Warning: Permanently added '10.128.0.244' (ECDSA) to the list of known hosts. 2019/11/13 09:44:31 fuzzer started 2019/11/13 09:44:33 dialing manager at 10.128.0.26:43743 2019/11/13 09:44:33 syscalls: 1354 2019/11/13 09:44:33 code coverage: enabled 2019/11/13 09:44:33 comparison tracing: CONFIG_KCOV_ENABLE_COMPARISONS is not enabled 2019/11/13 09:44:33 extra coverage: extra coverage is not supported by the kernel 2019/11/13 09:44:33 setuid sandbox: enabled 2019/11/13 09:44:33 namespace sandbox: enabled 2019/11/13 09:44:33 Android sandbox: /sys/fs/selinux/policy does not exist 2019/11/13 09:44:33 fault injection: kernel does not have systematic fault injection support 2019/11/13 09:44:33 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/11/13 09:44:33 net packet injection: enabled 2019/11/13 09:44:33 net device setup: enabled 2019/11/13 09:44:33 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/11/13 09:44:33 devlink PCI setup: PCI device 0000:00:10.0 is not available 09:45:09 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000000c0)={'nat\x00', 0x0, 0x0, 0x0, [], 0x8, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}, {}]}, 0xf8) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f00000001c0)={0xe30, 0x6, 0x5, 0x5, 0xfffeffff, 0xaac}) r1 = open$dir(&(0x7f0000000200)='./file0\x00', 0x200000, 0x2) renameat(r1, &(0x7f0000000240)='./file0\x00', r0, &(0x7f0000000280)='./file0\x00') r2 = getpgrp(0x0) ptrace$setregset(0x4205, r2, 0x201, &(0x7f0000000340)={&(0x7f00000002c0)="34051cd37d54ac83b22d81b51793e4a163e51e570fe53dfd21f434a3d772d43347d4ea38582776122d993b956499789e403cb9a9655208afdc5a214859f9cbbd4a54c640a7d8c5681a1251de20719ddfc4af4c985a9c60573b3cf9c152b4ea80bc4a18", 0x63}) r3 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/relabel\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(r3, &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x1) r4 = dup(0xffffffffffffffff) renameat(r4, &(0x7f0000000440)='./file0\x00', r1, &(0x7f0000000480)='./file0\x00') setsockopt$inet6_opts(r4, 0x29, 0x36, &(0x7f00000004c0)=@fragment={0x67, 0x0, 0x6, 0x1, 0x0, 0x0, 0x68}, 0x8) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$EVIOCSABS2F(r5, 0x401845ef, &(0x7f0000000580)={0x40800, 0x0, 0x401, 0xffffffff, 0x3}) syz_open_procfs$namespace(r2, &(0x7f00000005c0)='ns/ipc\x00') r6 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x18000, 0x0) ioctl$TIOCMBIC(r6, 0x5417, &(0x7f0000000640)=0x10001) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000680)) setrlimit(0x0, &(0x7f00000006c0)={0x8, 0x6}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000700)={@remote, @loopback}, &(0x7f0000000740)=0xc) r7 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x1c0000) accept4$unix(r7, &(0x7f0000000780)=@abs, &(0x7f0000000800)=0x6e, 0x80000) ioctl$LOOP_SET_DIRECT_IO(r6, 0x4c08, 0x8) r8 = getpgid(0x0) ptrace$cont(0x1f, r8, 0x1f, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0, 0x0}, &(0x7f0000000880)=0xc) write$FUSE_ENTRY(r0, &(0x7f00000008c0)={0x90, 0x0, 0x5, {0x3, 0x0, 0x9, 0x8, 0x0, 0xec, {0x6, 0xd80, 0x1, 0x1, 0x0, 0x4, 0x4, 0x4, 0x40, 0x7, 0x6, 0xee00, r9, 0x81, 0x5}}}, 0x90) ioctl$PIO_SCRNMAP(r6, 0x4b41, &(0x7f0000000980)="46f026ee8f99c95609ba818151497051b9482a8903e5a7bd8024b5c10086aa828ec106c77ac89ae20a17488c6b9b1245fe67d3619029d6f6170fc1f0d8651e8e05c0d4acf70d914276281f7aa03481a936cc4e216d7e792ba46aa9a55acce8c66fa0abb56554c2f225c27304572a88c638a6064d6e6dc751072ceb120db4db76e11bdc3ad26c2d39689e9535b9dcca7cee9c49fd50c030851cbaeb7f608b7d1fed139c4c6122413f029fbcba94480deae7c5722d257953886423dc9d212eabb75b9461817e29316548d6e156eeaaac20") 09:45:09 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000000)) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$invalidate(0x15, r1) r2 = accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14, 0x80000) accept4(r2, 0x0, &(0x7f0000000140), 0x800) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$ppp(r3, &(0x7f00000001c0)="f53221ae4a7d3f89fb1cb33b07845350ef023a0554ce604b8d2de7c6df1008894566832f2b41f9f3b3d35852e4490cf0fe2665e0f59c9c2b9ca52ea84450e7a0c0fb548126daa60d28b4f67ac70963b38054b36edaf7841205abaab7cbc0b0dc31f7b20e70d907eb085d6bd4f3d7588f4a5b5bddc0dabfa998f2b4d542932933b090b6ec5bfe227b1357db6ce47d370cc89700983085457938d4f765e86bc035b1dfe3", 0xa3) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x200200, 0x0) r4 = openat$random(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0x2000, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000300)=0x5) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x9ed62e1ea37ace1a, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r6, 0x200, 0x70bd2c, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8011}, 0x2000c000) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/checkreqprot\x00', 0x800000, 0x0) ioctl$RTC_EPOCH_SET(r7, 0x4008700e, 0x0) pipe2$9p(&(0x7f0000000500)={0xffffffffffffffff}, 0x100800) write$binfmt_misc(r8, &(0x7f0000000540)={'syz0', "4ff7047868fb798c17e240315d47ea818b03fe6bd2148dcada4be8"}, 0x1f) r9 = openat(0xffffffffffffffff, &(0x7f0000000580)='./file0\x00', 0x400080, 0x11b83a20c3ef3d37) ioctl$BLKREPORTZONE(r9, 0xc0101282, &(0x7f00000005c0)={0x5, 0x9, 0x0, [{0x856a, 0x383, 0x4, 0x0, 0xfe, 0xde, 0x8}, {0x4, 0x99, 0x3, 0x4, 0xc, 0x80, 0x4}, {0x6, 0x401, 0x9, 0x0, 0x4e, 0x3, 0x9f}, {0x7ff, 0x7, 0x484, 0x3, 0x20, 0x6, 0x20}, {0x6b, 0x3, 0xffff, 0x0, 0x81, 0x4, 0x3}, {0x10000, 0xf23, 0x9, 0x7f, 0x6, 0xcb, 0xfb}, {0xfffffffffffffffb, 0x6, 0x8, 0x7e, 0x80, 0x40, 0x4}, {0x4, 0xaf, 0x3, 0xa1, 0x0, 0xa1, 0xd2}, {0x5, 0x1, 0xc39f, 0xe5, 0x5, 0x6, 0x9}]}) iopl(0x81) timer_create(0x2, &(0x7f0000000840)={0x0, 0x21, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000880)=0x0) timer_gettime(r10, &(0x7f00000008c0)) r11 = dup3(r2, r2, 0x0) write$P9_RREAD(r11, &(0x7f0000000900)={0x95, 0x75, 0x2, {0x8a, "d92bf66726e7dc6e84abd81409c9355e986a2af6cd41ca0320efdef09a3cc41dfaf7cbf07208e208d95619986f9c0fce126fc03f0926a55107224527d84c0b6a559117f5a3fd7997a116fd275c2d3d5bfdb1208a151e87a46710d5e027dffd0c11ae470165a4e48898d0c07eedc11186bbacdb2dc0f9a2b90c6503f471597cf48da78bbb1a75e53523aa"}}, 0x95) ioctl$RNDADDENTROPY(0xffffffffffffffff, 0x40085203, &(0x7f00000009c0)={0x401, 0x6f, "a4a91ceb3be3f86988e2a204aa7478a872582497cab228ce4298f51de72fffba1ec12cddb026d6f46457de79caf962a0faf769661acc7556edbe29822ec50fee2b3454b330432cfb6fbe7a4ff1782bcaa68004e222d94952c4ea54bf2f75c178841ad88f1fd89d997e144370d86c7c"}) r12 = accept4$inet(0xffffffffffffffff, &(0x7f0000000a40)={0x2, 0x0, @multicast2}, &(0x7f0000000a80)=0x10, 0x100800) setsockopt$inet_msfilter(r12, 0x0, 0x29, &(0x7f0000000ac0)={@dev={0xac, 0x14, 0x14, 0x19}, @broadcast, 0x0, 0x1, [@multicast1]}, 0x14) ioctl$RTC_UIE_OFF(r3, 0x7004) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000000b00), &(0x7f0000000b40)=0x8) 09:45:09 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x4000, 0x0) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000040)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/sockstat6\x00') write$smack_current(r1, &(0x7f00000000c0)='+vboxnet0eth1trusted[bdev\x00', 0x1a) openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x101000, 0x0) ioctl$TIOCEXCL(r1, 0x540c) syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x2, 0x0) ioctl$TCSBRK(r2, 0x5409, 0xec5) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x2041, 0x0) ioctl$PPPIOCSCOMPRESS(r3, 0x4010744d) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x6) r4 = request_key(&(0x7f0000000200)='ceph\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280)='md5sum,}\x00', 0xfffffffffffffffd) keyctl$get_security(0x11, r4, &(0x7f00000002c0)=""/207, 0xcf) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f00000003c0)=0x3, 0x4) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/attr/exec\x00', 0x2, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$GIO_CMAP(r5, 0x4b70, &(0x7f0000000440)) r6 = getpgrp(0x0) ioprio_set$pid(0x2, r6, 0x0) r7 = accept4$inet(r1, &(0x7f0000000480)={0x2, 0x0, @remote}, &(0x7f00000004c0)=0x10, 0x80000) write$binfmt_script(r7, &(0x7f0000000500)={'#! ', './file0', [{0x20, 'GPL'}, {0x20, 'keyringlo'}, {0x20, '/dev/ppp\x00'}], 0xa, "b8f28e62346097b376f83a8a5499cd434e811be8cd43146104b8ec22058fdb6d219c59f7edc9b001587cdaa43f0bdca537252835cd4301c0a8cd214968b883462f4936889d2c738ccd00c69b9f64456a41fd08b5aea90b92ccc4b42a75c04a161efa0f9180774b44f9f96bfb471edc0f504620b7458efa1f21a21c7da9d44f18040707e1fc05b5b7b795911adc855e136466521b6e1c39635ca3839a3f887aad04d99079c6d117c9a43323b49a55f3cfe8e0a02c4c56dcbef28718e259b8a3270193179a9bc3ebbe5ca2d067c7112a623382ba6bb881fa107e6837e539ff1dfdfd070debb1fc6c6eb7c9b1798acc36a2bd0b4362417c"}, 0x119) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0x509200, 0x0) r8 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000680)) write(r8, &(0x7f00000006c0)="0acb7d70cc5e0fb95cfade813d9bfb8cf6f4ff8b1428994f7cf7dec35e491e54a44353aa9e3cbbef5838f9d2d4b02db322fee630d90cf1d4210d528cbf59247f5d7f34e6bd7e3cc3d54fcee816d3b2481e06fe069cdf3fa1dbe1f82e7226a13db07bf57a88d6a4739f2e1071f0b7ebb9bfe596d89b1f64d52d0c3837959195b8a9de49d0fbb86effb650e2dfbe4ed1bbf9ef0d5ba3e2402a928fc6fe67baeccefabc6a0f8c5e5d7253d8bd5d2e059617cbe377e9ae944436c89b4140a369f81d947ab0c6f1cc64f9c4ec13eac69c47", 0xcf) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$BLKRRPART(r9, 0x125f, 0x0) ptrace$setregset(0x4205, r6, 0x6, &(0x7f0000000880)={&(0x7f0000000800)="da4d5df8a74057083de0da0a645c21bebe8e2f40a236d1dd5a8ee7c0598a26389645f47994c3e362ae98e5ba05e5ff2e12bf62c7b0d3689023b16e71cb01609c234d85c4815f8b1005bc9a443e3c6306057be5d0c5e4628341b22473cf1cbae7d4cd", 0x62}) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000008c0)='clear_refs\x00') ioctl$TCSBRK(r10, 0x5409, 0xa4c8) 09:45:09 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x64613ff277148d8a, 0xffffffffffffffff) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000040)={0x5, 0xfa, 0x5, 0x9, 0x2, 0x40, 0x1000, 0x0, 0x80000000, 0x7f, 0x8, 0x8000, 0x8, 0x7, &(0x7f0000000000)=""/46, 0x9, 0x1, 0x6}) r1 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f00000000c0)={0x80000001}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000180)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r3, 0x300, 0x70bd2c, 0x25dfdbff, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x40) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000280)='/dev/zero\x00', 0x4000, 0x0) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, &(0x7f0000000300)={0x0, {0x2, 0x4e23, @multicast1}, {0x2, 0x4e20, @remote}, {0x2, 0x4e23, @empty}, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)='vcan0\x00', 0xfffffffffffffffe, 0x2, 0x4}) epoll_create1(0xc0000) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000380)={0x401, 0x7, 0x4, 0x2, 0x10, 0x1, 0x3f, 0x9, 0x0, 0x7f}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) sendmsg$key(r5, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000003c0)={0x2, 0x14, 0x5, 0x2, 0x204, 0x0, 0x70bd28, 0x25dfdbfc, [@sadb_key={0x201, 0xd, 0x8000, 0x0, "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"}, @sadb_x_nat_t_type={0x1, 0x14, 0x9}]}, 0x1020}}, 0x84) pipe(&(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_UIE_ON(r6, 0x7003) keyctl$join(0x1, &(0x7f00000014c0)={'syz', 0x0}) r7 = creat(&(0x7f0000001500)='./file0\x00', 0x28) timerfd_gettime(r7, &(0x7f0000001540)) r8 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r8, 0x406, r6) r9 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/policy\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r9, 0x40c, &(0x7f00000015c0)=0x3) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001600)='/selinux/status\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000001640)="04ec8cae814509", 0x7) r10 = add_key(&(0x7f0000001680)='blacklist\x00', &(0x7f00000016c0)={'syz', 0x1}, &(0x7f0000001700)="4d7b47a5fc2c90dba0131cc6d82188ec5d56b702fd5fd0ab9eeea27165d97bd01b450bd752c99a7e23e4d676ec93eaee162dda30380378f8", 0x38, 0xfffffffffffffff9) r11 = add_key$user(&(0x7f0000001740)='user\x00', &(0x7f0000001780)={'syz', 0x0}, &(0x7f00000017c0)="05883bf24c9df934661f2fe2d49769620945747390fc6e80a412c0dc85473e9d5564fe6f5793ef974a58607aeb40642172f0a8d683c7ff8d2d72afcf18ad13e50ace501ac9d49500d74331156d5831638f6b4d7717e4ded1d40f84", 0x5b, 0x0) r12 = request_key(&(0x7f0000001840)='syzkaller\x00', &(0x7f0000001880)={'syz', 0x0}, &(0x7f00000018c0)='vmnet1mime_type+vmnet1\x00', 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000001900)={r10, r11, r12}, &(0x7f0000001940)=""/8, 0x8, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000001980)='./file0\x00', &(0x7f00000019c0)='trusted.overlay.upper\x00', &(0x7f0000001a00)={0x0, 0xfb, 0x102, 0x6, 0x4, "9b4a2b70e919739ba88c0df927708855", "369f290ebf85e0e01d238f52354b9a2c4ec2e0abf83d0814b5d4eb021e8830e7d9b4266eac8e717c29af61282c2996a8fbb4854ef6514f0d7bf0a4f1c1cc0e5e5fac140289e19adaa7d5d39a9e5243e16bed89c1018f8dedf3a4f5435ba15c6f8a75c2b34a3321a79323bfd79d357ffb5c65569bd394e599508f9bb096dd7c6b6338b4f1dc2f3884c4fd60e125a350ea128e8a42249bf23f34bbe7291d06e9237e3eb988d574cdb05b53002cccb1f8ee2d46d5cf0e54c5d556d4f6062315deee703c69dbbe595e8b8c7152a1dd2e9bf031ccb98502f3be83398c7ee534b1b3652595eafebe69ad36bf4e3e90b7"}, 0x102, 0x1) prctl$PR_GET_TIMERSLACK(0x1e) 09:45:09 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x900, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) write$cgroup_pid(r0, &(0x7f0000000080)=r1, 0x12) write(r0, &(0x7f00000000c0)="2a0c7d346efeb3349a680f284bf918f8b271782d7dcbf372b5789a00bb1fb5eac2b91cc3cbabc12edff7fb8e779d98cad00b61f94275e97fe549f84c98af46dced83535deb13a4daa081fbdc09ebe0208b067c402a2861d4961d1e9a223508b904136ecd64cb99ef6f2a82145a59f3fa1ee92c846ac10d610238dd917ac60ab2f461", 0x82) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f00000001c0)={{0x4, 0x0, @reserved="10135ce1ca066e616189b322733031ea7818fb503a4e84ac8fafdfbfb64b7ab6"}}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x80000, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0xc, &(0x7f0000000240)=0x6, 0x4) r4 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x140800) ftruncate(r4, 0x24a7) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000001480)='/dev/full\x00', 0x4400, 0x0) getpeername$packet(r5, &(0x7f00000014c0), &(0x7f0000001500)=0x14) pipe(&(0x7f0000001540)) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BLKROTATIONAL(r6, 0x127e, &(0x7f00000015c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001600)=0x0) ptrace$setopts(0x4206, r7, 0x0, 0x4) prctl$PR_SET_UNALIGN(0x6, 0x2) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f0000001640)={'broute\x00'}, &(0x7f00000016c0)=0x78) r8 = accept$inet(0xffffffffffffffff, &(0x7f0000001700)={0x2, 0x0, @dev}, &(0x7f0000001740)=0x10) ioctl$FS_IOC_FSSETXATTR(r8, 0x401c5820, &(0x7f0000001780)={0xdaf2, 0x4, 0x1, 0x0, 0x3}) r9 = openat$selinux_user(0xffffffffffffff9c, &(0x7f00000017c0)='/selinux/user\x00', 0x2, 0x0) write$binfmt_elf64(r9, &(0x7f0000001800)={{0x7f, 0x45, 0x4c, 0x46, 0x42, 0x5, 0x40, 0xf6, 0x2, 0x4, 0x3e, 0x5000000, 0x230, 0x40, 0x90, 0x9, 0x3510, 0x38, 0x2, 0x4d0, 0x0, 0x400}, [{0x7, 0x1000, 0x5, 0x1, 0x0, 0x1, 0x800, 0x3}, {0x7, 0xd4, 0x7b1, 0x8, 0x10001, 0xfffffffffffffff9, 0x39c, 0x3}], "ce60d15862f75771d694", [[], [], [], []]}, 0x4ba) r10 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001cc0)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r10, 0x1, 0x1, &(0x7f0000001d00)={0x81}, 0x4) r11 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001d40)='/selinux/enforce\x00', 0x100, 0x0) mkdirat(r11, &(0x7f0000001d80)='./file0\x00', 0x8) socket$inet6(0xa, 0x6, 0x4) ioctl$PERF_EVENT_IOC_DISABLE(r10, 0x2401, 0x200) r12 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001dc0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r12, 0x0, 0x82, &(0x7f0000001e00)={'broute\x00'}, &(0x7f0000001e80)=0x78) 09:45:09 executing program 4: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x4000, 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='nodev.vboxnet1\x00', &(0x7f00000000c0)='^(md5sum\x00', &(0x7f0000000100)='cpuset%}\x00', &(0x7f0000000140)='-%system\x00', &(0x7f0000000180)='\xc9\x00'], &(0x7f0000000300)=[&(0x7f0000000200)='*md5sum-wlan0.vboxnet1ppp1\x00', &(0x7f0000000240)='(]$vboxnet0!\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)='\x00'], 0x1000) exit_group(0x26) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000340)='/dev/keychord\x00', 0x901400, 0x0) ioctl$BLKFRASET(r1, 0x1264, &(0x7f0000000380)=0x5fe) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, &(0x7f00000003c0)=0x1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000440)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000640)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000480)={0x14c, r2, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x389f708c}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x10000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x400}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x179}]}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @rand_addr=0x100}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x5, @ipv4={[], [], @multicast1}, 0x8000}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'rose0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8001}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x4, @mcast1, 0x1f}}}}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200040}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffeff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x52b9}]}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x459c0}, 0x4000800) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000680)) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f00000006c0)={0x6c, @rand_addr, 0x4e23, 0x0, 'wlc\x00', 0x8, 0x8, 0x5d}, 0x2c) socketpair(0x10, 0x5, 0x3f, &(0x7f0000000700)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = accept4$packet(r4, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14, 0xc0400) openat$ashmem(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/ashmem\x00', 0x101000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in6=@dev, @in=@remote}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000900)=0xe8) r6 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$selinux_access(r6, &(0x7f0000000980)={'system_u:object_r:modules_conf_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x1}, 0x57) r7 = dup3(r5, 0xffffffffffffffff, 0x40000) write$tun(r7, &(0x7f0000000a00)={@void, @val={0x2, 0x3, 0x2, 0x4, 0x9, 0x401}, @ipv4={{0x36, 0x4, 0x0, 0x39, 0x134, 0x64, 0x3, 0xff, 0x1, 0x0, @broadcast, @loopback, {[@cipso={0x86, 0x70, 0x6, [{0x2, 0x11, "5dbd81fa678e1f81c957c12c24f8af"}, {0x1, 0x9, "21e58857699899"}, {0x2, 0x10, "fac740c179c4110042a1adadedfa"}, {0x5, 0x5, "5139d9"}, {0x0, 0x6, "3f49af2c"}, {0x0, 0x2}, {0xc, 0xd, "c909c784451eb7ed897777"}, {0x6, 0x12, "a61eb624ee0c52eeba737760a5d8c152"}, {0x2f4acf814d9c5c35, 0x6, "69d545db"}, {0x0, 0xe, "80a99be9ee6d18c2289877e6"}]}, @timestamp={0x44, 0x24, 0xc1, 0x0, 0x3, [{[], 0xb2}, {[], 0x7}, {[@loopback]}, {[@multicast2], 0x2}, {[@loopback], 0x80000001}]}, @end, @rr={0x7, 0x13, 0x9, [@local, @multicast2, @local, @loopback]}, @ssrr={0x89, 0x1b, 0x2, [@dev={0xac, 0x14, 0x14, 0x1d}, @broadcast, @rand_addr=0x8, @multicast2, @multicast2, @multicast1]}]}}, @udp={0x4e20, 0x4e24, 0x5c, 0x0, [@guehdr={0x1, 0x1, 0x3, 0x1, 0x300}, @guehdr={0x1, 0x1, 0x1, 0x3f, 0x100}, @guehdr={0x1, 0x0, 0x1, 0xff}, @guehdr={0x2, 0x0, 0x0, 0x6, 0x180, [0x0]}, @guehdr={0x1, 0x1, 0x1, 0xff}], "72c29163557778742e143008691614bf47dfaa1f0867ec931a61b3ce294252c8e5f5f052aa00f597397d4f446a70a7f30703c361d1ad3816ae2d5957"}}}, 0x13e) r8 = syz_open_pts(0xffffffffffffffff, 0x1) ioctl$TIOCGSERIAL(r8, 0x541e, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b40)=""/18}) r9 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000c00)='/selinux/member\x00', 0x2, 0x0) flistxattr(r9, &(0x7f0000000c40)=""/243, 0xf3) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000d40)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r10, 0x127d, &(0x7f0000000d80)) r11 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000dc0)) getsockname$unix(r11, &(0x7f0000000e00)=@abs, &(0x7f0000000e80)=0x6e) r12 = openat$null(0xffffffffffffff9c, &(0x7f0000000ec0)='/dev/null\x00', 0x200000, 0x0) getsockopt$SO_COOKIE(r12, 0x1, 0x39, &(0x7f0000000f00), &(0x7f0000000f40)=0x8) socketpair(0x4, 0x6, 0x29, &(0x7f0000000f80)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f0000000fc0), &(0x7f0000001000)=0xc) 09:45:10 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)=0x23) 09:45:10 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000140)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e", 0x24}], 0x1}, 0x0) 09:45:10 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r3, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() r5 = dup(r3) write$cgroup_subtree(r5, 0x0, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x10010000000035) fcntl$setstatus(r3, 0x4, 0x80000000002c00) syzkaller login: [ 63.002134] audit: type=1400 audit(1573638310.889:5): avc: denied { create } for pid=2265 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 63.066066] audit: type=1400 audit(1573638310.949:6): avc: denied { write } for pid=2265 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 63.112120] audit: type=1400 audit(1573638310.999:7): avc: denied { read } for pid=2265 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:45:11 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f00000002c0)={0x10000073db, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26bd}) 09:45:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) io_setup(0x100000000000c333, &(0x7f0000000180)=0x0) io_submit(r1, 0x20000000000001cb, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x400000000000, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0xffffff77}]) 09:45:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000000)="24000000120007031dfffd946fa283000f000a0009000000741d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 63.250921] audit: type=1400 audit(1573638311.139:8): avc: denied { ioctl } for pid=2265 comm="syz-executor.2" path="socket:[7938]" dev="sockfs" ino=7938 ioctlcmd=5409 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 09:45:11 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}}, @igmp={0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}}}}}, 0x0) [ 63.316316] kasan: CONFIG_KASAN_INLINE enabled [ 63.320894] kasan: GPF could be caused by NULL-ptr deref or user memory accessgeneral protection fault: 0000 [#1] PREEMPT SMP KASAN [ 63.333869] Modules linked in: [ 63.337193] CPU: 1 PID: 2308 Comm: syz-executor.4 Not tainted 4.4.174+ #4 [ 63.344115] task: ffff8801be664740 task.stack: ffff8800b21f8000 [ 63.350169] RIP: 0010:[] [] __list_del_entry_valid+0x7c/0x1a0 [ 63.359431] RSP: 0018:ffff8800b21ff5d8 EFLAGS: 00010246 [ 63.364990] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff8800b4105a10 [ 63.372266] RDX: 0000000000000000 RSI: ffffffff83ad6c90 RDI: ffff8800b4105a18 [ 63.379540] RBP: ffff8800b21ff5f0 R08: 0000000000000000 R09: 1ffffffff075ad93 [ 63.387336] R10: 000000000075bf20 R11: 0000000000000000 R12: ffff8800b4105a18 [ 63.394606] R13: ffff8801c1c4e280 R14: ffff8800b41059b9 R15: ffff8800b4105a38 [ 63.401881] FS: 00007f825f245700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 [ 63.410111] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 63.416002] CR2: 0000000000b9b668 CR3: 00000001d2368000 CR4: 00000000001606b0 [ 63.423288] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 63.430563] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 63.437853] Stack: [ 63.439996] ffffffff82717d94 ffffffff8255c29c ffff8800b4105a10 ffff8800b21ff628 [ 63.448199] ffffffff8255c2a4 ffff8801d2e1d500 ffff8800b4105a10 ffff8800b4812b40 [ 63.456261] ffff8800b41059b9 ffff8800b4105a38 ffff8800b21ff648 ffffffff825784e3 [ 63.464329] Call Trace: 09:45:11 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000280)=""/107, 0x6b) 09:45:11 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = dup(r0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RRENAMEAT(r1, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) 09:45:11 executing program 5: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, 0x0) 09:45:11 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) lchown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 09:45:11 executing program 2: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000280)=0x23) ioctl$TCSETSF(r0, 0x5402, &(0x7f0000000080)) [ 63.466936] [] ? _raw_spin_lock_bh+0x44/0x50 [ 63.472997] [] ? xfrm_state_walk_done+0x7c/0x1e0 [ 63.479417] [] xfrm_state_walk_done+0x84/0x1e0 [ 63.485657] [] xfrm_dump_sa_done+0x73/0xa0 [ 63.491719] [] ? xfrm_get_policy+0x8c0/0x8c0 [ 63.497786] [] netlink_dump+0x76b/0xad0 [ 63.503414] [] __netlink_dump_start+0x4ca/0x750 [ 63.509731] [] ? __netlink_ns_capable+0xe2/0x130 09:45:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close(r0) 09:45:11 executing program 0: [ 63.516249] [] xfrm_user_rcv_msg+0x556/0x630 [ 63.522315] [] ? xfrm_user_rcv_msg+0x630/0x630 [ 63.528556] [] ? xfrm_dump_sa_done+0xa0/0xa0 [ 63.534623] [] ? xfrm_user_rcv_msg+0x630/0x630 [ 63.540864] [] ? xfrm_get_policy+0x8c0/0x8c0 [ 63.546928] [] ? mark_held_locks+0xb1/0x100 [ 63.552906] [] ? xfrm_netlink_rcv+0x61/0x90 [ 63.558884] [] ? mutex_lock_nested+0x7dd/0xb80 [ 63.565123] [] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 63.571964] [] ? mutex_lock_nested+0x645/0xb80 [ 63.578360] [] ? xfrm_netlink_rcv+0x61/0x90 [ 63.584341] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 63.591101] [] ? mutex_trylock+0x500/0x500 [ 63.596993] [] netlink_rcv_skb+0xd4/0x2e0 [ 63.602933] [] ? xfrm_dump_sa_done+0xa0/0xa0 [ 63.609005] [] xfrm_netlink_rcv+0x70/0x90 [ 63.614906] [] netlink_unicast+0x4d7/0x700 [ 63.620786] [] ? netlink_sendskb+0x60/0x60 [ 63.626665] [] netlink_sendmsg+0x6b6/0xc80 [ 63.632742] [] ? nlmsg_notify+0x170/0x170 [ 63.638530] [] ? selinux_socket_sendmsg+0x3f/0x50 [ 63.645006] [] ? security_socket_sendmsg+0x8f/0xc0 [ 63.651570] [] ? nlmsg_notify+0x170/0x170 [ 63.657354] [] sock_sendmsg+0xbe/0x110 [ 63.663138] [] ___sys_sendmsg+0x769/0x890 [ 63.668922] [] ? copy_msghdr_from_user+0x550/0x550 [ 63.675500] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 63.682240] [] ? check_preemption_disabled+0x3c/0x200 [ 63.689255] [] ? check_preemption_disabled+0x3c/0x200 [ 63.696079] [] ? __fget+0x13b/0x370 [ 63.701524] [] ? __fget+0x162/0x370 [ 63.706795] [] ? __fget+0x47/0x370 [ 63.711969] [] ? __fget_light+0xa3/0x1f0 [ 63.717806] [] ? __fdget+0x1b/0x20 [ 63.722990] [] __sys_sendmsg+0xc5/0x160 [ 63.728608] [] ? SyS_shutdown+0x1a0/0x1a0 [ 63.734411] [] ? SyS_clock_gettime+0x118/0x1e0 [ 63.740805] [] ? SyS_clock_settime+0x220/0x220 [ 63.747021] [] SyS_sendmsg+0x2d/0x50 [ 63.752370] [] entry_SYSCALL_64_fastpath+0x1e/0x9a [ 63.759363] Code: 00 ad de 4c 8b 01 49 39 c0 74 66 48 b8 00 02 00 00 00 00 ad de 48 39 c3 74 78 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85 fb 00 00 00 48 8b 03 48 39 c8 75 74 49 8d 78 [ 63.786657] RIP [] __list_del_entry_valid+0x7c/0x1a0 [ 63.793539] RSP [ 63.797214] ---[ end trace 7d5ac93d4e7753bf ]--- [ 63.802095] Kernel panic - not syncing: Fatal exception in interrupt [ 63.809960] Kernel Offset: disabled [ 63.813591] Rebooting in 86400 seconds..