[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 10.160248] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 17.709066] random: crng init done Warning: Permanently added '10.128.10.54' (ECDSA) to the list of known hosts. 2018/09/30 07:48:38 fuzzer started 2018/09/30 07:48:40 dialing manager at 10.128.0.26:36411 2018/09/30 07:48:40 syscalls: 1 2018/09/30 07:48:40 code coverage: enabled 2018/09/30 07:48:40 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2018/09/30 07:48:40 setuid sandbox: enabled 2018/09/30 07:48:40 namespace sandbox: enabled 2018/09/30 07:48:40 Android sandbox: /sys/fs/selinux/policy does not exist 2018/09/30 07:48:40 fault injection: kernel does not have systematic fault injection support 2018/09/30 07:48:40 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/30 07:48:40 net packed injection: enabled 2018/09/30 07:48:40 net device setup: enabled 07:49:52 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000080)=[{{}, 0x4, 0x8}], 0x18) 07:49:52 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000040)) 07:49:52 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000440)=0x7, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000a88f88), 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000280), 0x4) write$binfmt_aout(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x3c2) sendto$inet(r0, &(0x7f0000004ac0)="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", 0xc44, 0x0, &(0x7f0000000180)={0x2, 0x1000000000001, @broadcast}, 0x10) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f00000002c0)=""/20, 0x14}, 0x100) 07:49:52 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x28001) write$evdev(r0, &(0x7f0000000140)=[{{}, 0x1, 0x48, 0x200000000000002}], 0x18) write$evdev(r0, &(0x7f0000000040)=[{{0x77359400}}], 0x18) 07:49:52 executing program 4: r0 = gettid() waitid(0x2, r0, &(0x7f0000000040), 0xb, &(0x7f0000000080)) 07:49:52 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) [ 109.427623] audit: type=1400 audit(1538293799.268:5): avc: denied { associate } for pid=2111 comm="syz-executor0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 07:49:59 executing program 2: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) read(r0, &(0x7f0000ec6000)=""/50, 0x32) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, &(0x7f000001cfb0)) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 07:49:59 executing program 2: prctl$intptr(0x1d, 0xfffffffffffff425) prctl$getreaper(0x40400000000001e, &(0x7f0000000200)) 07:49:59 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000dc9ff0)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r0, &(0x7f0000000100), 0x0, 0x20000000, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) 07:49:59 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) fallocate(r0, 0x1, 0x0, 0x10000101) 07:49:59 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x602, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) sendto$inet(r0, &(0x7f0000fd0000), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @local}, 0x10) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000380)="54dae1df5c05a171558fe01a1928924a60c5d2cfa9a637ac4cdbd27b28c3f703691859a7cc20884dca5d47dbc7dfc0f9c94d7d05c4a74e8904394aa0f73123ad19dea0fa25e45d8c3136069bd7037c4154fe0e6b492373276b6f37842b62354d010900000000000000b9d66703a0f2886fcb45390000000000000000000000000000", 0x82}], 0x1) sendto$inet(r0, &(0x7f0000000000)="c3", 0x1, 0x81, &(0x7f0000000040)={0x2, 0x0, @multicast2}, 0x10) writev(r0, &(0x7f000042a000)=[{&(0x7f00001e3f5a)='-', 0x1}], 0x1) sendto$inet(r0, &(0x7f0000000080)='&', 0x1, 0x0, 0x0, 0x0) 07:49:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 07:49:59 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x3a8}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x6, 0x1764}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000cc0)=ANY=[], 0x0) getsockname$unix(r1, &(0x7f00000001c0), &(0x7f0000000000)=0x6e) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000280)) write$cgroup_int(r0, &(0x7f0000000300), 0xfffffe8c) pwritev(r1, &(0x7f0000000100)=[{&(0x7f0000000040)="4d1f7ece3285f088f689dec5561ab9f6ddb92c955c75542e0a57b055c24a8699de2e6fe709c6d8807fe856e4eca5285a16566a978d120c9660feb38bacad9021de402bc9528fec8782e989ac3dd1c13db288ec1bf14ca025ebbd72c49ed80defc8b19a93eabf0c650af7d8598d635f173f36fa5ccd71a60a8a4b620fd4357fa3117defcbacc77591c830dff48bde", 0x8e}], 0x1, 0x0) 07:49:59 executing program 0: r0 = socket$inet(0x2, 0x7, 0x2) sendto$inet(r0, &(0x7f0000a88f88), 0x29f, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @loopback}, 0x10) 07:49:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = memfd_create(&(0x7f0000000140)='(\x00', 0x2) fdatasync(r2) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) setsockopt$inet_buf(r2, 0x0, 0x2f, &(0x7f0000000c80), 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) fcntl$addseals(r2, 0x409, 0x8) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) fsetxattr$security_ima(r1, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000200)=@md5={0x1, "1313b38f05d0a50cd53adea7b8d57b06"}, 0x11, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)) ioctl$KIOCSOUND(r2, 0x4b2f, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000100)="0e", 0x1}], 0x1) openat$cgroup_type(r2, &(0x7f0000000280)='cgroup.type\x00', 0x2, 0x0) 07:49:59 executing program 5: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100), 0x4) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x2) mount(&(0x7f00000000c0), &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000440)='cgroup.procs\x00', 0x2, 0x0) write$selinux_context(r0, &(0x7f0000000900)='system_u:object_r:mail_spool_t:s0\x00', 0x22) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000280)=""/208, 0x50}], 0x1, 0x0) ioctl$TIOCNXCL(r0, 0x540d) 07:49:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fV=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000120000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) write$P9_RSTATFS(r0, &(0x7f0000000100)={0x43, 0x9, 0x2, {0x1, 0x2, 0x0, 0x14dd, 0x9, 0xffffffff00000000, 0x3, 0x5, 0x5}}, 0x43) rename(&(0x7f0000000080)='./file1\x00', &(0x7f00000000c0)='./file0\x00') 07:49:59 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000140)=ANY=[@ANYBLOB="4bf5a0e04ce559c23cb5f78a45a6bd5f64d2c9c90eb23e6b177a8b0710df975eff87a93b1d14fafbf57ebbb2075f817c19d457648c7836a2105bc11c5497badb79cf942fdd164d8c051f42f4eef1dc03558610d748b501a8a74a8d08f824d35b290451ba53ec508742a8b2ab574d027e025fe210cf27db50dc5b4635f864bdffd45e82a695de2f0a3b782d5cc1"], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f00000003c0)) chroot(&(0x7f0000000100)='./file0\x00') umount2(&(0x7f0000000040)='./file0\x00', 0x0) 07:49:59 executing program 1: r0 = socket$packet(0x11, 0x40000000000002, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000903000)={0x1, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002e0000009700000000f4ff009500000000000000"], &(0x7f0000000200)="73797a6b616c6c65722c493d6c2b78db01beb8234b8301e2918b8b33e703f173263d15127d1c5309a0593d0f6dbe9cd5434619dfff6e61ba74ed3776315503f2d22b3ecd7a62819bc2345afd348344bed224a114267fd4cd1e55f8cf69c16cfffd3a4dc7721aacdfb55e39d507f86531752d2affc30318f5da65be34374a24f6", 0xfffffffffffffffa, 0x1000, &(0x7f00009ab000)=""/4096}, 0x48) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000140)=r1, 0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmmsg(r3, &(0x7f00000002c0), 0x400000000000174, 0x0) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x5b7ebd2a3c1ddcb9, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r2, 0x0, 0x1, &(0x7f00000002c0)='\x00', 0xffffffffffffffff}, 0x30) r6 = getpid() sendmsg$nl_route(r4, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000224}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)=@bridge_setlink={0x14c, 0x13, 0x308, 0x70bd2a, 0x25dfdbfc, {0x7, 0x0, 0x0, 0x0, 0x800, 0x1}, [@IFLA_PHYS_SWITCH_ID={0x18, 0x24, "c4929e67e0bbd8fcb63848a2e7f8fbac5647"}, @IFLA_NET_NS_PID={0x8, 0x13, r5}, @IFLA_NET_NS_PID={0x8, 0x13, r6}, @IFLA_XDP={0x104, 0x2b, [@typed={0xc, 0x33, @u64=0x10000}, @typed={0x8, 0x33, @fd=r0}, @nested={0xec, 0x60, [@typed={0x84, 0x5, @str="73797a6b616c6c65722c493d6c2b78db01beb8234b8301e2918b8b33e703f173263d15127d1c5309a0593d0f6dbe9cd5434619dfff6e61ba74ed3776315503f2d22b3ecd7a62819bc2345afd348344bed224a114267fd4cd1e55f8cf69c16cfffd3a4dc7721aacdfb55e39d507f86531752d2affc30318f5da65be34374a24f6"}, @typed={0x8, 0x63, @fd=r1}, @generic="8ca02bd286772a337280fefeaa9b01d13ee3193acc237d94c65db2876f8cc75b1d9f1fc384029f0985c4721ea8ae498679f4a03b146382b6fc61e1f9f0ffda58ec2259ee90f5e0f7a6315a5d31586e6dcb1175f8", @typed={0x8, 0x1a, @u32=0x6}]}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x8040}, 0x40000) 07:49:59 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)="7374617409c0d2febcf9df2deac8c177ff171248e91193513049f831550d6f7de66cf637bdbf1311920c8a26eda4dcc3783f9db5116b34d31b0512a5608aaff01e7952340cd6fd00000000", 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) chdir(&(0x7f0000000100)='./file0\x00') r2 = open(&(0x7f0000000180)='./file0\x00', 0x8000000000141042, 0xfffffffffffffffa) write$evdev(r2, &(0x7f0000000440)=[{{0x77359400}}], 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x10001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) [ 109.997199] hrtimer: interrupt took 62512 ns 07:49:59 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getsockopt$inet_int(r1, 0x0, 0x0, &(0x7f00006ed000), &(0x7f0000000080)=0x4) 07:49:59 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)="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", 0x0) ioctl$GIO_SCRNMAP(r1, 0x4b40, &(0x7f0000000740)=""/214) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000240), 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) ioctl$LOOP_CLR_FD(r0, 0x4c01) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000980)=ANY=[@ANYBLOB="0740237800870836956e3652350dde589eac3c8eff9422a53579d06ec2857f2b868d682809af65d0246e81a07319d51f00f3f91451a16f0bf4898016e61462cfe51700000000"], 0x1}, 0x1, 0x0, 0x0, 0x40000}, 0x0) close(r0) write$P9_RSTAT(r1, &(0x7f0000000a00)={0x163, 0x7d, 0x2, {0x0, 0x15c, 0x0, 0x70ed, {0x80, 0x1}, 0x1000000, 0x7, 0x697e, 0x1, 0x10, "73797374656d2a25f46b657972696e67", 0x10e, "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", 0x7, 'TPROXY\x00', 0x4, "2d28e42b"}}, 0x163) ftruncate(0xffffffffffffffff, 0x8000) r3 = open(&(0x7f000000fffa)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r3, 0x0) ioctl$BLKFLSBUF(r3, 0x1261, &(0x7f0000000500)) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x80402, 0x0) ioctl$EVIOCGABS3F(r2, 0x8018457f, &(0x7f0000000600)=""/113) [ 110.110225] audit: type=1400 audit(1538293799.958:6): avc: denied { prog_load } for pid=4828 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:50:00 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2000001, 0x31, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = memfd_create(&(0x7f0000000100)='loGPL\x00', 0x3) write$selinux_access(r1, &(0x7f0000000140)={'system_u:object_r:hald_acl_exec_t:s0', 0x20, 'unconfined', 0x20, 0x80000001}, 0x45) poll(&(0x7f0000000000)=[{r0, 0x10}, {r0, 0x81}, {r0, 0x100}], 0x3, 0x3) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000040), 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x8, &(0x7f0000000080)=[{0x8, 0x1, 0xc4, 0x3ff}, {0x2, 0x0, 0xffffffff, 0x3}, {0x35, 0x6, 0x9}, {0x0, 0x2, 0x1ff, 0x8}, {0x0, 0xe0000, 0x2, 0x6}, {0x2, 0x2, 0x0, 0x2}, {0x1, 0xfffffffffffffff7, 0x3, 0x4000000000000000}, {0x2, 0x1b, 0x6, 0x20}]}, 0x10) 07:50:00 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9917}, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f0000000380)={0x1, &(0x7f0000000340)=[{0xfffffffffffffffd, 0x8ae}]}) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) fcntl$getown(r0, 0x9) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000800), &(0x7f0000000700)="fc98f93c4380012577913e8dc1574b4f9d6df8ae0e3d", 0x16, 0x0) open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) setuid(0x0) keyctl$set_timeout(0xf, 0x0, 0x0) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x80000001ff) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c0000001900080c00eb0000ffdbdf25020034010000000f00000000"], 0x1c}}, 0x40000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f0000000500)='IPVS\x00') ioctl$IOC_PR_RESERVE(0xffffffffffffffff, 0x401070c9, &(0x7f0000000180)={0x0, 0x0, 0x1}) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, &(0x7f00000003c0)=""/12) [ 110.185785] audit: type=1400 audit(1538293800.028:7): avc: denied { prog_run } for pid=4828 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 07:50:00 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000003c0)={0x0, @rand_addr, @dev}, &(0x7f00000004c0)=0xc) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000500)={@ipv4={[], [], @local}, @empty, @ipv4, 0x9, 0x8000, 0x2, 0x100, 0x7, 0x0, r2}) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x200001, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000180)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) r5 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@local, @in=@rand_addr}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) r6 = socket$inet6(0xa, 0x0, 0x0) ioctl(r6, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x8dab}]}, 0x10) sendto$inet6(r5, &(0x7f0000000300), 0xfdb8, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r5, &(0x7f00000092c0), 0x4ff, 0x0) recvfrom$inet6(r5, &(0x7f0000000240)=""/118, 0x76, 0x40, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000180)) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000400)=""/187) 07:50:00 executing program 2: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000480)={0x10, 0xbb7f, 0x5a6b010000000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x0, 0x0, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000200)=0x7) socket$key(0xf, 0x3, 0x2) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000180)) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f00000001c0)={0x2, 0x2}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x80082, 0x0) ioctl$EVIOCGPHYS(r2, 0x80404507, &(0x7f00000004c0)=""/4096) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) setsockopt$inet6_mtu(r1, 0x29, 0x32, &(0x7f0000000000), 0x3cf) 07:50:00 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f0000000180)={0x10001}, 0x8, 0x80000) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000140)=0x10) [ 110.282654] audit: type=1400 audit(1538293800.098:8): avc: denied { create } for pid=4847 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 07:50:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f00000000c0), 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="02c511656f0000000000000000000000"], 0x10}}, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000014, &(0x7f0000000040)=0x1, 0x13e) recvmmsg(0xffffffffffffffff, &(0x7f0000001540)=[{{&(0x7f0000000680)=@pppoe, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000700)=""/57, 0x39}], 0x1, &(0x7f0000000c80)=""/196, 0xc4}}], 0x1, 0x0, &(0x7f00000016c0)) sendmmsg(r1, &(0x7f0000000040), 0x40000000000014b, 0x0) [ 110.337209] audit: type=1400 audit(1538293800.158:9): avc: denied { write } for pid=4847 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 07:50:00 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000140)='/dev/keychord\x00', 0x600, 0x0) ioctl$GIO_SCRNMAP(r0, 0x4b40, &(0x7f0000000180)=""/224) mmap(&(0x7f0000fea000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) capget(&(0x7f0000feaff9)={0x20080522}, &(0x7f0000000000)) syz_open_dev$rtc(&(0x7f0000000280)='/dev/rtc#\x00', 0x0, 0x80000) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$EVIOCGREP(r1, 0x80084503, &(0x7f0000000080)=""/174) 07:50:00 executing program 1: ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@mcast2, @in6=@remote}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) fallocate(r0, 0x20, 0x0, 0xfffffffeffd) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000040)={0x2, 0x2, 0x9, 0x9, 0xfffffffffffffff9, 0x54, 0x1, 0x101, 0xb11b, 0x6b00653e}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x40084, 0x0) 07:50:00 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f0000000180)={0x10001}, 0x8, 0x80000) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000), 0x0) getpeername$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @local}, &(0x7f0000000140)=0x10) [ 110.446463] audit: type=1400 audit(1538293800.278:10): avc: denied { read } for pid=4847 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 07:50:00 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x2, 0x0) bind(r0, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x4, 0x80000001, 0x3, 0xfffffffffffffffd, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x80) r1 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x301) ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f0000000000)=0x8) 07:50:00 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[], 0xffffffffffffff91}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x40002ee, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) timerfd_gettime(r2, &(0x7f0000000100)) 07:50:00 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f0000000180)=ANY=[], &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000540)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402", 0x2, &(0x7f0000000240)="7379736673002a864f4bc00bce1bdb20637213b1e894d120715f9dc1125b042c7226eb0136d9624ea1d23374a660fe5ac173722fd367ad22e8553025a2e8be0bc5514379af7213d32b8d5d06dc8fbf2c849ed9cdefc74b03dfa9cb5a90b28b4b24d7862c3d66fca53167d5424235435a3dbb76bc7d3c42fc2e9c696114a6f888f0da85277683cfc1c4d2bf71c255a3134d64cc3fed8e97798deb8631cbf7682c9fa2ed031465aa191df922f764297cba22a8499d177f49fba940f55bbc8b723fd374f1fed78c8aeec6811d9b5879487387d56594a14c2588274de84fa27610302b3fb54172a8c910a07e7c76ea465aa68402") lsetxattr$security_selinux(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:netlabel_mgmt_exec_t:s0\x00', 0x2a, 0x0) 07:50:00 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) getgroups(0x2, &(0x7f0000000180)=[0xee00, 0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$chown(0x4, r0, r2, r1) INIT: Id "1" respawning too fast: disabled for 5 minutes [ 110.562167] audit: type=1400 audit(1538293800.408:11): avc: denied { associate } for pid=4891 comm="syz-executor5" name="/" dev="sysfs" ino=1 scontext=system_u:object_r:netlabel_mgmt_exec_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=filesystem permissive=1 INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes 07:50:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f00000002c0), &(0x7f00000004c0)="9a73d34594932b767967cc70d2ac5954a8a4811a6ed29c02de2168ba67061984656809f3e2713dcdf776efc02f0a9968efb0ff13c4e2c604c2b4e043044efa1f81e39bc692fb6563e39854801752aa3b13bc9d258fa3e3c668ed0572f3a294ed486ece19dd4a5b4580d66744895fdaeb9651c7bc7674af8fd734dc", 0x7b, 0xfffffffffffffffc) mkdir(&(0x7f0000000100)='./file0\x00', 0x2) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f0000000340)={@loopback, @loopback, @dev}, &(0x7f0000000380)=0xc) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/member\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003100), 0x101b) mkdir(&(0x7f0000000140)='./file0\x00', 0x80) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) INIT: Id "4" respawning too fast: disabled for 5 minutes [ 110.865763] loop0: p1 p2 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p21 loop0: p1 start 1 is beyond EOD, truncated [ 110.968083] loop0: p2 size 2 extends beyond EOD, truncated [ 110.994542] loop0: p3 start 201 is beyond EOD, truncated [ 111.000646] loop0: p4 start 301 is beyond EOD, truncated [ 111.006512] loop0: p5 start 1 is beyond EOD, truncated [ 111.012422] loop0: p6 start 1 is beyond EOD, truncated [ 111.018109] loop0: p7 start 1 is beyond EOD, truncated [ 111.023930] loop0: p8 start 1 is beyond EOD, truncated [ 111.029734] loop0: p9 start 1 is beyond EOD, truncated [ 111.035532] loop0: p10 start 1 is beyond EOD, truncated [ 111.041411] loop0: p11 start 1 is beyond EOD, truncated [ 111.047189] loop0: p12 start 1 is beyond EOD, truncated [ 111.053123] loop0: p13 start 1 is beyond EOD, truncated [ 111.059011] loop0: p14 start 1 is beyond EOD, truncated [ 111.064843] loop0: p15 start 1 is beyond EOD, truncated [ 111.070739] loop0: p16 start 1 is beyond EOD, truncated [ 111.076538] loop0: p17 start 1 is beyond EOD, truncated [ 111.083171] loop0: p18 start 1 is beyond EOD, truncated [ 111.089071] loop0: p19 start 1 is beyond EOD, truncated [ 111.094893] loop0: p20 start 1 is beyond EOD, truncated [ 111.100770] loop0: p21 start 1 is beyond EOD, truncated [ 111.106552] loop0: p22 start 1 is beyond EOD, truncated [ 111.112485] loop0: p23 start 1 is beyond EOD, truncated [ 111.118277] loop0: p24 start 1 is beyond EOD, truncated [ 111.124166] loop0: p25 start 1 is beyond EOD, truncated [ 111.130399] loop0: p26 start 1 is beyond EOD, truncated [ 111.136176] loop0: p27 start 1 is beyond EOD, truncated [ 111.142341] loop0: p28 start 1 is beyond EOD, truncated [ 111.148125] loop0: p29 start 1 is beyond EOD, truncated [ 111.154033] loop0: p30 start 1 is beyond EOD, truncated [ 111.159936] loop0: p31 start 1 is beyond EOD, truncated [ 111.165733] loop0: p32 start 1 is beyond EOD, truncated [ 111.171635] loop0: p33 start 1 is beyond EOD, truncated [ 111.177442] loop0: p34 start 1 is beyond EOD, truncated [ 111.183361] loop0: p35 start 1 is beyond EOD, truncated [ 111.189220] loop0: p36 start 1 is beyond EOD, truncated [ 111.195057] loop0: p37 start 1 is beyond EOD, truncated [ 111.200958] loop0: p38 start 1 is beyond EOD, truncated [ 111.206812] loop0: p39 start 1 is beyond EOD, truncated [ 111.213427] loop0: p40 start 1 is beyond EOD, truncated [ 111.219301] loop0: p41 start 1 is beyond EOD, truncated [ 111.225107] loop0: p42 start 1 is beyond EOD, truncated [ 111.231003] loop0: p43 start 1 is beyond EOD, truncated [ 111.236823] loop0: p44 start 1 is beyond EOD, truncated [ 111.242765] loop0: p45 start 1 is beyond EOD, truncated [ 111.248658] loop0: p46 start 1 is beyond EOD, truncated [ 111.254447] loop0: p47 start 1 is beyond EOD, truncated [ 111.260334] loop0: p48 start 1 is beyond EOD, truncated [ 111.266114] loop0: p49 start 1 is beyond EOD, truncated [ 111.272066] loop0: p50 start 1 is beyond EOD, truncated [ 111.277847] loop0: p51 start 1 is beyond EOD, truncated [ 111.283753] loop0: p52 start 1 is beyond EOD, truncated [ 111.289683] loop0: p53 start 1 is beyond EOD, truncated [ 111.305776] loop0: p54 start 1 is beyond EOD, truncated [ 111.312983] loop0: p55 start 1 is beyond EOD, truncated [ 111.324818] loop0: p56 start 1 is beyond EOD, truncated [ 111.331039] loop0: p57 start 1 is beyond EOD, truncated [ 111.343656] loop0: p58 start 1 is beyond EOD, truncated [ 111.350738] loop0: p59 start 1 is beyond EOD, truncated [ 111.360187] loop0: p60 start 1 is beyond EOD, truncated [ 111.365989] loop0: p61 start 1 is beyond EOD, truncated [ 111.371947] loop0: p62 start 1 is beyond EOD, truncated [ 111.377741] loop0: p63 start 1 is beyond EOD, truncated [ 111.385536] loop0: p64 start 1 is beyond EOD, truncated [ 111.391726] loop0: p65 start 1 is beyond EOD, truncated [ 111.397220] loop0: p66 start 1 is beyond EOD, truncated [ 111.402771] loop0: p67 start 1 is beyond EOD, truncated [ 111.408306] loop0: p68 start 1 is beyond EOD, truncated 07:50:01 executing program 3: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$FUSE_BMAP(0xffffffffffffff9c, &(0x7f0000000080)={0x18, 0x0, 0x7, {0x8}}, 0x18) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) mmap(&(0x7f00001c1000/0x4000)=nil, 0x4000, 0xfffffffffffffffe, 0x11, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x0, 0xfffffffffffffc00, 0xffff, 0x1, 0x1000, 0x5}) 07:50:01 executing program 5: r0 = socket(0x2, 0x2, 0x0) shutdown(r0, 0x0) r1 = add_key$keyring(&(0x7f0000001140)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$read(0xb, r1, &(0x7f0000000080)=""/244, 0x127712f02b26cc69) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000000eff4)) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x4400, 0x0) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f00000001c0)=0x3) epoll_wait(r2, &(0x7f000000affb)=[{}], 0x1, 0xfffffffffffffef7) r4 = getpgrp(0xffffffffffffffff) fstat(r2, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001000)={{{@in=@loopback, @in=@broadcast}}, {{@in6=@local}, 0x0, @in=@loopback}}, &(0x7f0000001100)=0xe8) r6 = getegid() r7 = getpgid(0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000980)={{{@in=@rand_addr, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f0000000a80)=0xe8) getresgid(&(0x7f0000000ac0)=0x0, &(0x7f0000000b00), &(0x7f0000000b40)) r10 = syz_open_dev$sndtimer(&(0x7f0000000b80)='/dev/snd/timer\x00', 0x0, 0x250803) sendmmsg(r3, &(0x7f0000001180)=[{{0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x40000}, 0x5}], 0x1, 0x20000010) r11 = fcntl$getown(r10, 0x9) r12 = geteuid() stat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = open$dir(&(0x7f0000000c80)='./file0\x00', 0x0, 0x80) r15 = gettid() fstat(r3, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000d40)='./file0\x00', &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f0000000fc0)={r0, 0x0, 0xee, 0x5, 0x6}) sendmmsg$unix(r3, &(0x7f0000000f40)=[{&(0x7f0000000280)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000300)="05c18e37888664c17b54ba2ab7c86ffae72b6855c0f373b31361198b8ff5ef37fb9cc9873a472bb4330ed4b090b63b73cdb8e14734879651eecbc8d3d0425da6eb7fd14cc7eaa740b42d556025d3385930e56a434218b7562228865e482781e635b4651c054d188b9e9f470cd3b5e33d4874838421fb52ad1322df34e65a01765653a548259269b29b026d2fcc583471556e8adb11c6ad6a2a73464c34885ff26053", 0xa2}], 0x1, &(0x7f00000003c0)=[@rights={0x20, 0x1, 0x1, [r3, r0, r2, r2]}], 0x20, 0x4}, {&(0x7f0000000400)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000000880)=[{&(0x7f0000000480)="4380e85ceee363b16447e9a4b1dd49dea39179ed8c065e9dfef8701c7e7097c2ff4c811438bf0717913e8866dd79039e5195f978998e28f476ed26f8620d2c840f64a603242f86128c0565282d48aa5716ddea9ea6061f95f1a69318f9d5ae65996bc800661ab83cd1c4a558c395840c", 0x70}, {&(0x7f0000000500)="b546bd75dc86f9ee7dd432374dd3b6b964f9a16dbca1c91d14f93b1c09de87a59c4ec3634e0f37528710e354170b2b0f2446e07af326ef4b80e10db4e73a7a3a5a0988234de4ec908c1034f781439f82fa7d8ef805c9f4632b22678a4c53142f1dda14ce0679f1d701095d3dac7a388e65698537aeaad6103d7413e74471662669212e33bcec0f2e13012f2c95e952d5ed94c2ae5e1629f8", 0x98}, {&(0x7f00000005c0)="b8e7214775462d22aa72c3940513ab4d223e6b43b0f08f18c03b673b367d90d920dd1c6fe5736b1cd38594b6f93cf621719d1f572cf4747eddb08a4a1c8ce2770f65d147cb82f5e03ee89dfe63bdb39e0cb96d880796c59acb13e2e73bb9e3eac3fcd44ed2c664ff7c1a41c6edce0583614f7cc4ada3118168dc6ea67c7837369460d84519df59c76bf85ea68bab4c82c281ca5adb5fc7068bd249f762bbddd0d7c7cb1f8c29afd6d5692b228b14081c54e09b6e880f0b993f5fc1b1a471d444bb8ed3316b4ace4dd0", 0xc9}, {&(0x7f00000006c0)="733477e952328d0842847e00e7075fa9d741454c76f5029d6114c4b1acb894e08a7659796100cf10056e75f4e317fa3584b298232b7f43fc75b4217a1db0d46d7d9d9b0e5b2299bc4ae275f97adfe318038feebd13d0a895b7f73dc4a11f2dc78e721567aa7c2e913bf189f74f827aac6544624279cc24d03b88df0537788be9e4379435e752e6baa3ba665991a23086a3159afc7cb04ae675939c2337c90c5303ba297aadc24955630a866c160e59c92ccb4809", 0xb4}, {&(0x7f0000000780)="753c47313976dfca959ede8664baa4c47f493e0fdfdaf7fec4cfb8f4f6dad85eb5f88166e69b7c79dc0f5c908c367033941ff3446712a62dd17b4faa8c286db13423cecc8076c558b02f79a30b928f458d9564ec3c09721ec9c96d7094f230b932a49048e14ef73eb231e7259964812012c1a7f53ea5d3a8e0616b830e619b7a0a6a0ef79942c7038ac295e68fa46e1fc5f7f3431a80e6a43898a005255baf36c8d924f74400f3d0bb1a0ded2c6a8e0937fb207d74724bf63d050385fdab1be354fa5d1fbcb43c92a9c066748fd7621ff9bdcf4a8e644ea2833dce004d1c089a5b00d1dd11", 0xe5}], 0x5, &(0x7f0000000e00)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r2, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r10, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r0, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="20000200000000000100000002000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r14, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r15, @ANYRES32=r16, @ANYRES32=r17, @ANYBLOB='\x00\x00\x00\x00'], 0x120, 0xc001}], 0x2, 0x4000084) shutdown(r0, 0x1) 07:50:01 executing program 2: socketpair$unix(0x1, 0x23af09e0a44e8e91, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="0de2bba19f8db34034e15479cdd1435d165d6562ae2705462791894f6a534dee11ceb1fb94587163b06956709efe6a0000003091103e0c63df2feccb2654786d06d24b8591c8cb5fdf09b4bb1e5c069c169fd5a38360801ac9719ffb6c4ab7e8ecca132d652ffae974398d1de7b25b3a1289d501ba9bedf41c42085d4215d124b4c1fe58cc6c7b9960b9a4d2d21cf5911bc019a652be2c5e7e192e6717a298971ab3fc588a35aa3d4c431edb31"], 0x8) 07:50:01 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000240)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) getgroups(0x2, &(0x7f0000000180)=[0xee00, 0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) keyctl$chown(0x4, r0, r2, r1) 07:50:01 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x0, 0x3}, 0x4) r1 = socket(0x200000000000011, 0x4000000000080002, 0x8) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000180)={@loopback, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={"7369743000fcffffffff25ffff00", r2}) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendto$inet6(r1, &(0x7f0000000240)="49f93a6ddd81f60079520cf646bbced45b0ef1f9", 0x14, 0x0, 0x0, 0x0) [ 111.413906] loop0: p69 start 1 is beyond EOD, truncated [ 111.419990] loop0: p70 start 1 is beyond EOD, truncated [ 111.427492] loop0: p71 start 1 is beyond EOD, truncated [ 111.441152] loop0: p72 start 1 is beyond EOD, truncated 07:50:01 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x103d, 0x10}, 0x3ef) r0 = inotify_init() bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000000), 0x1, 0xfb, &(0x7f0000000040)=""/251}, 0x48) signalfd4(r0, &(0x7f0000000000)={0xffffffff}, 0x8, 0x80800) 07:50:01 executing program 2: r0 = dup(0xffffffffffffff9c) getsockname(r0, &(0x7f0000000100)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f0000000180)=0x80) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000244000)) keyctl$clear(0x15, 0x0) [ 111.452746] loop0: p73 start 1 is beyond EOD, [ 111.455562] SELinux: policydb magic number 0xa1bbe20d does not match expected magic number 0xf97cff8c [ 111.481580] truncated 07:50:01 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000001c0)) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x80a00100, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) r0 = getpid() mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x1, 0x31, 0xffffffffffffffff, 0x0) sched_setscheduler(r0, 0x5, &(0x7f0000000200)) io_setup(0x1, &(0x7f0000000180)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x4) 07:50:01 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ip6_vti0\x00', {0x2, 0x4e23, @remote}}) 07:50:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)="390000001300090468fe0700000000000700ff3f03000000450001070000001419001a002ccbd4c41b812268ce6a5e7b77ef00000080000000", 0x39}], 0x1) [ 111.487624] loop0: p74 start 1 is beyond EOD, [ 111.498397] audit: type=1400 audit(1538293801.338:12): avc: denied { map_create } for pid=4936 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 111.521951] capability: warning: `syz-executor2' uses 32-bit capabilities (legacy support in use) [ 111.544217] truncated 07:50:01 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) read(r0, &(0x7f0000000140)=""/116, 0xffffff63) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x3ff) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000040)=""/13, &(0x7f0000000080)=0xd) [ 111.551780] loop0: p75 start 1 is beyond EOD, truncated [ 111.571527] loop0: p76 start 1 is beyond EOD, truncated [ 111.583890] loop0: p77 start 1 is beyond EOD, truncated [ 111.590207] loop0: p78 start 1 is beyond EOD, truncated [ 111.595945] loop0: p79 start 1 is beyond EOD, truncated [ 111.609083] loop0: p80 start 1 is beyond EOD, truncated [ 111.614795] loop0: p81 start 1 is beyond EOD, truncated [ 111.620991] loop0: p82 start 1 is beyond EOD, truncated [ 111.627150] loop0: p83 start 1 is beyond EOD, truncated [ 111.633056] loop0: p84 start 1 is beyond EOD, truncated [ 111.638798] loop0: p85 start 1 is beyond EOD, truncated [ 111.644499] loop0: p86 start 1 is beyond EOD, truncated [ 111.650229] loop0: p87 start 1 is beyond EOD, truncated [ 111.664496] loop0: p88 start 1 is beyond EOD, truncated [ 111.678092] loop0: p89 start 1 is beyond EOD, truncated [ 111.686732] loop0: p90 start 1 is beyond EOD, truncated [ 111.696002] loop0: p91 start 1 is beyond EOD, truncated [ 111.706109] loop0: p92 start 1 is beyond EOD, truncated [ 111.715071] loop0: p93 start 1 is beyond EOD, truncated [ 111.722571] loop0: p94 start 1 is beyond EOD, truncated [ 111.728272] loop0: p95 start 1 is beyond EOD, truncated [ 111.734731] loop0: p96 start 1 is beyond EOD, truncated [ 111.740381] loop0: p97 start 1 is beyond EOD, truncated [ 111.745971] loop0: p98 start 1 is beyond EOD, truncated [ 111.751688] loop0: p99 start 1 is beyond EOD, truncated [ 111.757285] loop0: p100 start 1 is beyond EOD, truncated [ 111.763022] loop0: p101 start 1 is beyond EOD, truncated [ 111.768818] loop0: p102 start 1 is beyond EOD, truncated [ 111.774513] loop0: p103 start 1 is beyond EOD, truncated [ 111.780250] loop0: p104 start 1 is beyond EOD, truncated [ 111.785939] loop0: p105 start 1 is beyond EOD, truncated [ 111.791658] loop0: p106 start 1 is beyond EOD, truncated [ 111.797344] loop0: p107 start 1 is beyond EOD, truncated [ 111.803079] loop0: p108 start 1 is beyond EOD, truncated [ 111.808802] loop0: p109 start 1 is beyond EOD, truncated [ 111.814479] loop0: p110 start 1 is beyond EOD, truncated [ 111.820210] loop0: p111 start 1 is beyond EOD, truncated [ 111.825884] loop0: p112 start 1 is beyond EOD, truncated [ 111.831674] loop0: p113 start 1 is beyond EOD, truncated [ 111.837347] loop0: p114 start 1 is beyond EOD, truncated [ 111.843071] loop0: p115 start 1 is beyond EOD, truncated [ 111.848789] loop0: p116 start 1 is beyond EOD, truncated [ 111.854469] loop0: p117 start 1 is beyond EOD, truncated [ 111.860823] loop0: p118 start 1 is beyond EOD, truncated [ 111.866516] loop0: p119 start 1 is beyond EOD, truncated [ 111.872266] loop0: p120 start 1 is beyond EOD, truncated [ 111.877946] loop0: p121 start 1 is beyond EOD, truncated [ 111.883697] loop0: p122 start 1 is beyond EOD, truncated [ 111.892965] loop0: p123 start 1 is beyond EOD, truncated [ 111.898802] loop0: p124 start 1 is beyond EOD, truncated [ 111.904751] loop0: p125 start 1 is beyond EOD, truncated [ 111.910860] loop0: p126 start 1 is beyond EOD, truncated [ 111.916450] loop0: p127 start 1 is beyond EOD, truncated [ 111.922124] loop0: p128 start 1 is beyond EOD, truncated [ 111.927709] loop0: p129 start 1 is beyond EOD, truncated [ 111.933510] loop0: p130 start 1 is beyond EOD, truncated [ 111.939081] loop0: p131 start 1 is beyond EOD, truncated [ 111.944637] loop0: p132 start 1 is beyond EOD, truncated [ 111.950228] loop0: p133 start 1 is beyond EOD, truncated [ 111.955771] loop0: p134 start 1 is beyond EOD, truncated [ 111.961368] loop0: p135 start 1 is beyond EOD, truncated [ 111.966913] loop0: p136 start 1 is beyond EOD, truncated [ 111.972499] loop0: p137 start 1 is beyond EOD, truncated [ 111.978044] loop0: p138 start 1 is beyond EOD, truncated [ 111.983636] loop0: p139 start 1 is beyond EOD, truncated [ 111.989716] loop0: p140 start 1 is beyond EOD, truncated [ 111.995272] loop0: p141 start 1 is beyond EOD, truncated [ 112.000866] loop0: p142 start 1 is beyond EOD, truncated [ 112.006407] loop0: p143 start 1 is beyond EOD, truncated [ 112.011996] loop0: p144 start 1 is beyond EOD, truncated [ 112.017581] loop0: p145 start 1 is beyond EOD, truncated [ 112.023179] loop0: p146 start 1 is beyond EOD, truncated [ 112.028750] loop0: p147 start 1 is beyond EOD, truncated [ 112.034304] loop0: p148 start 1 is beyond EOD, truncated [ 112.039886] loop0: p149 start 1 is beyond EOD, truncated [ 112.045430] loop0: p150 start 1 is beyond EOD, truncated [ 112.051014] loop0: p151 start 1 is beyond EOD, truncated [ 112.056554] loop0: p152 start 1 is beyond EOD, truncated [ 112.062147] loop0: p153 start 1 is beyond EOD, truncated [ 112.067700] loop0: p154 start 1 is beyond EOD, truncated [ 112.073284] loop0: p155 start 1 is beyond EOD, truncated [ 112.078853] loop0: p156 start 1 is beyond EOD, truncated [ 112.084409] loop0: p157 start 1 is beyond EOD, truncated [ 112.089987] loop0: p158 start 1 is beyond EOD, truncated [ 112.095528] loop0: p159 start 1 is beyond EOD, truncated [ 112.101110] loop0: p160 start 1 is beyond EOD, truncated [ 112.106652] loop0: p161 start 1 is beyond EOD, truncated [ 112.112239] loop0: p162 start 1 is beyond EOD, truncated [ 112.117809] loop0: p163 start 1 is beyond EOD, truncated [ 112.123869] loop0: p164 start 1 is beyond EOD, truncated [ 112.129439] loop0: p165 start 1 is beyond EOD, truncated [ 112.134997] loop0: p166 start 1 is beyond EOD, truncated [ 112.140584] loop0: p167 start 1 is beyond EOD, truncated [ 112.146134] loop0: p168 start 1 is beyond EOD, truncated [ 112.151736] loop0: p169 start 1 is beyond EOD, truncated [ 112.157281] loop0: p170 start 1 is beyond EOD, truncated [ 112.162869] loop0: p171 start 1 is beyond EOD, truncated [ 112.168439] loop0: p172 start 1 is beyond EOD, truncated [ 112.173996] loop0: p173 start 1 is beyond EOD, truncated [ 112.179587] loop0: p174 start 1 is beyond EOD, truncated [ 112.185141] loop0: p175 start 1 is beyond EOD, truncated [ 112.190755] loop0: p176 start 1 is beyond EOD, truncated [ 112.196295] loop0: p177 start 1 is beyond EOD, truncated [ 112.201881] loop0: p178 start 1 is beyond EOD, truncated [ 112.207426] loop0: p179 start 1 is beyond EOD, truncated [ 112.213010] loop0: p180 start 1 is beyond EOD, truncated [ 112.218577] loop0: p181 start 1 is beyond EOD, truncated [ 112.224140] loop0: p182 start 1 is beyond EOD, truncated [ 112.229736] loop0: p183 start 1 is beyond EOD, truncated [ 112.235280] loop0: p184 start 1 is beyond EOD, truncated [ 112.240862] loop0: p185 start 1 is beyond EOD, truncated [ 112.246409] loop0: p186 start 1 is beyond EOD, truncated [ 112.252468] loop0: p187 start 1 is beyond EOD, truncated [ 112.258011] loop0: p188 start 1 is beyond EOD, truncated [ 112.263594] loop0: p189 start 1 is beyond EOD, truncated [ 112.269173] loop0: p190 start 1 is beyond EOD, truncated [ 112.274734] loop0: p191 start 1 is beyond EOD, truncated [ 112.280315] loop0: p192 start 1 is beyond EOD, truncated [ 112.285857] loop0: p193 start 1 is beyond EOD, truncated [ 112.291440] loop0: p194 start 1 is beyond EOD, truncated [ 112.296983] loop0: p195 start 1 is beyond EOD, truncated [ 112.302567] loop0: p196 start 1 is beyond EOD, truncated [ 112.308110] loop0: p197 start 1 is beyond EOD, truncated [ 112.313752] loop0: p198 start 1 is beyond EOD, truncated [ 112.319325] loop0: p199 start 1 is beyond EOD, truncated [ 112.324882] loop0: p200 start 1 is beyond EOD, truncated [ 112.330459] loop0: p201 start 1 is beyond EOD, truncated [ 112.336001] loop0: p202 start 1 is beyond EOD, truncated [ 112.341628] loop0: p203 start 1 is beyond EOD, truncated [ 112.347169] loop0: p204 start 1 is beyond EOD, truncated [ 112.352764] loop0: p205 start 1 is beyond EOD, truncated [ 112.358307] loop0: p206 start 1 is beyond EOD, truncated [ 112.363887] loop0: p207 start 1 is beyond EOD, truncated [ 112.369455] loop0: p208 start 1 is beyond EOD, truncated [ 112.375011] loop0: p209 start 1 is beyond EOD, truncated [ 112.381046] loop0: p210 start 1 is beyond EOD, truncated [ 112.386586] loop0: p211 start 1 is beyond EOD, truncated [ 112.392174] loop0: p212 start 1 is beyond EOD, truncated [ 112.397719] loop0: p213 start 1 is beyond EOD, truncated [ 112.403303] loop0: p214 start 1 is beyond EOD, truncated [ 112.408872] loop0: p215 start 1 is beyond EOD, truncated [ 112.414425] loop0: p216 start 1 is beyond EOD, truncated [ 112.420052] loop0: p217 start 1 is beyond EOD, truncated [ 112.425593] loop0: p218 start 1 is beyond EOD, truncated [ 112.431188] loop0: p219 start 1 is beyond EOD, truncated [ 112.436735] loop0: p220 start 1 is beyond EOD, truncated [ 112.442318] loop0: p221 start 1 is beyond EOD, truncated [ 112.447861] loop0: p222 start 1 is beyond EOD, truncated [ 112.453453] loop0: p223 start 1 is beyond EOD, truncated [ 112.459032] loop0: p224 start 1 is beyond EOD, truncated [ 112.464588] loop0: p225 start 1 is beyond EOD, truncated [ 112.470181] loop0: p226 start 1 is beyond EOD, truncated [ 112.475728] loop0: p227 start 1 is beyond EOD, truncated [ 112.481309] loop0: p228 start 1 is beyond EOD, truncated [ 112.486857] loop0: p229 start 1 is beyond EOD, truncated [ 112.492446] loop0: p230 start 1 is beyond EOD, truncated [ 112.497993] loop0: p231 start 1 is beyond EOD, truncated [ 112.503578] loop0: p232 start 1 is beyond EOD, truncated [ 112.509655] loop0: p233 start 1 is beyond EOD, truncated [ 112.515242] loop0: p234 start 1 is beyond EOD, truncated [ 112.520836] loop0: p235 start 1 is beyond EOD, truncated [ 112.526385] loop0: p236 start 1 is beyond EOD, truncated [ 112.531984] loop0: p237 start 1 is beyond EOD, truncated [ 112.537535] loop0: p238 start 1 is beyond EOD, truncated [ 112.543146] loop0: p239 start 1 is beyond EOD, truncated [ 112.548750] loop0: p240 start 1 is beyond EOD, truncated [ 112.554311] loop0: p241 start 1 is beyond EOD, truncated [ 112.559898] loop0: p242 start 1 is beyond EOD, truncated [ 112.565466] loop0: p243 start 1 is beyond EOD, truncated [ 112.571057] loop0: p244 start 1 is beyond EOD, truncated [ 112.576612] loop0: p245 start 1 is beyond EOD, truncated [ 112.582208] loop0: p246 start 1 is beyond EOD, truncated [ 112.587762] loop0: p247 start 1 is beyond EOD, truncated [ 112.593359] loop0: p248 start 1 is beyond EOD, truncated [ 112.598937] loop0: p249 start 1 is beyond EOD, truncated [ 112.604501] loop0: p250 start 1 is beyond EOD, truncated [ 112.610085] loop0: p251 start 1 is beyond EOD, truncated [ 112.615634] loop0: p252 start 1 is beyond EOD, truncated [ 112.621225] loop0: p253 start 1 is beyond EOD, truncated 07:50:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000000)=[{&(0x7f0000000040)="000000000000000000000000000000000010000000000000ed793afe0000000002008201260001000000640000000001270005000000000000006400000000030d0085043100c90000006400000000043200052020002d010000d306000055aa", 0x60, 0x1a0}]) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f00000002c0), &(0x7f00000004c0)="9a73d34594932b767967cc70d2ac5954a8a4811a6ed29c02de2168ba67061984656809f3e2713dcdf776efc02f0a9968efb0ff13c4e2c604c2b4e043044efa1f81e39bc692fb6563e39854801752aa3b13bc9d258fa3e3c668ed0572f3a294ed486ece19dd4a5b4580d66744895fdaeb9651c7bc7674af8fd734dc", 0x7b, 0xfffffffffffffffc) mkdir(&(0x7f0000000100)='./file0\x00', 0x2) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x2f, &(0x7f0000000340)={@loopback, @loopback, @dev}, &(0x7f0000000380)=0xc) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/member\x00', 0x2, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @loopback}, &(0x7f00000001c0)=0x10, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/status\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000003100), 0x101b) mkdir(&(0x7f0000000140)='./file0\x00', 0x80) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) 07:50:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0xfffffffffffffcbf, &(0x7f00000000c0)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000040)) r1 = getpgrp(0x0) getsockname(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000080)=0x80) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000200)='scalable\x00', 0x9) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000300)) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={0x0, {0x2, 0x4e22, @multicast2}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x13}}, {0x2, 0x4e20, @rand_addr=0xd000000000000000}, 0x0, 0x7, 0x1ff, 0x8, 0x1f, &(0x7f0000000240)='veth0_to_team\x00', 0x10000, 0x3, 0x40}) sched_setaffinity(r1, 0x8, &(0x7f0000000340)=0x3000000000) ioprio_get$pid(0x1, r1) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) 07:50:02 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000001bc0)=@req3={0x9, 0x5, 0x5, 0x0, 0x0, 0x3, 0xfffffffffffffffe}, 0x1c) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000280)=0xfffffffffffffff9, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000440)='./file0/bus\x00', 0x4) pipe(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000000a40)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000a80)={0x0, 0x0}) futimesat(r1, &(0x7f0000000a00)='./file0\x00', &(0x7f0000000ac0)={{r3, r4/1000+30000}, {r5, r6/1000+10000}}) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000b00)={0x0, 0x4}, 0x4) recvmsg(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000580)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000700)=""/163, 0xa3}], 0x1, &(0x7f0000000840)=""/88, 0x58, 0x4}, 0x20) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r7, 0x6, 0x23, &(0x7f00000002c0)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f0000000640)=0x10) unshare(0x40020000) r8 = creat(&(0x7f0000000480)='./file0/bus\x00', 0xc3) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xf5da) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r8, &(0x7f0000000400)={&(0x7f0000000300), 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="0002c890a900e1b86607000090f0f48dd6060f927005cbca1245e09f73d83a0046820a47d74942702b4f9c2bc003d012723eba880f6d5faa99d866dcc9e15f8bfa718dc6bf02b788dee34345bd678fec0472178b98820fc8c11f321c4ba2c33ec9a5c5cf14e4d71b4c29f9b34c186ec15709c1ec96bc02887dbbd1946ec6077d268e553e2c8231e13dd864c4a0b74f26ffffff7f33ebad035920723bb0d9711ef7fb7a0f33cd5a51a4f93279bad1114b29b1bace0dc490b20f4c08ed8fe2750d84d4b61d5537c0446d7cec95032e7ff169467e26da496a5d424e9dcdf8c52ea7fa5251f88917e5417eed1241fe77fdd5e88ded366dde82788696f7ba0994cbd73933ac42e82e0e2de05688f2f9ca4fe37154bf27fe380ba57f9e0835bbcb4bc16b8948b3b47604961a79cb70883d9873c96c973ae4a65aaadb55cb3f0fd9dababaa5f504dca54540f30048a1fb030b"], 0x1}, 0x1, 0x0, 0x0, 0x1}, 0x4) ioctl$sock_SIOCGPGRP(r8, 0x8904, &(0x7f00000006c0)=0x0) getsockopt$sock_timeval(r8, 0x1, 0x0, &(0x7f00000004c0), &(0x7f0000000500)=0x10) sched_getscheduler(r9) getpgrp(r9) read(r0, &(0x7f0000000800)=""/45, 0xe563) accept4$packet(r8, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000680)=0x14, 0x80000) r10 = socket$key(0xf, 0x3, 0x2) mkdir(&(0x7f0000000140)='./file0/bus\x00', 0x8) setsockopt$IP_VS_SO_SET_DELDEST(r8, 0x0, 0x488, &(0x7f0000000200)={{0x0, @broadcast, 0x4e22, 0x2, "73680200", 0x0, 0x0, 0xd}, {@remote, 0x4e21, 0x7, 0x7, 0x9}}, 0x44) ioctl$BLKFRASET(r8, 0x1264, &(0x7f0000000100)=0x9) finit_module(r10, &(0x7f00000000c0)="73680200", 0x2) 07:50:02 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x4000, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@rand_addr, @empty, 0x0}, &(0x7f00000000c0)=0xc) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@ipv6_delroute={0x50, 0x19, 0x120, 0x70bd27, 0x25dfdbfe, {0xa, 0xb0, 0x80, 0x778475f2, 0x0, 0x2, 0xff, 0x5, 0x2000}, [@RTA_MULTIPATH={0xc, 0x9, {0x5, 0x4, 0x101, r2}}, @RTA_MULTIPATH={0xc, 0x9, {0x8, 0x5, 0x400, r3}}, @RTA_GATEWAY={0x14, 0x5, @ipv4={[], [], @local}}, @RTA_PREF={0x8, 0x14, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000881}, 0x20000800) setsockopt(r0, 0x88, 0x1, &(0x7f0000000000), 0x3d8) 07:50:02 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0x0, 0x8001, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) read(r0, &(0x7f0000000140)=""/116, 0xffffff63) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) ioctl$TIOCSTI(r1, 0x5412, 0x3ff) getsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000040)=""/13, &(0x7f0000000080)=0xd) 07:50:02 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0xfffffffffffffffb) r2 = fcntl$dupfd(r0, 0x0, r0) read$eventfd(r2, &(0x7f00000000c0), 0x8) r3 = dup3(r1, r0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c460607c4790800000000000000030000003f000000240100000000000040000000000000006b02000000000000010000800200380002000000080081ff0700006000100000090000000000000003000000000000000200000000000000060000000000000000080000000000000400000000000000fbd8936a62e4b607ffee13387ad8103f3358e30ad74dec8ccf4276e357216427f258b66b7638a174f6193736178e026957578d9245db776701a040555f4b85055297acd6abf34c1ed0f715174e4840fa242cfee22521d1259c85c5a169afdfc52b01d1e69aa96f573e29a8a45bcc199776ac838828803c814a9a2656f8589cea65222ae66986d44c6805bef4a824231c56253660f9d24d"], 0xad) fallocate(r3, 0x0, 0x2, 0x40) read$eventfd(r2, &(0x7f0000000040), 0x8) write(r0, &(0x7f0000c34fff), 0xffffff0b) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000000)={0x6}, 0x4) [ 112.626774] loop0: p254 start 1 is beyond EOD, truncated [ 112.632378] loop0: p255 start 1 is beyond EOD, truncated 07:50:02 executing program 3: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x9) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x2, 0x300) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/39, 0x27, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f00000000c0)=""/93, 0x5d, 0x0, &(0x7f0000000240)={0x2, 0x4e24, @multicast2}, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/packet\x00') preadv(r4, &(0x7f0000000480), 0x10000000000002a1, 0x1000000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f0000000280)={0x0, @aes256}) r5 = socket(0xa, 0x1, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet6_mreq(r3, 0x29, 0x0, &(0x7f0000000300)={@loopback}, &(0x7f0000000480)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000004c0)={'ip_vti0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000500)={'team0\x00'}) accept4$packet(r1, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000640)=0x2, 0x800) accept$packet(r5, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) getsockname$packet(r1, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000800)=0x14) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000840)={@ipv4={[], [], @remote}}, &(0x7f0000000880)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000900)={{{@in, @in=@remote}}, {{@in=@broadcast}, 0x0, @in=@rand_addr}}, &(0x7f0000000a00)=0xe8) getsockopt$inet6_mreq(r4, 0x29, 0x1d, &(0x7f0000000a80)={@loopback}, &(0x7f0000000040)=0x14) getsockopt$inet_mreqn(r5, 0x0, 0x20, &(0x7f0000000bc0)={@broadcast, @multicast1}, &(0x7f0000000c00)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000c40)={{{@in=@multicast2, @in6=@dev}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000d40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000dc0)={{{@in=@loopback, @in6}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000ec0)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000fc0)={'vcan0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001100)={'gre0\x00'}) recvmmsg(r1, &(0x7f0000001700)=[{{&(0x7f0000001200)=@xdp, 0x80, &(0x7f0000001300)=[{&(0x7f0000001280)=""/127, 0x7f}, {&(0x7f00000013c0)=""/222, 0xde}], 0x2, &(0x7f00000014c0)=""/207, 0xcf, 0x7}, 0x2}, {{&(0x7f00000015c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000001640)=[{&(0x7f0000001340)}], 0x1, &(0x7f0000001680)=""/73, 0x49, 0x8}, 0x4}], 0x2, 0x40010000, 0x0) getsockopt$inet_mreqn(r5, 0x0, 0x24, &(0x7f00000017c0)={@multicast1, @loopback}, &(0x7f0000001800)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001840)={'team0\x00'}) [ 112.691536] audit: type=1400 audit(1538293802.538:13): avc: denied { create } for pid=4974 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 112.717983] audit: type=1400 audit(1538293802.568:14): avc: denied { setopt } for pid=4974 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 07:50:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, &(0x7f00000014c0)={0x0, 0xb3}, 0x10) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)=0x9) clone(0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000140), &(0x7f00000000c0)) wait4(0x0, &(0x7f0000000100), 0x40000002, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) r1 = request_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000440)={'\x00', 0x1}, 0x0, 0x0, r1) rt_sigpending(&(0x7f0000000340), 0x8) rmdir(&(0x7f0000000200)='./file0\x00') 07:50:02 executing program 1: r0 = pkey_alloc(0x0, 0x3) pkey_free(r0) r1 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000180)={0x3, 0x0, 0xfffffffffffffffc}) 07:50:02 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x5f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f00000003c0)=""/4096) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f00000015c0)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000100)={'lo\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000080)=0x0) syz_open_procfs$namespace(r2, &(0x7f00000000c0)='ns/net\x00') exit(0x7fffffff) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0xa) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x12000, 0x0) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x7ff, 0xfffffffffffffffa, 0x2, 0x2, 0x0, 0x9, 0x8040, 0x3, 0x1, 0x20, 0x1, 0x100000000, 0x1, 0x7, 0x3ff, 0xe0c, 0x70e, 0x7f, 0x12a5, 0xffffffffffffffe0, 0x3, 0x1284, 0x5, 0x200, 0x5, 0xffffffffffffcf81, 0x3, 0x8, 0x7, 0x52, 0x0, 0x3ff, 0x8, 0xca, 0x9, 0x100000000, 0x0, 0x1, 0x4, @perf_bp={&(0x7f00000001c0), 0x8}, 0x10000, 0x800, 0x8, 0x5, 0x6, 0x6, 0xffffffffffff8000}, r2, 0xa, r0, 0x8) timer_create(0x7, &(0x7f00000013c0)={0x0, 0x7, 0x3, @tid=r2}, &(0x7f0000001400)=0x0) timer_getoverrun(r4) socketpair(0x4, 0xa, 0x7, &(0x7f0000001440)) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001700)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000001800)=0x175) r6 = request_key(&(0x7f0000001500)='rxrpc\x00', &(0x7f0000001540)={'syz', 0x2}, &(0x7f0000001580)=',nodevposix_acl_accessGPL-[\x00', 0xfffffffffffffffd) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001600)={{{@in6=@dev, @in=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@dev}}, &(0x7f0000001480)=0xe8) keyctl$get_persistent(0x16, r5, r6) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000180)={0xffffffff, 0x3, 0xab8caec741404c1f}, 0x4) [ 112.847489] ================================================================== [ 112.854898] BUG: KASAN: use-after-free in get_disk+0xc2/0xd0 [ 112.860686] Read of size 8 at addr ffff8801a528da28 by task blkid/5001 [ 112.867330] [ 112.868944] CPU: 1 PID: 5001 Comm: blkid Not tainted 4.9.130+ #46 [ 112.875157] ffff8801d2ce76b8 ffffffff81b36c89 ffffea000694a200 ffff8801a528da28 [ 112.883187] 0000000000000000 ffff8801a528da28 0000000000000000 ffff8801d2ce76f0 [ 112.891214] ffffffff8150080d ffff8801a528da28 0000000000000008 0000000000000000 [ 112.899240] Call Trace: [ 112.901820] [] dump_stack+0xc1/0x128 [ 112.907175] [] print_address_description+0x6c/0x234 [ 112.913830] [] kasan_report.cold.6+0x242/0x2fe [ 112.920047] [] ? get_disk+0xc2/0xd0 [ 112.925312] [] __asan_report_load8_noabort+0x14/0x20 [ 112.932052] [] get_disk+0xc2/0xd0 [ 112.937139] [] get_gendisk+0x16a/0x2d0 [ 112.942667] [] __blkdev_get+0x351/0xd60 [ 112.948280] [] ? trace_hardirqs_on+0x10/0x10 [ 112.954321] [] ? __blkdev_put+0x840/0x840 [ 112.960106] [] ? HARDIRQ_verbose+0x10/0x10 [ 112.965978] [] ? unlock_new_inode+0xd0/0x140 [ 112.972024] [] blkdev_get+0x2da/0x920 [ 112.977458] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 112.984198] [] ? bd_may_claim+0xd0/0xd0 [ 112.989805] [] ? bd_acquire+0xfc/0x250 [ 112.995566] [] ? bd_acquire+0x133/0x250 [ 113.001182] [] ? _raw_spin_unlock+0x2c/0x50 [ 113.007140] [] blkdev_open+0x1a5/0x250 [ 113.012671] [] do_dentry_open+0x3ef/0xc90 [ 113.018460] [] ? blkdev_get_by_dev+0x70/0x70 [ 113.024508] [] vfs_open+0x11c/0x210 [ 113.029775] [] ? may_open.isra.20+0x14f/0x2a0 [ 113.035905] [] path_openat+0x542/0x2790 [ 113.041535] [] ? path_mountpoint+0x6c0/0x6c0 [ 113.047581] [] ? trace_hardirqs_on+0x10/0x10 [ 113.053641] [] ? expand_files.part.3+0x3a9/0x6d0 [ 113.060052] [] do_filp_open+0x197/0x270 [ 113.065662] [] ? may_open_dev+0xe0/0xe0 [ 113.071278] [] ? _raw_spin_unlock+0x2c/0x50 [ 113.077236] [] ? __alloc_fd+0x1d7/0x4a0 [ 113.082847] [] do_sys_open+0x30d/0x5c0 [ 113.088370] [] ? filp_open+0x70/0x70 [ 113.093722] [] ? up_read+0x1a/0x40 [ 113.098897] [] SyS_open+0x2d/0x40 [ 113.103985] [] ? do_sys_open+0x5c0/0x5c0 [ 113.109683] [] do_syscall_64+0x19f/0x550 [ 113.115385] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 113.122291] [ 113.123906] Allocated by task 4888: [ 113.128014] save_stack_trace+0x16/0x20 [ 113.131979] kasan_kmalloc.part.1+0x62/0xf0 [ 113.136285] kasan_kmalloc+0xaf/0xc0 [ 113.139987] kmem_cache_alloc_trace+0x117/0x2e0 [ 113.144644] alloc_disk_node+0x54/0x3a0 [ 113.148611] alloc_disk+0x18/0x20 [ 113.152054] loop_add+0x33b/0x770 [ 113.155489] loop_control_ioctl+0x136/0x300 [ 113.159796] do_vfs_ioctl+0x1ac/0x11a0 [ 113.163669] SyS_ioctl+0x8f/0xc0 [ 113.167018] do_syscall_64+0x19f/0x550 [ 113.170893] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 113.175972] [ 113.177582] Freed by task 5000: [ 113.180854] save_stack_trace+0x16/0x20 [ 113.184813] kasan_slab_free+0xac/0x190 [ 113.188769] kfree+0xfb/0x310 [ 113.191860] disk_release+0x259/0x330 [ 113.195645] device_release+0x7e/0x220 [ 113.199516] kobject_put+0x148/0x250 [ 113.203212] put_disk+0x23/0x30 [ 113.206474] __blkdev_get+0x57d/0xd60 [ 113.210257] blkdev_get+0x2da/0x920 [ 113.213864] blkdev_open+0x1a5/0x250 [ 113.217581] do_dentry_open+0x3ef/0xc90 [ 113.221547] vfs_open+0x11c/0x210 [ 113.224982] path_openat+0x542/0x2790 [ 113.228767] do_filp_open+0x197/0x270 [ 113.232552] do_sys_open+0x30d/0x5c0 [ 113.236251] SyS_open+0x2d/0x40 [ 113.239517] do_syscall_64+0x19f/0x550 [ 113.243388] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 113.248467] [ 113.250081] The buggy address belongs to the object at ffff8801a528d500 [ 113.250081] which belongs to the cache kmalloc-2048 of size 2048 [ 113.262898] The buggy address is located 1320 bytes inside of [ 113.262898] 2048-byte region [ffff8801a528d500, ffff8801a528dd00) [ 113.274932] The buggy address belongs to the page: [ 113.279846] page:ffffea000694a200 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 113.290055] flags: 0x4000000000004080(slab|head) [ 113.294792] page dumped because: kasan: bad access detected [ 113.300479] [ 113.302087] Memory state around the buggy address: [ 113.306999] ffff8801a528d900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 113.314346] ffff8801a528d980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 113.321693] >ffff8801a528da00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 113.329036] ^ [ 113.333689] ffff8801a528da80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 113.341035] ffff8801a528db00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 113.348374] ================================================================== [ 113.355716] Disabling lock debugging due to kernel taint [ 113.361221] Kernel panic - not syncing: panic_on_warn set ... [ 113.361221] [ 113.368580] CPU: 1 PID: 5001 Comm: blkid Tainted: G B 4.9.130+ #46 [ 113.376022] ffff8801d2ce7618 ffffffff81b36c89 ffffffff82e357a8 00000000ffffffff [ 113.384043] 0000000000000000 0000000000000001 0000000000000000 ffff8801d2ce76d8 [ 113.392069] ffffffff813f6835 0000000041b58ab3 ffffffff82e297ab ffffffff813f6676 [ 113.400101] Call Trace: [ 113.402682] [] dump_stack+0xc1/0x128 [ 113.408034] [] panic+0x1bf/0x39f [ 113.413038] [] ? add_taint.cold.6+0x16/0x16 [ 113.418997] [] kasan_end_report+0x47/0x4f [ 113.424784] [] kasan_report.cold.6+0x76/0x2fe [ 113.430920] [] ? get_disk+0xc2/0xd0 [ 113.436193] [] __asan_report_load8_noabort+0x14/0x20 [ 113.442933] [] get_disk+0xc2/0xd0 [ 113.448023] [] get_gendisk+0x16a/0x2d0 [ 113.453546] [] __blkdev_get+0x351/0xd60 [ 113.459155] [] ? trace_hardirqs_on+0x10/0x10 [ 113.465206] [] ? __blkdev_put+0x840/0x840 [ 113.470991] [] ? HARDIRQ_verbose+0x10/0x10 [ 113.476861] [] ? unlock_new_inode+0xd0/0x140 [ 113.482910] [] blkdev_get+0x2da/0x920 [ 113.488351] [] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 113.495098] [] ? bd_may_claim+0xd0/0xd0 [ 113.500718] [] ? bd_acquire+0xfc/0x250 [ 113.506250] [] ? bd_acquire+0x133/0x250 [ 113.511866] [] ? _raw_spin_unlock+0x2c/0x50 [ 113.517829] [] blkdev_open+0x1a5/0x250 [ 113.523359] [] do_dentry_open+0x3ef/0xc90 [ 113.529149] [] ? blkdev_get_by_dev+0x70/0x70 [ 113.535204] [] vfs_open+0x11c/0x210 [ 113.540472] [] ? may_open.isra.20+0x14f/0x2a0 [ 113.546613] [] path_openat+0x542/0x2790 [ 113.552226] [] ? path_mountpoint+0x6c0/0x6c0 [ 113.558272] [] ? trace_hardirqs_on+0x10/0x10 [ 113.564323] [] ? expand_files.part.3+0x3a9/0x6d0 [ 113.570717] [] do_filp_open+0x197/0x270 [ 113.576329] [] ? may_open_dev+0xe0/0xe0 [ 113.581946] [] ? _raw_spin_unlock+0x2c/0x50 [ 113.587905] [] ? __alloc_fd+0x1d7/0x4a0 [ 113.593521] [] do_sys_open+0x30d/0x5c0 [ 113.599053] [] ? filp_open+0x70/0x70 [ 113.604404] [] ? up_read+0x1a/0x40 [ 113.609582] [] SyS_open+0x2d/0x40 [ 113.614685] [] ? do_sys_open+0x5c0/0x5c0 [ 113.620382] [] do_syscall_64+0x19f/0x550 [ 113.626081] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 113.633329] Kernel Offset: disabled [ 113.636949] Rebooting in 86400 seconds..