [ 984.317013] warn_alloc+0x430/0x690 [ 984.320718] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 984.325661] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.330436] copy_process+0x778/0x9be0 [ 984.334372] ? expand_files+0x5b/0xe00 [ 984.338327] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 984.343737] ? expand_files+0xa6/0xe00 [ 984.347701] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 984.353125] ? find_next_zero_bit+0x12b/0x2f0 [ 984.357696] ? __msan_poison_alloca+0x141/0x1d0 [ 984.362425] _do_fork+0x353/0xf60 [ 984.365925] __x64_sys_clone+0x15e/0x1b0 [ 984.369998] ? __ia32_sys_vfork+0x70/0x70 [ 984.374149] do_syscall_64+0x15b/0x230 [ 984.378058] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.383263] RIP: 0033:0x7f22358d4f46 [ 984.386975] RSP: 002b:00007ffea5cb33b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 984.394696] RAX: ffffffffffffffda RBX: 00007ffea5cb33b0 RCX: 00007f22358d4f46 [ 984.402065] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 984.409345] RBP: 00007ffea5cb3410 R08: 0000000000000a23 R09: 0000000000000a23 [ 984.416619] R10: 00007f22361f1a70 R11: 0000000000000246 R12: 0000000000000000 23:20:29 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 23:20:29 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) [ 984.423895] R13: 00007ffea5cb33d0 R14: 0000000000000005 R15: 0000000000000005 23:20:29 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) 23:20:29 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) unlink(&(0x7f00000002c0)='./file0\x00') [ 984.535485] syz-executor5: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 984.547023] syz-executor5 cpuset=/ mems_allowed=0 [ 984.552131] CPU: 1 PID: 26324 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 984.559002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.568392] Call Trace: [ 984.571052] dump_stack+0x185/0x1d0 [ 984.574737] warn_alloc+0x430/0x690 [ 984.578447] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 984.583372] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.588394] copy_process+0x778/0x9be0 [ 984.592355] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.597094] ? handle_mm_fault+0x74eb/0x7ed0 [ 984.601612] ? handle_mm_fault+0x74eb/0x7ed0 [ 984.606107] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 984.611538] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 984.617576] ? handle_mm_fault+0x1eb0/0x7ed0 [ 984.622164] ? __msan_poison_alloca+0x141/0x1d0 [ 984.626919] _do_fork+0x353/0xf60 [ 984.630453] __x64_sys_clone+0x15e/0x1b0 [ 984.634580] ? __ia32_sys_vfork+0x70/0x70 [ 984.638777] do_syscall_64+0x15b/0x230 [ 984.642727] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.647955] RIP: 0033:0x458429 [ 984.651176] RSP: 002b:00007ffe310f7d18 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 984.658932] RAX: ffffffffffffffda RBX: 00007ffe310f7dd0 RCX: 0000000000458429 [ 984.666243] RDX: 434f503a30656c69 RSI: 0000000000a3ffb0 RDI: 0000000030000000 [ 984.673551] RBP: 0000000000000000 R08: 000000000000001a R09: 000000000000001a [ 984.680860] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000411910 [ 984.688169] R13: 00000000004119a0 R14: 0000000000000000 R15: 0000000000000000 [ 984.830293] syz-executor3: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 984.841801] syz-executor3 cpuset=syz3 mems_allowed=0 [ 984.847128] CPU: 1 PID: 26365 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 984.854001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 984.863392] Call Trace: [ 984.866048] dump_stack+0x185/0x1d0 [ 984.869751] warn_alloc+0x430/0x690 [ 984.873532] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 984.878467] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.883248] copy_process+0x778/0x9be0 [ 984.887206] ? __msan_poison_alloca+0x15c/0x1d0 [ 984.891948] ? handle_mm_fault+0x74eb/0x7ed0 [ 984.896428] ? handle_mm_fault+0x74eb/0x7ed0 [ 984.901008] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 984.906473] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 984.912618] ? handle_mm_fault+0x1eb0/0x7ed0 [ 984.917096] ? __msan_poison_alloca+0x140/0x1d0 [ 984.921893] _do_fork+0x353/0xf60 [ 984.925432] __x64_sys_clone+0x15e/0x1b0 [ 984.929553] ? __ia32_sys_vfork+0x70/0x70 [ 984.933742] do_syscall_64+0x15b/0x230 [ 984.937692] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 984.942932] RIP: 0033:0x458429 [ 984.946140] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 984.953911] RAX: ffffffffffffffda RBX: 00007fab2a222700 RCX: 0000000000458429 [ 984.961238] RDX: 00007fab2a2229d0 RSI: 00007fab2a221db0 RDI: 00000000003d0f00 [ 984.968534] RBP: 0000000000a3e8a0 R08: 00007fab2a222700 R09: 00007fab2a222700 [ 984.975840] R10: 00007fab2a2229d0 R11: 0000000000000202 R12: 0000000000000000 [ 984.983396] R13: 0000000000a3e81f R14: 00007fab2a2229c0 R15: 0000000000000000 [ 987.986133] IPVS: ftp: loaded support on port[0] = 21 [ 988.913991] bridge0: port 1(bridge_slave_0) entered blocking state [ 988.920577] bridge0: port 1(bridge_slave_0) entered disabled state [ 988.928232] device bridge_slave_0 entered promiscuous mode [ 988.971647] bridge0: port 2(bridge_slave_1) entered blocking state [ 988.978156] bridge0: port 2(bridge_slave_1) entered disabled state [ 988.985638] device bridge_slave_1 entered promiscuous mode [ 989.024543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 989.068963] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 989.185921] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 989.228557] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 989.416021] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 989.423638] team0: Port device team_slave_0 added [ 989.463190] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 989.470795] team0: Port device team_slave_1 added [ 989.511135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 989.555654] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 989.596330] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 989.638451] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 990.063024] bridge0: port 2(bridge_slave_1) entered blocking state [ 990.069601] bridge0: port 2(bridge_slave_1) entered forwarding state [ 990.076432] bridge0: port 1(bridge_slave_0) entered blocking state [ 990.082898] bridge0: port 1(bridge_slave_0) entered forwarding state [ 990.090649] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 990.751244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 991.848900] 8021q: adding VLAN 0 to HW filter on device bond0 [ 992.393657] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 992.774436] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 992.780912] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 992.793438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 993.427732] 8021q: adding VLAN 0 to HW filter on device team0 23:20:42 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) unlink(&(0x7f00000002c0)='./file0\x00') 23:20:42 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) 23:20:42 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) 23:20:42 executing program 0: seccomp(0x0, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) 23:20:42 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:42 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) 23:20:42 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x500ee}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) semop(0x0, &(0x7f0000000040), 0x0) 23:20:42 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) 23:20:42 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) 23:20:43 executing program 4: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5025c}]}) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) unlink(&(0x7f00000002c0)='./file0\x00') [ 998.112548] audit: type=1326 audit(1529709643.111:2177): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26636 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 998.431779] syz-executor6: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 998.443830] syz-executor6 cpuset=syz6 mems_allowed=0 [ 998.449334] CPU: 0 PID: 4544 Comm: syz-executor6 Not tainted 4.17.0+ #9 [ 998.456126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.465520] Call Trace: [ 998.468180] dump_stack+0x185/0x1d0 [ 998.471871] warn_alloc+0x430/0x690 [ 998.475604] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 998.480536] ? __msan_poison_alloca+0x15c/0x1d0 [ 998.485328] copy_process+0x778/0x9be0 [ 998.489290] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 998.494744] ? filemap_map_pages+0x1a5a/0x1ac0 [ 998.499405] ? kmsan_set_origin_inline+0x6b/0x120 [ 998.504345] ? handle_mm_fault+0x1eb0/0x7ed0 [ 998.508815] ? __msan_poison_alloca+0x141/0x1d0 [ 998.513572] _do_fork+0x353/0xf60 [ 998.517105] __x64_sys_clone+0x15e/0x1b0 [ 998.521228] ? __ia32_sys_vfork+0x70/0x70 [ 998.525427] do_syscall_64+0x15b/0x230 [ 998.529390] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 998.534618] RIP: 0033:0x45414a [ 998.537841] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 998.545603] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 998.552909] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 998.560228] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 0000000001c57940 [ 998.567540] R10: 0000000001c57c10 R11: 0000000000000246 R12: 0000000000000001 [ 998.574864] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 998.582764] warn_alloc_show_mem: 3 callbacks suppressed [ 998.582773] Mem-Info: [ 998.591444] active_anon:152693 inactive_anon:75 isolated_anon:0 [ 998.591444] active_file:125 inactive_file:142 isolated_file:50 [ 998.591444] unevictable:0 dirty:3 writeback:0 unstable:0 [ 998.591444] slab_reclaimable:3277 slab_unreclaimable:9453 [ 998.591444] mapped:65706 shmem:84 pagetables:1159 bounce:0 [ 998.591444] free:36121 free_pcp:62 free_cma:0 [ 998.624847] Node 0 active_anon:610772kB inactive_anon:300kB active_file:500kB inactive_file:916kB unevictable:0kB isolated(anon):0kB isolated(file):200kB mapped:262824kB dirty:12kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 998.653376] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 998.680135] lowmem_reserve[]: 0 2817 7244 7244 [ 998.685345] Node 0 DMA32 free:76596kB min:26224kB low:32780kB high:39336kB active_anon:217672kB inactive_anon:24kB active_file:112kB inactive_file:1104kB unevictable:0kB writepending:12kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:1984kB pagetables:1880kB bounce:0kB free_pcp:656kB local_pcp:124kB free_cma:0kB [ 998.715258] lowmem_reserve[]: 0 0 4426 4426 [ 998.720138] Node 0 Normal free:51400kB min:41208kB low:51508kB high:61808kB active_anon:392752kB inactive_anon:276kB active_file:184kB inactive_file:428kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7360kB pagetables:2756kB bounce:0kB free_pcp:280kB local_pcp:0kB free_cma:0kB [ 998.749723] lowmem_reserve[]: 0 0 0 0 [ 998.754140] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 998.768126] Node 0 DMA32: 1144*4kB (UMEH) 4118*8kB (UM) 555*16kB (UME) 173*32kB (UME) 79*64kB (UME) 28*128kB (ME) 4*256kB (ME) 5*512kB (UME) 4*1024kB (ME) 4*2048kB (M) 0*4096kB = 76448kB [ 998.785534] Node 0 Normal: 5249*4kB (UME) 2061*8kB (UMEH) 458*16kB (UMEH) 85*32kB (UMEH) 32*64kB (UMH) 12*128kB (UH) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51372kB [ 998.801969] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 998.811681] 849 total pagecache pages [ 998.815788] 0 pages in swap cache [ 998.819741] Swap cache stats: add 0, delete 0, find 0/0 [ 998.825999] Free swap = 0kB [ 998.829147] Total swap = 0kB [ 998.830253] syz-executor4: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 998.832238] 1965969 pages RAM [ 998.843571] syz-executor4 cpuset= [ 998.846704] 0 pages HighMem/MovableOnly [ 998.846708] syz4 mems_allowed=0 [ 998.850199] 106316 pages reserved [ 998.852352] audit: type=1326 audit(1529709643.814:2178): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26644 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 998.854342] CPU: 1 PID: 4546 Comm: syz-executor4 Not tainted 4.17.0+ #9 [ 998.854355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 998.854366] Call Trace: [ 998.854412] dump_stack+0x185/0x1d0 [ 998.854445] warn_alloc+0x430/0x690 [ 998.854511] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 998.854566] ? __msan_poison_alloca+0x15c/0x1d0 [ 998.916670] copy_process+0x778/0x9be0 [ 998.917356] syz-executor5: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 998.920615] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 998.920650] ? ptep_set_access_flags+0x10e/0x1d0 [ 998.920683] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 998.920742] ? handle_mm_fault+0x1eb0/0x7ed0 [ 998.920781] ? __msan_poison_alloca+0x141/0x1d0 [ 998.932101] syz-executor5 cpuset= [ 998.937540] _do_fork+0x353/0xf60 [ 998.937586] __x64_sys_clone+0x15e/0x1b0 [ 998.942354] syz5 [ 998.947772] ? __ia32_sys_vfork+0x70/0x70 [ 998.952226] mems_allowed=0 [ 998.956830] do_syscall_64+0x15b/0x230 [ 998.956866] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 998.956894] RIP: 0033:0x45414a [ 998.989103] RSP: 002b:0000000000a3ea70 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 998.996836] RAX: ffffffffffffffda RBX: 0000000000a3ea70 RCX: 000000000045414a [ 999.004130] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 999.011411] RBP: 0000000000a3eab0 R08: 0000000000000001 R09: 00000000013c6940 [ 999.018693] R10: 00000000013c6c10 R11: 0000000000000246 R12: 0000000000000001 [ 999.025978] R13: 0000000000000000 R14: 0000000000000000 R15: 00000000007024c0 [ 999.033288] CPU: 0 PID: 26640 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 999.040176] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.049563] Call Trace: [ 999.052210] dump_stack+0x185/0x1d0 [ 999.055880] warn_alloc+0x430/0x690 [ 999.059600] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 999.064520] ? __msan_poison_alloca+0x15c/0x1d0 [ 999.069293] copy_process+0x778/0x9be0 [ 999.073243] ? __msan_poison_alloca+0x15c/0x1d0 [ 999.077945] ? handle_mm_fault+0x74eb/0x7ed0 [ 999.082384] ? handle_mm_fault+0x74eb/0x7ed0 [ 999.086825] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 999.092225] ? lru_cache_add_active_or_unevictable+0x3da/0x5f0 [ 999.098234] ? handle_mm_fault+0x1eb0/0x7ed0 [ 999.102662] ? __msan_poison_alloca+0x140/0x1d0 [ 999.107373] _do_fork+0x353/0xf60 [ 999.110858] __x64_sys_clone+0x15e/0x1b0 [ 999.114935] ? __ia32_sys_vfork+0x70/0x70 [ 999.119097] do_syscall_64+0x15b/0x230 [ 999.123009] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 999.128206] RIP: 0033:0x458429 23:20:43 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) [ 999.131398] RSP: 002b:0000000000a3e768 EFLAGS: 00000202 ORIG_RAX: 0000000000000038 [ 999.139122] RAX: ffffffffffffffda RBX: 00007ff96ba71700 RCX: 0000000000458429 [ 999.146399] RDX: 00007ff96ba719d0 RSI: 00007ff96ba70db0 RDI: 00000000003d0f00 [ 999.153680] RBP: 0000000000a3e8a0 R08: 00007ff96ba71700 R09: 00007ff96ba71700 [ 999.160956] R10: 00007ff96ba719d0 R11: 0000000000000202 R12: 0000000000000000 [ 999.168237] R13: 0000000000a3e81f R14: 00007ff96ba719c0 R15: 0000000000000000 23:20:44 executing program 3: seccomp(0x0, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0x0, 0x50011}]}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) 23:20:44 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000040)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000240)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, 0x0, 0x0, 0x0, 0x0, {0x3}}, 0x14}, 0x1}, 0x0) 23:20:44 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x500ee}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) semop(0x0, &(0x7f0000000040), 0x0) [ 999.547250] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 999.557816] syz-executor1 cpuset=syz1 mems_allowed=0 [ 999.562957] CPU: 1 PID: 26664 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 999.569815] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 999.579534] Call Trace: [ 999.582140] dump_stack+0x185/0x1d0 [ 999.585874] warn_alloc+0x430/0x690 [ 999.589529] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 999.594390] ? kernel_poison_pages+0x40/0x360 [ 999.598907] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 999.604381] ? kmsan_set_origin_inline+0x6b/0x120 [ 999.609294] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 999.614249] ? kmsan_set_origin_inline+0x6b/0x120 [ 999.619104] ? __msan_poison_alloca+0x15c/0x1d0 [ 999.623808] kmsan_alloc_page+0x82/0xe0 [ 999.627808] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 999.632587] ? kmsan_set_origin_inline+0x6b/0x120 [ 999.637472] ? __msan_poison_alloca+0x15c/0x1d0 [ 999.642251] ? __should_failslab+0x278/0x2a0 [ 999.646678] ? should_fail+0x57/0xab0 [ 999.650494] ? __should_failslab+0x278/0x2a0 [ 999.654921] ? kmsan_set_origin_inline+0x6b/0x120 [ 999.659783] ? __msan_poison_alloca+0x15c/0x1d0 [ 999.664504] ? kmsan_set_origin+0x9e/0x160 [ 999.668758] alloc_pages_vma+0x1555/0x17f0 [ 999.673009] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 999.678120] handle_mm_fault+0x44ca/0x7ed0 [ 999.682346] ? kmsan_set_origin_inline+0x6b/0x120 [ 999.687201] __do_page_fault+0xec6/0x1a10 [ 999.691356] do_page_fault+0xb7/0x250 [ 999.695180] ? page_fault+0x8/0x30 [ 999.698706] page_fault+0x1e/0x30 [ 999.702142] RIP: 0033:0x4075fa [ 999.705317] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 999.710678] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 999.717933] RDX: 32e5d57804fc5662 RSI: 0000000000000000 RDI: 00000000024d7848 [ 999.725201] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 999.732472] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f4399 [ 999.739726] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 999.746986] warn_alloc_show_mem: 2 callbacks suppressed [ 999.746989] Mem-Info: [ 999.754746] active_anon:153307 inactive_anon:75 isolated_anon:0 [ 999.754746] active_file:939 inactive_file:1441 isolated_file:0 [ 999.754746] unevictable:0 dirty:2 writeback:0 unstable:0 [ 999.754746] slab_reclaimable:3279 slab_unreclaimable:9448 [ 999.754746] mapped:58966 shmem:84 pagetables:1207 bounce:0 [ 999.754746] free:55608 free_pcp:294 free_cma:0 [ 999.788936] Node 0 active_anon:613228kB inactive_anon:300kB active_file:3756kB inactive_file:5764kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:235864kB dirty:8kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 266240kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 999.816683] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 999.842815] lowmem_reserve[]: 0 2817 7244 7244 [ 999.847404] Node 0 DMA32 free:155060kB min:26224kB low:32780kB high:39336kB active_anon:220376kB inactive_anon:24kB active_file:3420kB inactive_file:5756kB unevictable:0kB writepending:4kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2432kB pagetables:2024kB bounce:0kB free_pcp:636kB local_pcp:176kB free_cma:0kB [ 999.876555] lowmem_reserve[]: 0 0 4426 4426 [ 999.880872] Node 0 Normal free:51468kB min:41208kB low:51508kB high:61808kB active_anon:392768kB inactive_anon:276kB active_file:520kB inactive_file:0kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7424kB pagetables:2804kB bounce:0kB free_pcp:540kB local_pcp:104kB free_cma:0kB [ 999.909766] lowmem_reserve[]: 0 0 0 0 [ 999.913563] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 999.926766] Node 0 DMA32: 545*4kB (UMEH) 4410*8kB (UME) 1256*16kB (UM) 823*32kB (UME) 672*64kB (UME) 66*128kB (UME) 17*256kB (UME) 16*512kB (UME) 7*1024kB (UME) 0*2048kB 0*4096kB = 155060kB [ 999.943833] Node 0 Normal: 5326*4kB (MEH) 1983*8kB (UMEH) 463*16kB (UMEH) 84*32kB (UMEH) 37*64kB (UMH) 12*128kB (UH) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51424kB [ 999.959482] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 999.968039] 2512 total pagecache pages [ 999.971907] 0 pages in swap cache [ 999.975340] Swap cache stats: add 0, delete 0, find 0/0 [ 999.980680] Free swap = 0kB [ 999.983674] Total swap = 0kB [ 999.986675] 1965969 pages RAM [ 999.989770] 0 pages HighMem/MovableOnly [ 999.993720] 106316 pages reserved 23:20:45 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000300)={0x1, &(0x7f0000000280)=[{0x6}]}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000340)={'filter\x00', 0x7, 0x4, 0x458, 0x140, 0x0, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000140), {[{{@arp={@remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac=@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'syzkaller1\x00', 'rose0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback=0x7f000001, @multicast1=0xe0000001}}}, {{@arp={@local={0xac, 0x14, 0x14, 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x0, @empty, {}, @mac, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond0\x00', 'bond_slave_1\x00'}, 0xf0, 0x118}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2}}, {{@uncond, 0xf0, 0x118}, @unspec=@MARK={0x28, 'MARK\x00', 0x2}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x4a8) [ 1000.033521] device bridge_slave_1 left promiscuous mode [ 1000.039597] bridge0: port 2(bridge_slave_1) entered disabled state [ 1000.054370] audit: type=1326 audit(1529709645.053:2179): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26660 comm="syz-executor2" exe="/root/syz-executor2" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1000.093837] syz-executor7: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1000.104368] syz-executor7 cpuset=syz7 mems_allowed=0 [ 1000.109497] CPU: 0 PID: 26671 Comm: syz-executor7 Not tainted 4.17.0+ #9 [ 1000.116338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.125690] Call Trace: [ 1000.128277] dump_stack+0x185/0x1d0 [ 1000.131893] warn_alloc+0x430/0x690 [ 1000.135519] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1000.140347] ? kernel_poison_pages+0x40/0x360 [ 1000.144829] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1000.150264] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1000.155195] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 1000.160119] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.164951] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.169626] kmsan_alloc_page+0x82/0xe0 [ 1000.173586] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1000.178332] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.183164] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.187818] ? __should_failslab+0x278/0x2a0 [ 1000.192218] ? should_fail+0x57/0xab0 [ 1000.196000] ? __should_failslab+0x278/0x2a0 [ 1000.200392] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.205219] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.209879] ? kmsan_set_origin+0x9e/0x160 [ 1000.214123] alloc_pages_vma+0x1555/0x17f0 [ 1000.218350] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1000.223446] handle_mm_fault+0x44ca/0x7ed0 [ 1000.227667] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.232505] __do_page_fault+0xec6/0x1a10 [ 1000.236643] do_page_fault+0xb7/0x250 [ 1000.240438] ? page_fault+0x8/0x30 [ 1000.243982] page_fault+0x1e/0x30 [ 1000.247419] RIP: 0033:0x4075fa [ 1000.250944] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1000.256307] RAX: 0000000020000300 RBX: 0000000000000000 RCX: 0000000000000001 [ 1000.263562] RDX: bf7ff7ac8bf812a5 RSI: 0000000000000000 RDI: 000000000236d848 [ 1000.270819] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1000.278072] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f45b8 [ 1000.285328] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 23:20:45 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) [ 1000.301886] device bridge_slave_0 left promiscuous mode [ 1000.307689] bridge0: port 1(bridge_slave_0) entered disabled state [ 1000.323504] audit: type=1326 audit(1529709645.321:2180): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=26671 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455a99 code=0x0 [ 1000.351307] syz-executor3: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1000.361839] syz-executor3 cpuset=syz3 mems_allowed=0 [ 1000.366971] CPU: 1 PID: 26675 Comm: syz-executor3 Not tainted 4.17.0+ #9 [ 1000.373822] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.383185] Call Trace: [ 1000.385791] dump_stack+0x185/0x1d0 [ 1000.389442] warn_alloc+0x430/0x690 [ 1000.393095] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1000.397952] ? kernel_poison_pages+0x40/0x360 [ 1000.402467] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1000.407937] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1000.412904] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 1000.417887] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.422750] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.427451] kmsan_alloc_page+0x82/0xe0 [ 1000.431444] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1000.436220] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.441079] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.445765] ? __should_failslab+0x278/0x2a0 23:20:45 executing program 6: seccomp(0x1, 0x0, &(0x7f0000000600)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x5008b}]}) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000380)) 23:20:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) [ 1000.450193] ? should_fail+0x57/0xab0 [ 1000.454006] ? __should_failslab+0x278/0x2a0 [ 1000.458426] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.463280] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.467956] ? kmsan_set_origin+0x9e/0x160 [ 1000.472215] alloc_pages_vma+0x1555/0x17f0 [ 1000.476473] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1000.481600] handle_mm_fault+0x44ca/0x7ed0 [ 1000.485847] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.490808] __do_page_fault+0xec6/0x1a10 [ 1000.494993] do_page_fault+0xb7/0x250 [ 1000.498796] ? page_fault+0x8/0x30 23:20:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) [ 1000.502363] page_fault+0x1e/0x30 [ 1000.505820] RIP: 0033:0x4075fa [ 1000.509005] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1000.514364] RAX: 0000000020007ff0 RBX: 0000000000000000 RCX: 0000000000000000 [ 1000.521634] RDX: 55626a35b0ed2fec RSI: 0000000000000000 RDI: 0000000000c04848 [ 1000.528907] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1000.536185] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f46bf [ 1000.543469] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 23:20:45 executing program 2: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x40000000050256}]}) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f0000000040)) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000240)) 23:20:45 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50257}]}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) [ 1000.659936] team0 (unregistering): Port device team_slave_1 removed [ 1000.677926] team0 (unregistering): Port device team_slave_0 removed 23:20:45 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) [ 1000.714386] syz-executor1: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1000.724923] syz-executor1 cpuset=syz1 mems_allowed=0 [ 1000.730051] CPU: 1 PID: 26686 Comm: syz-executor1 Not tainted 4.17.0+ #9 [ 1000.736888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1000.746248] Call Trace: [ 1000.748860] dump_stack+0x185/0x1d0 [ 1000.752508] warn_alloc+0x430/0x690 [ 1000.756159] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1000.761011] ? kernel_poison_pages+0x40/0x360 [ 1000.765522] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1000.770990] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1000.775961] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 1000.780922] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.785780] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.790474] kmsan_alloc_page+0x82/0xe0 [ 1000.794470] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1000.799244] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.804106] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.808797] ? kmem_cache_alloc+0x997/0xb70 [ 1000.813137] ? ___slab_alloc+0xc1/0x1f50 [ 1000.817198] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.822050] ? __msan_poison_alloca+0x15c/0x1d0 [ 1000.826745] ? kmsan_set_origin+0x9e/0x160 [ 1000.830989] alloc_pages_vma+0x1555/0x17f0 [ 1000.835243] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1000.840361] handle_mm_fault+0x44ca/0x7ed0 [ 1000.844588] ? kmsan_set_origin_inline+0x6b/0x120 [ 1000.849429] __do_page_fault+0xec6/0x1a10 [ 1000.853574] do_page_fault+0xb7/0x250 [ 1000.857363] ? page_fault+0x8/0x30 [ 1000.860892] page_fault+0x1e/0x30 [ 1000.864343] RIP: 0033:0x4075fa [ 1000.867519] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1000.872874] RAX: 0000000020000100 RBX: 0000000000000000 RCX: 0000000000000001 [ 1000.880135] RDX: 32e5d57804fc5662 RSI: 0000000000000000 RDI: 00000000024d7848 [ 1000.887394] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1000.894682] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f4829 [ 1000.901938] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1000.909201] warn_alloc_show_mem: 2 callbacks suppressed [ 1000.909203] Mem-Info: [ 1000.917062] active_anon:153379 inactive_anon:76 isolated_anon:0 [ 1000.917062] active_file:1237 inactive_file:1543 isolated_file:0 [ 1000.917062] unevictable:0 dirty:19 writeback:0 unstable:0 [ 1000.917062] slab_reclaimable:3277 slab_unreclaimable:9456 [ 1000.917062] mapped:63272 shmem:84 pagetables:1209 bounce:0 [ 1000.917062] free:42859 free_pcp:422 free_cma:0 [ 1000.950150] Node 0 active_anon:613516kB inactive_anon:304kB active_file:4948kB inactive_file:6172kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:253088kB dirty:76kB writeback:0kB shmem:336kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 268288kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 1000.977990] Node 0 DMA free:15904kB min:144kB low:180kB high:216kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15904kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 1001.004195] lowmem_reserve[]: 0 2817 7244 7244 [ 1001.008864] Node 0 DMA32 free:104108kB min:26224kB low:32780kB high:39336kB active_anon:220736kB inactive_anon:20kB active_file:4552kB inactive_file:6300kB unevictable:0kB writepending:76kB present:3129292kB managed:2889508kB mlocked:0kB kernel_stack:2560kB pagetables:1936kB bounce:0kB free_pcp:692kB local_pcp:136kB free_cma:0kB [ 1001.038113] lowmem_reserve[]: 0 0 4426 4426 [ 1001.042429] Node 0 Normal free:51424kB min:41208kB low:51508kB high:61808kB active_anon:392824kB inactive_anon:284kB active_file:304kB inactive_file:24kB unevictable:0kB writepending:0kB present:4718592kB managed:4533200kB mlocked:0kB kernel_stack:7360kB pagetables:2900kB bounce:0kB free_pcp:996kB local_pcp:512kB free_cma:0kB [ 1001.071403] lowmem_reserve[]: 0 0 0 0 [ 1001.075196] Node 0 DMA: 0*4kB 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15904kB [ 1001.088410] Node 0 DMA32: 29*4kB (UMEH) 3342*8kB (UME) 529*16kB (UM) 164*32kB (ME) 549*64kB (UME) 66*128kB (UME) 17*256kB (UME) 16*512kB (UME) 7*1024kB (UME) 0*2048kB 0*4096kB = 103860kB [ 1001.105262] Node 0 Normal: 5326*4kB (MEH) 1983*8kB (UMEH) 463*16kB (UMEH) 84*32kB (UMEH) 36*64kB (UMH) 14*128kB (UH) 1*256kB (U) 0*512kB 0*1024kB 0*2048kB 0*4096kB = 51616kB [ 1001.120904] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 1001.129461] 2925 total pagecache pages [ 1001.133329] 0 pages in swap cache [ 1001.136761] Swap cache stats: add 0, delete 0, find 0/0 [ 1001.142115] Free swap = 0kB [ 1001.145111] Total swap = 0kB [ 1001.148111] 1965969 pages RAM [ 1001.151193] 0 pages HighMem/MovableOnly [ 1001.155143] 106316 pages reserved 23:20:46 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x500ee}]}) openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x0, 0x0) semop(0x0, &(0x7f0000000040), 0x0) [ 1001.184387] bond0 (unregistering): Releasing backup interface bond_slave_1 23:20:46 executing program 0: seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x0, 0x0, 0x0, 0x50215}]}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) [ 1001.247223] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1001.275710] syz-executor5: page allocation failure: order:9, mode:0x3080020(GFP_ATOMIC|0x2000000), nodemask=(null) [ 1001.286261] syz-executor5 cpuset=syz5 mems_allowed=0 [ 1001.291387] CPU: 0 PID: 26692 Comm: syz-executor5 Not tainted 4.17.0+ #9 [ 1001.298223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.307665] Call Trace: [ 1001.310266] dump_stack+0x185/0x1d0 [ 1001.313910] warn_alloc+0x430/0x690 [ 1001.317556] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1001.322404] ? kernel_poison_pages+0x40/0x360 [ 1001.326911] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 1001.332370] ? __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1001.337327] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 1001.342273] ? kmsan_set_origin_inline+0x6b/0x120 [ 1001.347126] ? __msan_poison_alloca+0x15c/0x1d0 [ 1001.351811] kmsan_alloc_page+0x82/0xe0 [ 1001.355785] __alloc_pages_nodemask+0xf7b/0x5cc0 [ 1001.360543] ? kmsan_set_origin_inline+0x6b/0x120 [ 1001.365383] ? __msan_poison_alloca+0x15c/0x1d0 [ 1001.370053] ? __should_failslab+0x278/0x2a0 [ 1001.374474] ? should_fail+0x57/0xab0 [ 1001.378274] ? __should_failslab+0x278/0x2a0 [ 1001.382680] ? kmsan_set_origin_inline+0x6b/0x120 [ 1001.387514] ? __msan_poison_alloca+0x15c/0x1d0 [ 1001.392191] ? kmsan_set_origin+0x9e/0x160 [ 1001.396447] alloc_pages_vma+0x1555/0x17f0 [ 1001.400680] do_huge_pmd_anonymous_page+0xbdd/0x2540 [ 1001.405787] handle_mm_fault+0x44ca/0x7ed0 [ 1001.410031] ? kmsan_set_origin_inline+0x6b/0x120 [ 1001.414882] __do_page_fault+0xec6/0x1a10 [ 1001.419032] do_page_fault+0xb7/0x250 [ 1001.422835] ? page_fault+0x8/0x30 [ 1001.426384] page_fault+0x1e/0x30 [ 1001.429827] RIP: 0033:0x4075fa [ 1001.433002] RSP: 002b:0000000000a3e940 EFLAGS: 00010246 [ 1001.438353] RAX: 0000000020000000 RBX: 0000000000000000 RCX: 0000000000000001 23:20:46 executing program 3: seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x0, &(0x7f0000000280)}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000140)) ioctl$BLKROGET(0xffffffffffffffff, 0x125e, &(0x7f00000003c0)) [ 1001.445614] RDX: bef6a644419656f8 RSI: 0000000000000000 RDI: 00000000017c7848 [ 1001.452875] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000730028 [ 1001.460137] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000000f4a5b [ 1001.467411] R13: 0000000000000002 R14: 0000000000a3f160 R15: 0000000000000001 [ 1001.526894] kthreadd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1001.537955] kthreadd cpuset=/ mems_allowed=0 [ 1001.541222] udevd: page allocation failure: order:4, mode:0x15080c0(GFP_KERNEL_ACCOUNT|__GFP_ZERO), nodemask=(null) [ 1001.542581] CPU: 1 PID: 2 Comm: kthreadd Not tainted 4.17.0+ #9 [ 1001.553415] udevd cpuset= [ 1001.559143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.559156] Call Trace: [ 1001.559196] dump_stack+0x185/0x1d0 [ 1001.559234] warn_alloc+0x430/0x690 [ 1001.562014] / [ 1001.571378] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1001.573965] mems_allowed=0 [ 1001.577579] ? __msan_poison_alloca+0x15c/0x1d0 [ 1001.577644] copy_process+0x778/0x9be0 [ 1001.599211] ? __list_add_valid+0xb8/0x450 [ 1001.603462] ? pick_next_task_fair+0x22c9/0x2530 [ 1001.608320] ? kthread_blkcg+0xf0/0xf0 [ 1001.612220] ? __msan_poison_alloca+0x140/0x1d0 [ 1001.616903] _do_fork+0x353/0xf60 [ 1001.620375] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1001.625766] ? balance_callback+0x48/0x260 [ 1001.630036] ? kthread_blkcg+0xf0/0xf0 [ 1001.633941] kernel_thread+0xc6/0xe0 [ 1001.637668] ? kthread_blkcg+0xf0/0xf0 [ 1001.641565] kthreadd+0x5df/0x940 [ 1001.645031] ? kthread_stop+0x680/0x680 [ 1001.649023] ret_from_fork+0x35/0x40 [ 1001.652941] CPU: 0 PID: 26648 Comm: udevd Not tainted 4.17.0+ #9 [ 1001.659115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.668524] Call Trace: [ 1001.671171] dump_stack+0x185/0x1d0 [ 1001.674851] warn_alloc+0x430/0x690 [ 1001.678557] __alloc_pages_nodemask+0x5b1c/0x5cc0 [ 1001.683485] ? __msan_poison_alloca+0x15c/0x1d0 [ 1001.688248] copy_process+0x778/0x9be0 [ 1001.690282] bond0 (unregistering): Released all slaves [ 1001.692170] ? expand_files+0x5b/0xe00 [ 1001.692215] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 1001.692248] ? expand_files+0xa6/0xe00 [ 1001.710695] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 1001.716118] ? find_next_zero_bit+0x12b/0x2f0 [ 1001.720681] ? __msan_poison_alloca+0x141/0x1d0 [ 1001.725411] _do_fork+0x353/0xf60 [ 1001.728929] __x64_sys_clone+0x15e/0x1b0 [ 1001.733053] ? __ia32_sys_vfork+0x70/0x70 [ 1001.737241] do_syscall_64+0x15b/0x230 [ 1001.741181] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 1001.746399] RIP: 0033:0x7f22358d4f46 [ 1001.750134] RSP: 002b:00007ffea5cb33b0 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1001.757890] RAX: ffffffffffffffda RBX: 00007ffea5cb33b0 RCX: 00007f22358d4f46 [ 1001.765192] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000001200011 [ 1001.772494] RBP: 00007ffea5cb3410 R08: 0000000000006818 R09: 0000000000006818 [ 1001.779798] R10: 00007f22361f1a70 R11: 0000000000000246 R12: 0000000000000000 [ 1001.787097] R13: 00007ffea5cb33d0 R14: 0000000000000005 R15: 0000000000000005 [ 1001.794886] BUG: unable to handle kernel NULL pointer dereference at 00000000000008cc [ 1001.802875] PGD 8000000083a0a067 P4D 8000000083a0a067 PUD 83a0d067 PMD 0 [ 1001.809825] Oops: 0002 [#1] SMP PTI [ 1001.813453] Dumping ftrace buffer: [ 1001.816988] (ftrace buffer empty) [ 1001.820694] Modules linked in: [ 1001.823903] CPU: 0 PID: 2397 Comm: kworker/u4:0 Not tainted 4.17.0+ #9 [ 1001.830566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1001.839955] RIP: 0010:memset_erms+0x9/0x10 [ 1001.844190] RSP: 0018:ffff88016710fa50 EFLAGS: 00010046 [ 1001.849559] RAX: 0000000000000000 RBX: ffff8801d93b57c0 RCX: 0000000000000fb0 [ 1001.856868] RDX: 0000000000000fb0 RSI: 0000000000000000 RDI: 00000000000008cc [ 1001.864145] RBP: ffff88016710fa80 R08: 0000000000000000 R09: 00000000000008cc [ 1001.871420] R10: 0000000000000000 R11: ffffffff813553c0 R12: ffff8801d93b6098 [ 1001.878688] R13: 0000000000000000 R14: 0000000000000282 R15: fffffffffffffff4 [ 1001.885968] FS: 0000000000000000(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 1001.894190] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1001.900068] CR2: 00000000000000b0 CR3: 0000000083aa8000 CR4: 00000000001406f0 [ 1001.907336] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1001.914602] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1001.921862] Call Trace: [ 1001.924451] ? kmsan_thread_create+0x56/0xb0 [ 1001.928856] __kthread_create_on_node+0x6ba/0x7b0 [ 1001.933707] kthread_create_on_node+0x243/0x270 [ 1001.939583] ? process_one_work+0x1fa0/0x1fa0 [ 1001.944088] create_worker+0x7c6/0x1000 [ 1001.948071] worker_thread+0x876/0x24f0 [ 1001.952066] kthread+0x4db/0x6c0 [ 1001.955440] ? process_one_work+0x1fa0/0x1fa0 [ 1001.959947] ? kthread_blkcg+0xf0/0xf0 [ 1001.963844] ret_from_fork+0x35/0x40 [ 1001.967556] Code: 48 c1 e9 03 40 0f b6 f6 48 b8 01 01 01 01 01 01 01 01 48 0f af c6 f3 48 ab 89 d1 f3 aa 4c 89 c8 c3 90 49 89 f9 40 88 f0 48 89 d1 aa 4c 89 c8 c3 90 49 89 fa 40 0f b6 ce 48 b8 01 01 01 01 01 [ 1001.986753] RIP: memset_erms+0x9/0x10 RSP: ffff88016710fa50 [ 1001.992482] CR2: 00000000000008cc [ 1001.995947] ---[ end trace 821b1ebeacf91904 ]--- [ 1002.000700] Kernel panic - not syncing: Fatal exception [ 1002.006778] Dumping ftrace buffer: [ 1002.010425] (ftrace buffer empty) [ 1002.014135] Kernel Offset: disabled [ 1002.017750] Rebooting in 86400 seconds..