[ 9.986572] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 37.763722] random: sshd: uninitialized urandom read (32 bytes read) [ 37.956704] audit: type=1400 audit(1568698300.306:6): avc: denied { map } for pid=1768 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 38.004519] random: sshd: uninitialized urandom read (32 bytes read) [ 38.557118] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.17' (ECDSA) to the list of known hosts. [ 44.111443] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/17 05:31:46 fuzzer started [ 44.202412] audit: type=1400 audit(1568698306.556:7): avc: denied { map } for pid=1783 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 44.995063] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/17 05:31:48 dialing manager at 10.128.0.26:37833 2019/09/17 05:31:48 syscalls: 1347 2019/09/17 05:31:48 code coverage: enabled 2019/09/17 05:31:48 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/17 05:31:48 extra coverage: extra coverage is not supported by the kernel 2019/09/17 05:31:48 setuid sandbox: enabled 2019/09/17 05:31:48 namespace sandbox: enabled 2019/09/17 05:31:48 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/17 05:31:48 fault injection: CONFIG_FAULT_INJECTION is not enabled 2019/09/17 05:31:48 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/17 05:31:48 net packet injection: enabled 2019/09/17 05:31:48 net device setup: enabled [ 47.298420] random: crng init done 05:32:43 executing program 0: mknod(&(0x7f0000000140)='./bus\x00', 0xa88, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) lsetxattr$security_selinux(&(0x7f0000000180)='./bus\x00', &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:mount_exec_t:s0\x00', 0x22, 0x0) clone(0x7fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000280)='./bus\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) 05:32:43 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:32:43 executing program 1: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x1000000000000, 0x102, 0x1, 0x0, 0x6, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast1, 0x400, 0x0, 0x1, 0x3}, 0x20) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x0, 0x4bd5, @loopback, 0x2}, 0x17f) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') r2 = request_key(&(0x7f0000000040)='syzkaller\x00', &(0x7f0000000480)={'syz', 0x3}, &(0x7f0000000140)='sched\x00', 0xffffffffffffffff) r3 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$link(0x8, r2, r3) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r3) keyctl$revoke(0x3, r4) sendfile(r1, r1, &(0x7f00000002c0)=0x202, 0xdd) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50, r5}) 05:32:43 executing program 3: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup(0xffffffffffffffff) ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\xaeC\xae\xc4\x05\xa9\xbd~\xfb\x96\xf7,k\x1a+@\xe54\x01\x01\x01\x00w\xa7\x04~\\\xd4Y\x04\xaf^\xc6\xf2\x98\"\xa0\xa1\x04\xaf\x81\x00ov\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)=""/58, 0x3a}], 0x1, 0x0) [ 100.779147] audit: type=1400 audit(1568698363.126:8): avc: denied { map } for pid=1783 comm="syz-fuzzer" path="/root/syzkaller-shm086786779" dev="sda1" ino=16491 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 100.808085] audit: type=1400 audit(1568698363.136:9): avc: denied { map } for pid=1831 comm="syz-executor.5" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5044 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 05:32:45 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x0) 05:32:45 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0800a1695e1dcfe87b1071") setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000040)="6a08da0b", 0x16a) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x41) sendto$inet6(r0, &(0x7f0000000100)="ce03110075000100ff901efc67195c22cc66bf00000000070000e1", 0x18a, 0x0, 0x0, 0x0) 05:32:45 executing program 5: 05:32:45 executing program 5: 05:32:45 executing program 5: syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) keyctl$setperm(0x5, 0x0, 0x0) syz_open_dev$binder(0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x254) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(0x0, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, 0x0, 0x0) getpgrp(0xffffffffffffffff) write(r1, &(0x7f0000000140)="f3fbd2e58ffbc7bba0679c67fdcd14c4ac2ca59d13f3dea78d6eed67dd8f4381b16d21d186082ea9033a58f1f07f15bacab07e295bf99c00efb43b36dda8b3c81e83786c1021f6feedb7f749", 0x4c) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 103.323690] audit: type=1400 audit(1568698365.676:10): avc: denied { create } for pid=2636 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 103.359465] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. [ 103.378768] audit: type=1400 audit(1568698365.676:11): avc: denied { write } for pid=2636 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 103.434701] audit: type=1400 audit(1568698365.706:12): avc: denied { read } for pid=2636 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 05:32:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') readv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/134, 0x4b}, {&(0x7f0000000100)=""/110, 0x3c7}], 0x2) 05:32:47 executing program 0: 05:32:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0x8, 0xc, [{0x2}]}]}, 0x28}}, 0x0) [ 104.682525] audit: type=1401 audit(1568698367.036:13): op=security_bounded_transition seresult=denied oldcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 newcontext=unconfined_u:system_r:mount_t:s0-s0:c0.c1023 05:32:47 executing program 1: 05:32:47 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000180)="11dca50d5e0bcfe47bf070") listen(r1, 0x0) sendto$inet6(r0, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @loopback}, 0x1c) [ 104.767382] PF_BRIDGE: RTM_SETLINK with unknown ifindex 05:32:47 executing program 0: [ 104.816429] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. 05:32:47 executing program 4: 05:32:47 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x0, 0x0) 05:32:47 executing program 1: 05:32:47 executing program 0: 05:32:47 executing program 3: 05:32:47 executing program 0: 05:32:47 executing program 1: 05:32:47 executing program 3: 05:32:47 executing program 0: 05:32:47 executing program 1: 05:32:48 executing program 5: 05:32:48 executing program 4: 05:32:48 executing program 3: 05:32:48 executing program 0: 05:32:48 executing program 1: 05:32:48 executing program 2: [ 105.617417] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. 05:32:48 executing program 3: 05:32:48 executing program 2: 05:32:48 executing program 4: 05:32:48 executing program 0: 05:32:48 executing program 1: 05:32:48 executing program 5: 05:32:48 executing program 1: 05:32:48 executing program 0: 05:32:48 executing program 4: 05:32:48 executing program 3: 05:32:48 executing program 2: 05:32:48 executing program 5: 05:32:48 executing program 3: 05:32:48 executing program 2: 05:32:48 executing program 3: 05:32:48 executing program 5: 05:32:48 executing program 1: 05:32:48 executing program 4: 05:32:48 executing program 0: 05:32:48 executing program 2: 05:32:48 executing program 3: 05:32:48 executing program 1: 05:32:48 executing program 5: 05:32:48 executing program 0: 05:32:48 executing program 2: 05:32:48 executing program 1: 05:32:48 executing program 3: 05:32:48 executing program 4: 05:32:48 executing program 5: 05:32:48 executing program 1: 05:32:48 executing program 0: 05:32:48 executing program 2: 05:32:48 executing program 3: 05:32:48 executing program 4: 05:32:48 executing program 5: 05:32:48 executing program 2: 05:32:48 executing program 0: 05:32:48 executing program 1: 05:32:48 executing program 4: 05:32:48 executing program 5: 05:32:48 executing program 3: 05:32:48 executing program 2: 05:32:48 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) flock(r0, 0x8) 05:32:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaaaa0806000608000604000120a98e1fc212a8141400aaaaaaaaaabbac1414aa"], 0x0) 05:32:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_group_source_req(r0, 0x29, 0x2c, &(0x7f00000000c0)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr="7d95ae6a060000e5ff00"}}}, 0x108) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(0xffffffffffffffff, r2, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) capget(&(0x7f00000002c0)={0x20080522}, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 05:32:48 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fallocate(r1, 0x0, 0xd028, 0x816d1) write$P9_RFLUSH(r1, &(0x7f0000000100)={0x7}, 0x7) fsync(r1) 05:32:48 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000340)='clear_refs\x00g\xff\xca\x02\x8a\xf0\xe1ZM\xfa@\x1bS0\x11\xbe\xdc\xdc\xdd\xc1\x17~\x18\xd6\xa5\x88Cd**\xde\xae\xaf\xcf\t\xec0\x04\xe7\xf3\"\b9\xb5\x96VR+\xbb\xa0a\xbb\xc8') r1 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x009\xda\xd3\xc4D\xdeJ5\xf0\xfd\"=\xb6\xaa\x1e/\xddc\xc9\xf3_8\x9eFi\xe0\xafe\"\xc2%\xbb\xb6E\xae\x9e\x0fF\xc8|\xd4M\xb4\x91\x9c\x1a4\xab\x1d\x00\xbbAW\xf7\x9b#\x91.\x9b\x96Vn\xbf#a\x8d\xfd\xd31\xfc\xac\xfe\xcc\xdb\x93\x89t\xf4\x8dB\fI\xe5\xb3\x7f\x94\xbd\xb6Q\xb9\xc1\x02e\x904\xf4\x19/') sendfile(r0, r1, 0x0, 0x1) fdatasync(0xffffffffffffffff) 05:32:48 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x48, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8, 0x1, 'htb\x00'}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0xfd08, &(0x7f0000000080)={&(0x7f0000000100)=@newqdisc={0xa8, 0x24, 0x507, 0x0, 0x0, {0x0, r4, {}, {0x0, 0xffff}}}, 0xa8}}, 0x0) 05:32:48 executing program 0: 05:32:48 executing program 1: 05:32:48 executing program 4: 05:32:48 executing program 0: 05:32:48 executing program 1: 05:32:48 executing program 3: 05:32:48 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp\x00') preadv(r0, &(0x7f00000017c0), 0x333, 0x0) lseek(r0, 0x0, 0x0) 05:32:48 executing program 4: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x28d) sendmmsg(r1, &(0x7f00000096c0)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000002440)=@tipc=@nameseq={0x1e, 0x2, 0x0, {0x0, 0x2}}, 0x80, 0x0}}], 0x2, 0x0) 05:32:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'ip_vti0\x00\x00\x00\x00\x02\x00\x00\x06Q', 0x791f}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) pivot_root(0x0, 0x0) 05:32:49 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000080)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x34, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0xd, 0x2, 0x0, 0x0, 0x0, {[@sack={0x5, 0x1e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}}}}}}, 0x0) 05:32:49 executing program 3: syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={[{@fat=@gid={'gid'}}]}) [ 106.613151] netlink: 132 bytes leftover after parsing attributes in process `syz-executor.2'. [ 106.629969] netlink: 132 bytes leftover after parsing attributes in process `syz-executor.2'. [ 106.648865] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Dropping request. Check SNMP counters. 05:32:49 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000882, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xd) write(r0, &(0x7f0000000040)="5300d3f8b6cfaccdc9c8ba241315cd21a3cc3289bd32b4c15ab2d7539eede0d908b928004f4eac536ced31f56fed3b88daa0d425863884977e682bb596e7b15113f49630c55a494ecf2ef5fd6269e7483eeedfa95fcbda0b68764f32dd509a6c4f177f8d3f3ab5bd6164eeb9222504561bd828632b4b12c0977e74b114260b07d1a0e5e4fa24f0559cc12a05bb04230c77f559efea4dab5dbf7bb11df368e8b3c78f0c26824631d541b482b301e27d492d763b75c0fbe38e8c68ca1b7b2ddb04a1edaaae54b7eee0970a370969dd190617bea09507a6", 0xffffffe4) ioctl$TCXONC(r0, 0x540a, 0x0) 05:32:49 executing program 2: r0 = socket$inet6(0xa, 0x20000000000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000240)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0xff}, 0xa, @in, 0x0, 0x1}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000000580)=@in={0x2, 0x4e21, @multicast2}, 0x80, 0x0}}], 0x2, 0x0) 05:32:49 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x2, 0x0) read(r0, &(0x7f0000000200)=""/255, 0xff) write$UHID_CREATE(r0, &(0x7f00000000c0)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000000)=""/53, 0x35}, 0x120) 05:32:49 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000009c0)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd0\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7\x95\xaeV\x0f\x9e\xed\x13\xc6H\v\xb7\xd0g!`\x18\x0f\x99\xadD-\xc8{\xbc\xb2\xb9Y\xe2P\x9b\xec\x1e_\xb4\x01\xf1\x1e\xa8\xf8\xdf?#p-\xbd3\"L\xe5\x7f\nC\x00}\x0eb\xbc\xa4}\x93\x9a\t\xf4\xfa\xbew D\x00\xb0Z\xc0\x1a\xf9\x924\a\x1c4\xfa\xe4\xe2\x8e\xe8\x19\x00\x05\xb7\xd51)\b\xf2#[-\xbf\x7f\x10\x14vy\x86\x85\xa4W\r\xe8i\x95\xc9\xe6\xf8\a\xd8\xe2\xdf\xc8\x97\xa2\b{b\xca\x95u:\v\x97\b\r@g\x80\x8d_\x18y\xd1\x8d\xc1)U`\xb9\xe2\xd7\x88\xc2\xaf\xdc\xc1\xda\xcc\xca\x9a\v\xact8Z\x1c\x06\x1b\xdf\xb5\xc1\"\x05,Yw\vP\xcc\xfa\xf9\x9f<\xbd\x1c\x1a\xcb*\x06\xb7\xcd\x7f\xba\xadr\xbb/\"2p\xf8\b\x1e\x04\xac*\x88\xb0\xa7\xc6\xb4M\x97n\xdck\xd1\\\x9f\x9d\x1a4 Y\xac\xcb\xf9f\xcf>qd\vn:\x12\xc0\xdca\xfd\x8d\x9dL\x92\x17\x8fe\xd1\xaa$\x12\x02R\x96t?\x9a\x1a') readv(r0, &(0x7f0000000240)=[{&(0x7f0000000000)=""/134, 0x1f3}, {&(0x7f0000000100)=""/110, 0x3c7}], 0x2) 05:32:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000500)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'ip_vti0\x00\x00\x00\x00\x02\x00\x00\x06Q', 0x791f}) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) pivot_root(0x0, 0x0) [ 106.650288] netlink: 132 bytes leftover after parsing attributes in process `syz-executor.2'. [ 106.672382] hrtimer: interrupt took 25149 ns [ 106.701002] FAT-fs (loop3): bogus number of reserved sectors 05:32:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0xe000) [ 106.726924] FAT-fs (loop3): Can't find a valid FAT filesystem [ 106.754847] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 05:32:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0xda00) write$cgroup_int(r2, &(0x7f0000000200), 0x2000) 05:32:49 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='devtmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000100)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) preadv(r0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000000c0)=""/58, 0x3a}], 0x2, 0x1) [ 106.780194] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 106.811578] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 05:32:49 executing program 5: prctl$PR_SET_MM(0x2f, 0x0, &(0x7f0000ffd000/0x3000)=nil) 05:32:49 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000040)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x18, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@fastopen={0x22, 0x2}]}}}}}}}}, 0x0) [ 106.843591] FAT-fs (loop3): bogus number of reserved sectors [ 106.850745] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 106.862747] FAT-fs (loop3): Can't find a valid FAT filesystem [ 106.875135] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 106.885525] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 05:32:49 executing program 2: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a000900010001e700000000a3a20404ff7e", 0x24}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x13, &(0x7f00000000c0)=[{&(0x7f0000000100)="24000000030307031dfffd946ff20c0020200a0009000100401d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 05:32:49 executing program 3: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) r2 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) keyctl$revoke(0x3, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, 0x0, 0x2000100) keyctl$revoke(0x3, 0x0) request_key(0x0, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, 0x0, 0x0, 0x0) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0x34c, 0x0) write$P9_RXATTRWALK(0xffffffffffffffff, 0x0, 0x40d) pipe(0x0) getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0xfffffffffffffdeb, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) syz_open_procfs(0x0, 0x0) r4 = dup(r2) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0xfcf0, 0x24000008, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000200)='./file0\x00', 0x110000141042, 0x0) ftruncate(r5, 0x10099b7) sendfile(r4, r5, 0x0, 0x88000fbfffffa) connect$unix(r4, &(0x7f0000000080)=@abs, 0x6e) [ 106.893275] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 106.900277] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 106.907500] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 05:32:49 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x4, {{0x2, 0x0, @multicast1}}}, 0x88) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000), &(0x7f0000000080)=0x2e5) 05:32:49 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/if_inet6\x00') preadv(r0, &(0x7f0000000280)=[{&(0x7f0000000380)=""/4096, 0x1000}], 0x1, 0x0) [ 106.936228] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 106.949996] audit: type=1400 audit(1568698369.296:14): avc: denied { create } for pid=3023 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 106.978448] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 107.013796] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.024710] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.030012] kasan: CONFIG_KASAN_INLINE enabled [ 107.044847] audit: type=1400 audit(1568698369.326:15): avc: denied { write } for pid=3023 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 107.045910] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 107.072968] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.090579] general protection fault: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 107.094972] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.097360] Modules linked in: [ 107.097370] CPU: 1 PID: 3038 Comm: syz-executor.3 Not tainted 4.14.144+ #0 [ 107.097378] task: 00000000cf5623c8 task.stack: 0000000059ed60c8 [ 107.104143] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.107209] RIP: 0010:do_tcp_sendpages+0x33c/0x1780 [ 107.107216] RSP: 0018:ffff88819d7576a8 EFLAGS: 00010206 [ 107.114525] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.120259] RAX: 000000000000000f RBX: 0000000000000000 RCX: 0000000000005d77 [ 107.120264] RDX: ffffffff8252c8ea RSI: ffffc90003318000 RDI: 0000000000000078 [ 107.120269] RBP: 0000000000005580 R08: 0000000000000001 R09: 0000000000000001 [ 107.120273] R10: fffffbfff3645ba5 R11: ffffffff9b22dd2b R12: ffffea00067804c0 [ 107.120278] R13: dffffc0000000000 R14: ffff8881d3992c00 R15: 0000000000028000 [ 107.120286] FS: 00007fb4971c3700(0000) GS:ffff8881dbb00000(0000) knlGS:0000000000000000 [ 107.126973] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.131927] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 107.131931] CR2: 0000000000c183d8 CR3: 00000001c3104005 CR4: 00000000001606a0 [ 107.131939] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 107.131943] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 107.131946] Call Trace: [ 107.131969] ? blk_finish_plug+0x50/0x97 [ 107.137638] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.143990] ? sk_stream_alloc_skb+0x8a0/0x8a0 [ 107.144007] tcp_sendpage_locked+0x81/0x130 [ 107.144020] tcp_sendpage+0x3a/0x60 [ 107.151351] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.158546] inet_sendpage+0x197/0x5d0 [ 107.158554] ? tcp_sendpage_locked+0x130/0x130 [ 107.158564] ? inet_getname+0x390/0x390 [ 107.166368] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.173230] kernel_sendpage+0x84/0xd0 [ 107.173241] sock_sendpage+0x84/0xa0 [ 107.173254] pipe_to_sendpage+0x23d/0x300 [ 107.173262] ? kernel_sendpage+0xd0/0xd0 [ 107.180584] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.188741] ? direct_splice_actor+0x160/0x160 [ 107.188751] ? splice_from_pipe_next.part.0+0x1e4/0x290 [ 107.188762] __splice_from_pipe+0x331/0x740 [ 107.195769] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.201292] ? direct_splice_actor+0x160/0x160 [ 107.201302] ? direct_splice_actor+0x160/0x160 [ 107.201312] splice_from_pipe+0xd9/0x140 [ 107.210555] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.217769] ? splice_shrink_spd+0xb0/0xb0 [ 107.217783] ? security_file_permission+0x88/0x1e0 [ 107.225305] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.228562] ? splice_from_pipe+0x140/0x140 [ 107.228573] direct_splice_actor+0x118/0x160 [ 107.232685] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.239293] splice_direct_to_actor+0x292/0x760 [ 107.239304] ? generic_pipe_buf_nosteal+0x10/0x10 [ 107.244122] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.248202] ? do_splice_to+0x150/0x150 [ 107.248211] ? security_file_permission+0x88/0x1e0 [ 107.248224] do_splice_direct+0x177/0x240 [ 107.251911] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.258672] ? splice_direct_to_actor+0x760/0x760 [ 107.258684] ? security_file_permission+0x88/0x1e0 [ 107.262855] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.267122] do_sendfile+0x493/0xb20 [ 107.267136] ? do_compat_pwritev64+0x170/0x170 [ 107.271148] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.277734] ? put_timespec64+0xbe/0x110 [ 107.277742] ? nsecs_to_jiffies+0x30/0x30 [ 107.277754] SyS_sendfile64+0x11f/0x140 [ 107.281867] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.285311] ? SyS_sendfile+0x150/0x150 [ 107.285321] ? do_clock_gettime+0xd0/0xd0 [ 107.289486] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.293493] ? fput+0x19/0x150 [ 107.293508] ? do_syscall_64+0x43/0x520 [ 107.293516] ? SyS_sendfile+0x150/0x150 [ 107.293525] do_syscall_64+0x19b/0x520 [ 107.300460] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.304759] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 107.304767] RIP: 0033:0x4598e9 [ 107.310161] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.314411] RSP: 002b:00007fb4971c2c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 107.314420] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004598e9 [ 107.314426] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 0000000000000008 [ 107.322926] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.327194] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 107.327199] R10: 00088000fbfffffa R11: 0000000000000246 R12: 00007fb4971c36d4 [ 107.327203] R13: 00000000004c709e R14: 00000000004dc750 R15: 00000000ffffffff [ 107.327215] Code: [ 107.331821] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.335809] 24 08 48 0f 44 [ 107.342681] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.346676] d8 e8 24 4d de [ 107.351646] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.358240] fe 48 85 ed 0f 84 [ 107.362737] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.366935] 7e 03 00 00 e8 [ 107.373669] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.378262] 16 4d de fe 48 8d [ 107.383284] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.389735] 7b 78 8b ac 24 c8 [ 107.393750] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.398606] 00 00 00 48 89 f8 [ 107.402920] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.409383] 48 c1 e8 03 <42> 0f [ 107.414266] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.419122] b6 04 28 84 c0 74 [ 107.426064] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.429571] 08 3c 03 0f 8e 15 [ 107.434187] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.440785] 11 00 00 2b 6b 78 85 [ 107.440814] RIP: do_tcp_sendpages+0x33c/0x1780 RSP: ffff88819d7576a8 [ 107.459161] ---[ end trace f7b34464c7ada4f8 ]--- [ 107.461801] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.469708] Kernel panic - not syncing: Fatal exception [ 107.475215] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 107.478033] Kernel Offset: 0x17a00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 107.713523] Rebooting in 86400 seconds..