[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 10.324132] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 13.061162] random: sshd: uninitialized urandom read (32 bytes read) [ 13.185771] audit: type=1400 audit(1567931619.609:6): avc: denied { map } for pid=1762 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 13.227699] random: sshd: uninitialized urandom read (32 bytes read) [ 13.827305] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.203' (ECDSA) to the list of known hosts. [ 19.355822] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/08 08:33:45 fuzzer started [ 19.450576] audit: type=1400 audit(1567931625.879:7): avc: denied { map } for pid=1771 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 19.996499] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/08 08:33:47 dialing manager at 10.128.0.26:44651 2019/09/08 08:33:47 syscalls: 1347 2019/09/08 08:33:47 code coverage: enabled 2019/09/08 08:33:47 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/08 08:33:47 extra coverage: extra coverage is not supported by the kernel 2019/09/08 08:33:47 setuid sandbox: enabled 2019/09/08 08:33:47 namespace sandbox: enabled 2019/09/08 08:33:47 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/08 08:33:47 fault injection: CONFIG_FAULT_INJECTION is not enabled 2019/09/08 08:33:47 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/08 08:33:47 net packet injection: enabled 2019/09/08 08:33:47 net device setup: enabled [ 22.183859] random: crng init done 08:34:59 executing program 5: socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x3, 0x1, &(0x7f0000000040)={r0, r1+10000000}, 0x0) r2 = add_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="c04480ca48688c5766ee48eb7bde1eada6972e0f0dc51af70aec3ca89edb18a31612446283405a89a43042d91229c133d213be5c6b83923af3881b6c8cade046f217c26d03afd54cdc21657eb6a24eaa55035ae2bd19797dd81a281b95de3e40d8415891c71ff9d32a8c8dc2443931bccdca8c07d7669bee3b47a3d837c93a265bc07230db99f6f200be882388cdc29afd215e1f5178f51edcec904c834253544c31fb5216e214155d0a9bd20bf49d4caa91c65f3978a48e97813fcdbdfe8d8e1dc26844fa05381a", 0xc8, 0xfffffffffffffffc) request_key(&(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000100)=')userppp1\x00', r2) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x500}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r3, 0x411, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x24044815) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000400)={0x0, 0x6d, 0x96}, 0x0, &(0x7f0000000440)="c15b2cd38332a78a125473eac6c71f06ebf25af502ab74d512355a3bfe7c9be109e56d16bda9f6549df175c2b0bf6eaacf2e64fbf9034cd5588a8369accf31a6fdee600c2eca4562d2009c6c9923be3d5406b400be563776c51afddd20bddab4422590b78c5f315c44d1d59e3a", &(0x7f00000004c0)="2b326492db78bf8240cdf863761f5f1ac3c4cb2602ce62815bcb1c132beb6d1fc9f6c553a162fd70f7c912edf760d7a411c95a7d5505ecfcc4502b796a7ffd2329f19122ddaa139dac0dd90042e7849792ff4067f79f50747e4dbf680f7477e90c59ea05dde742d3f06b263543ef1ebacdd7a69269f1040c09f67f25710f88f449b240ef53a667025aa3de96f77c17dff03fb840d9ba") setrlimit(0x8, &(0x7f0000000580)={0xc2, 0x3ff}) request_key(&(0x7f00000005c0)='big_key\x00', &(0x7f0000000600)={'syz', 0x2}, &(0x7f0000000640)='ppp0\x00', 0xfffffffffffffffb) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/full\x00', 0x408200, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000c80)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r4, &(0x7f0000000dc0)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000d80)={&(0x7f0000000cc0)={0xb4, r5, 0x300, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x80, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf7}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1d6e}]}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000000}, 0x50) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000ec0)={&(0x7f0000000e00)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000e80)={&(0x7f0000000e40)={0x2c, 0x32, 0x1a0, 0x70bd2a, 0x25dfdbfe, {0x18}, [@typed={0xc, 0x63, @u64=0x1}, @typed={0x4, 0x15}, @typed={0x8, 0x4c, @str='\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000000}, 0xe9df510b9a50b68d) openat$uhid(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/uhid\x00', 0x2, 0x0) r7 = syz_open_pts(0xffffffffffffffff, 0x400100) ioctl$TIOCGPTPEER(r7, 0x5441, 0x1) lsetxattr$security_evm(&(0x7f0000000f40)='./file0\x00', &(0x7f0000000f80)='security.evm\x00', &(0x7f0000000fc0)=@v2={0x3, 0x2, 0x7, 0x49, 0xa9, "69a00e8db0d5601430e550891487b501c82cd2e7c094954e0c9fcdd5665ed04199638524a705392d1aa8d6f0d6c4780e730054aa1ca3294357a15208a51a3572664b2cb76e0a5cb1c91887bc30767d60566e385fff0c23088e7f5bb75fbd73d3779db555f379501c21b7e3c098aa78cdc746314c2bbc809b92da6dae86fbf2e0d0b13234a9f363833c706c9695bfa80b73ef27609bed26eb891c1d45a24563b4e6ae7b04a538ac475b"}, 0xb3, 0x0) syncfs(0xffffffffffffffff) r8 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000001100)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r8, &(0x7f00000011c0)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x1c, r9, 0x100, 0x70bd28, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000084}, 0x100) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001280)=0x0) r11 = openat$null(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/null\x00', 0x101000, 0x0) perf_event_open(&(0x7f0000001200)={0x4, 0x70, 0x4, 0x61, 0x742, 0x0, 0x0, 0x6, 0x400, 0x6, 0x100, 0x4, 0x1000, 0x1, 0x4, 0x9, 0x5, 0x0, 0x5, 0x2, 0x0, 0x200000000000000, 0x8fd, 0x10001, 0x0, 0x2, 0x80, 0x8, 0x5, 0x4, 0x40, 0x5, 0xee0a, 0x9, 0x4, 0xfb1, 0xcdfb, 0x3, 0x0, 0x3, 0x1, @perf_config_ext={0x800, 0x2400000000000000}, 0x108, 0x7b9, 0x9, 0x8, 0x77, 0x4, 0x5}, r10, 0x7, r11, 0xb) ioctl$BINDER_SET_MAX_THREADS(r11, 0x40046205, &(0x7f0000001300)=0xfffffffffffffc01) r12 = openat(0xffffffffffffffff, &(0x7f0000001340)='./file0\x00', 0x280201, 0x40) ioctl$sock_inet6_udp_SIOCINQ(r12, 0x541b, &(0x7f0000001380)) r13 = openat$cgroup_ro(r11, &(0x7f00000013c0)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r13, 0x400c55cb, &(0x7f0000001400)={0x1, 0x2, 0x9}) 08:34:59 executing program 0: seccomp(0x1, 0x1, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x8, 0x7, 0x0, 0x2}]}) r0 = dup(0xffffffffffffffff) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000080)) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x1802, 0x0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000100)=0x2) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r2, 0x81, &(0x7f0000000180)=""/114) r3 = syz_open_dev$binder(&(0x7f0000000200)='/dev/binder#\x00', 0x0, 0xd704c1592e19e872) fcntl$getown(r3, 0x9) r4 = accept4(0xffffffffffffffff, &(0x7f0000000240)=@hci, &(0x7f00000002c0)=0x80, 0x80000) setsockopt$inet_tcp_buf(r4, 0x6, 0x3d, &(0x7f0000000300)="7c3f29cb8472e28def71d8284ada4b57d86b5bb742a0b58b6c0041d7699c84aa8e7377d6e071f50c685684f216a394b4afea5e494c0798711ec2c7bcc957a6e2", 0x40) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/user\x00', 0x2, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000380)=0x20) openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x0, 0x0) r6 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r6, 0x400454da, &(0x7f0000000440)) r7 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCLINUX2(r7, 0x541c, &(0x7f00000004c0)={0x2, 0x2cb31fb1, 0x4, 0x7fff, 0x3, 0x80000001}) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/net/pfkey\x00', 0x305080, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r8, 0x5411, &(0x7f0000000540)) r9 = openat$null(0xffffffffffffff9c, &(0x7f0000000580)='/dev/null\x00', 0x20000, 0x0) openat$cgroup_ro(r9, &(0x7f00000005c0)='cgroup.events\x00', 0x0, 0x0) r10 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x26, &(0x7f0000000640)={@rand_addr=0x7, @loopback, @multicast1}, 0xc) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f00000006c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r10, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x24, r11, 0x1100, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x401}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x312}]}, 0x24}, 0x1, 0x0, 0x0, 0x400000c}, 0x0) mremap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/user\x00', 0x2, 0x0) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x10dfb201cd154cbc) 08:34:59 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @dev}, &(0x7f0000000080)=0xc) sendmsg(r0, &(0x7f0000000680)={&(0x7f00000000c0)=@xdp={0x2c, 0x1, r1, 0x29}, 0x80, &(0x7f0000000540)=[{&(0x7f0000000140)="33d9ab3f48aa452961109de5f03142f3db7c7da69d3b6353333776a122ea607b6e15af87e4ca937d13169da43603f6ea9f30a62a1a1f21752b08907cf277320bf92ed69ca32de4a60d444fa64df1627f1a15a1b8a124abcf3b5a87a7bda2", 0x5e}, {&(0x7f00000001c0)="53fb06c0a71f9a64230a27901d3097c84814127e263dc566855da3afc7acb1f8c8be012b27d659f1ab", 0x29}, {&(0x7f0000000200)="6e62c0daee6462b3f4f16c79e2227755fa537c3b6b9b167cbba9bcc7e4fa15a464fb9aedabcdddd65bb3", 0x2a}, {&(0x7f0000000240)="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", 0xff}, {&(0x7f0000000340)="fe5dab6e49b3cd607398bcdef7d46be1afa03231067798ed8357718b106c1bac29aa7c80cfaa9d0e74817e889cf6fc83ba6057360555c209efabbbc5421eb9987cdcd7c863151428a47873d456af77974bfb26da801aa0b092232aa0d254d9dcc0bbc858ac4e74d67eabc43ea8cc8a6aba9cd5592e7b3ba2a88eadf7e4e5cb1a854bf0d78d1c1db2cf3d0bcc96a2c78d1123d305772d4be7837a1e36b83c5e15f842fb85c8d17f96943f9d956d60ddc776fc1bb86210617aa42d4616c2497ca4bff96fe25936f881ef82587bb0d5cd5fb0da1be8edc24d061a47d353c4f501ea1adeb28ff46132bef6e50df220843d10f373ef487157f9", 0xf7}, {&(0x7f0000000440)="d3e9e835160415350cda81c8fc99ab97243cee672893142ff574b65dc64c86b15e226354771aa85c512af9c478c3155ab16237ceb4451b8c6a566f340c510266edf76bbf6d517d0ddd93a1a06b3ec5996783aa3c345dfd7777c57331f3ea84583504d3a050fbc1ba974f718efb21f614c5b2f71373c29526dd77f50cfcff41266a16b33957808ebfe042ca00a7d9ef188fbba795ef9f5b7f042652f21b2b087a6ee3fe5919e7d874fc0e348a839cb0112442f6eb5ae3bcd72e092f94dadb1634d339ff1004e080cab933a3eae2e5f1e098d97b26336775980a7c23bd12ba3ef75c2bb98f640a5195aa", 0xe9}], 0x6, &(0x7f00000005c0)=[{0x88, 0x10e, 0x8, "876cccd8cf414b2c322a42d1eaf7c9f739d05982034ec1c341cb74a6c56a09aff98979934c1fedec7513315c6416140cc45deb1197a259eca9af6dc3a85bf723c13f22dcc1148e792afa36e6f9fad0c5b649e820961cf74b55b0f39a67b23272782f3ca9897aa5e3c89d64c484ad3433bb"}], 0x88}, 0x8010) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000006c0)='trusted.overlay.nlink\x00', &(0x7f0000000700)={'L-', 0x80000000}, 0x28, 0x3) getpeername$inet(r0, &(0x7f0000000740)={0x2, 0x0, @broadcast}, &(0x7f0000000780)=0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/null\x00', 0x498801, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000800)=""/178, &(0x7f00000008c0)=0xb2) r3 = creat(&(0x7f0000000900)='./file0\x00', 0x10) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000940)=0x7ff) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000980)='/dev/full\x00', 0x400001, 0x0) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f00000009c0)=0x1) r5 = gettid() r6 = socket$inet_udp(0x2, 0x2, 0x0) r7 = accept4$packet(r4, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000a40)=0x14, 0x40400) sendfile(r7, r6, &(0x7f0000000a80), 0x7f) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000ac0)) socket$nl_route(0x10, 0x3, 0x0) ioctl$PPPIOCCONNECT(r4, 0x4004743a, &(0x7f0000000b00)) r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000b40)='/selinux/mls\x00', 0x0, 0x0) ioctl$VT_RELDISP(r8, 0x5605) setsockopt$inet6_udp_int(r4, 0x11, 0x65, &(0x7f0000000b80)=0x6, 0x4) getsockname$inet6(r3, &(0x7f0000000bc0), &(0x7f0000000c00)=0x1c) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000c40)={0xffffffff, 0x273, 0x8}) ptrace$setregs(0x2, r5, 0x10001, &(0x7f0000000c80)="fc24e753a3ad7ff1f227b55e0b097f5e98efe757b87ba3045a7f13aee59b38b78cc28ab46c775c652dc24be868f4ea2a32cfac8c8602054587c7192a29b6b9e28c20298329ed143f09c0c036a93e0bac882ca6744ab94589605d5c23a98360b3e58f90ddffdfd4cbfa4871973cc75990bae543438bcf0ea80feb17a3") r9 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000d00)='cgroup.subtree_control\x00', 0x2, 0x0) flock(r9, 0x8) r10 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000d40)='/selinux/checkreqprot\x00', 0x504a40, 0x0) getsockopt$SO_BINDTODEVICE(r10, 0x1, 0x19, &(0x7f0000000d80), 0x10) r11 = accept4(0xffffffffffffffff, &(0x7f0000000dc0)=@nl=@proc, &(0x7f0000000e40)=0x80, 0x800) ioctl$sock_inet6_tcp_SIOCOUTQ(r11, 0x5411, &(0x7f0000000e80)) 08:34:59 executing program 4: keyctl$session_to_parent(0x12) r0 = add_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="2bc33ff267d1222db0d5f621f3d6cf566716452428667254c538cede9e1658cdfbeb5abe69a13beae70fa0933b73fa7d405284a22f97217301", 0x39, 0xffffffffffffffff) r1 = request_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='mime_type\xfd\x00', 0xfffffffffffffffb) r2 = request_key(&(0x7f0000000180)='id_legacy\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)='-\x00', 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x0) socket$unix(0x1, 0x2, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x4000) ioctl$EVIOCGPHYS(r3, 0x80404507, &(0x7f0000000280)=""/85) r4 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ashmem\x00', 0x401020, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000340)=0x0) fcntl$setownex(r4, 0xf, &(0x7f0000000380)={0x3, r5}) r6 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/member\x00', 0x2, 0x0) close(r6) clock_nanosleep(0x3, 0x0, &(0x7f0000000400)={0x77359400}, &(0x7f0000000440)) getegid() r7 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, &(0x7f0000000480)=0x1f, 0x4) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKRRPART(r8, 0x125f, 0x0) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r9, 0x6, 0x14, &(0x7f00000004c0)=0x2, 0x4) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000500)=""/175) r10 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000005c0)='/selinux/mls\x00', 0x0, 0x0) r11 = syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r10, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x948c58dd580c53f9}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, r11, 0x400, 0x70bd2c, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) writev(0xffffffffffffffff, &(0x7f00000007c0)=[{&(0x7f0000000740)="2d30bcf3d37e4711b6491928dd0933a7632b2a88f3f52c8912fd90a1013de0b2761f4e44c3c60073f71c4be870977edaf4a0a97c784cd84fbfe6a22354451e31174ac32801e56ee940befc7e", 0x4c}], 0x1) r12 = openat$cgroup_ro(r9, &(0x7f0000000800)='cpuacct.usage_sys\x00', 0x0, 0x0) write$P9_RRENAME(r12, &(0x7f0000000840)={0x7, 0x15, 0x1}, 0x7) r13 = open(&(0x7f0000000880)='./file0\x00', 0x200, 0x4) write$P9_RFLUSH(r13, &(0x7f00000008c0)={0x7, 0x6d, 0x2}, 0x7) [ 93.000453] audit: type=1400 audit(1567931699.429:8): avc: denied { map } for pid=1834 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5044 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 08:34:59 executing program 3: clock_adjtime(0x75e572cecf3bf409, &(0x7f0000000000)={0x100000000, 0x9, 0x800, 0x1000, 0x6, 0x1, 0x1, 0x7, 0x100000001, 0x9, 0x5, 0xcf52, 0x20, 0x7, 0x4, 0x1f00000, 0x1, 0xf0ac, 0x6, 0x9d8, 0x4, 0xe35, 0x6, 0x40, 0x9, 0x883}) r0 = socket$netlink(0x10, 0x3, 0x13) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000100)=0x80000000, 0x4) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x100) connect$unix(r1, &(0x7f0000000180)=@file={0x2, './file0\x00'}, 0x6e) r2 = dup(0xffffffffffffffff) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000200)) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000240)={0xffffffffffffff2d, 0x401, 0x3, 0x1}, 0x10) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000300)=0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/enforce\x00', 0x80000, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x70, 0x72, 0x1, 0xb50, 0x1, 0x0, 0x0, 0x3, 0x8, 0x2, 0x7, 0x7, 0x9, 0xd460, 0xffffffffffffffe1, 0x5, 0x1, 0xfe9, 0x275, 0x101, 0x864f, 0x0, 0x20, 0x9, 0x23, 0x0, 0x7060000000000, 0x101, 0x6, 0x80, 0x100, 0xfff, 0x170e0b6e, 0x9, 0x7a, 0x34, 0x7fff, 0x0, 0x0, 0x8, @perf_config_ext={0x5c4a, 0x9}, 0x4140, 0x6, 0x4, 0x3, 0x7ff, 0x1, 0x8001}, r3, 0x0, r4, 0xa) r5 = openat(r1, &(0x7f0000000380)='./file0\x00', 0x208220, 0x80) ioctl$BLKBSZSET(r5, 0x40081271, &(0x7f00000003c0)=0x1) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/enforce\x00', 0x200004, 0x0) ioctl$RTC_SET_TIME(r6, 0x4024700a, &(0x7f0000000440)={0x4, 0x37, 0xc, 0xf, 0x8, 0x3ff, 0x2, 0x119, 0xfffffffffffffffe}) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x9b100, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r8 = ioctl$TIOCGPTPEER(r7, 0x5441, 0x9) ioctl$TIOCNXCL(r8, 0x540d) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/net/pfkey\x00', 0x40, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r9, 0x0, 0x2d, &(0x7f0000000500)={0x8, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x88) r10 = socket(0x10, 0x800, 0x1) setsockopt$inet_mreq(r10, 0x0, 0x20, &(0x7f00000005c0)={@empty, @broadcast}, 0x8) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) r12 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000640)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r13 = accept$unix(0xffffffffffffffff, &(0x7f0000000680), &(0x7f0000000700)=0x6e) r14 = syz_open_dev$sndtimer(&(0x7f0000000740)='/dev/snd/timer\x00', 0x0, 0x2000) r15 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/mls\x00', 0x0, 0x0) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = signalfd(0xffffffffffffffff, &(0x7f00000008c0)={0x7ff}, 0x8) r18 = syz_open_procfs$namespace(0x0, &(0x7f0000000900)='ns/cgroup\x00') r19 = fcntl$getown(r6, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000940)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}}}, &(0x7f0000000a40)=0xe8) getresgid(&(0x7f0000000a80)=0x0, &(0x7f0000000ac0), &(0x7f0000000b00)) r22 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000b40)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000c40)=0xe8) lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000dc0)='./file0\x00', &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r11, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000e80)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, r12, r13, r14, r6, r4, r6, r15, r16]}}, @rights={{0x20, 0x1, 0x1, [r17, r6, r4, r18]}}, @cred={{0x1c, 0x1, 0x2, {r19, r20, r21}}}, @cred={{0x1c, 0x1, 0x2, {r22, r23, r24}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {r3, r25, r26}}}], 0xd0}, 0x2040) 08:34:59 executing program 2: r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) setsockopt$SO_TIMESTAMP(r1, 0x1, 0x3f, &(0x7f0000000080)=0x1, 0x4) r2 = getpid() fcntl$setownex(r1, 0xf, &(0x7f00000000c0)={0x2, r2}) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000200)=0x0, &(0x7f0000000240), &(0x7f0000000280)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) getresuid(&(0x7f0000000400), &(0x7f0000000440)=0x0, &(0x7f0000000480)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000004c0)={0x0, 0x0}, &(0x7f0000000500)=0xc) getresuid(&(0x7f0000000540)=0x0, &(0x7f0000000580), &(0x7f00000005c0)) stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f00000006c0)=[0x0, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000780)={{}, {0x1, 0x3}, [{0x2, 0x3, r3}, {0x2, 0x5, r4}, {0x2, 0x0, r5}, {0x2, 0x0, r6}, {0x2, 0x2, r7}, {0x2, 0x3, r8}], {0x4, 0x4}, [{0x8, 0x2, r9}, {0x8, 0x0, r10}, {0x8, 0x4}, {0x8, 0x5, r11}]}, 0x74, 0x1) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000800)={'NETMAP\x00'}, &(0x7f0000000840)=0x1e) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f0000000880)=0x5af, 0x4) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f00000008c0)='gre0\x00') r12 = openat$ion(0xffffffffffffff9c, &(0x7f0000000900)='/dev/ion\x00', 0x40, 0x0) r13 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000940)='/selinux/load\x00', 0x2, 0x0) ioctl$FICLONERANGE(r12, 0x4020940d, &(0x7f0000000980)={r13, 0x0, 0x1, 0x3, 0x7f}) r14 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000009c0)='/selinux/mls\x00', 0x0, 0x0) r15 = syz_genetlink_get_family_id$tipc(&(0x7f0000000a40)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r14, &(0x7f0000000b40)={&(0x7f0000000a00)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x68, r15, 0x10, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x3, @media='udp\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x8}, 0x40) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000b80)=0x6, 0x4) r16 = dup(0xffffffffffffffff) write$P9_RCLUNK(r16, &(0x7f0000000bc0)={0x7, 0x79, 0x1}, 0x7) r17 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000c00)='/proc/self/attr/exec\x00', 0x2, 0x0) r18 = syz_open_dev$binder(&(0x7f0000000c40)='/dev/binder#\x00', 0x0, 0x804) ioctl$FICLONE(r17, 0x40049409, r18) [ 95.504593] audit: type=1400 audit(1567931701.929:9): avc: denied { create } for pid=2623 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 95.555260] audit: type=1400 audit(1567931701.959:10): avc: denied { write } for pid=2623 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 95.591320] audit: type=1400 audit(1567931701.969:11): avc: denied { read } for pid=2623 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:35:02 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800, 0x0) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000004c0)='tls\x00', 0xd3271ed9a00b83f2) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r1, 0x0, 0x0, 0x0) r2 = accept4$packet(r1, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14, 0x80000) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000100)=0x200000ff71) syz_open_dev$sndtimer(0x0, 0x0, 0x2a01) mkdir(&(0x7f00000001c0)='./file0\x00', 0x40) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x80000000004, 0x8000000007}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0xdd, 0x4, 0x6, 0x0, r3}, 0x2c) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r4, 0x0, 0x0, 0x0) r5 = accept(r4, &(0x7f0000000400)=@hci, &(0x7f00000002c0)=0x80) readv(r5, &(0x7f0000000140), 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) tkill(r6, 0x1c) r7 = syz_open_procfs(r6, &(0x7f0000000500)='net/packet\x00') setsockopt$inet_udp_encap(r7, 0x11, 0x64, &(0x7f0000000280)=0x4, 0x4) ioctl$TCSETS(r0, 0x40045431, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r8 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x280003, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x2, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') mkdir(&(0x7f0000000300)='./file0\x00', 0x1) rmdir(&(0x7f0000000000)='./file0\x00') setsockopt$inet_tcp_TCP_ULP(r9, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @local}, 0xfffffe9c) setsockopt$sock_int(r8, 0x1, 0x0, &(0x7f0000000140)=0xfffffffffffffffd, 0x4) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x4e20, @loopback}, 0x10) mprotect(&(0x7f0000005000/0x3000)=nil, 0x3000, 0x2000009) sendmmsg(0xffffffffffffffff, &(0x7f0000003740), 0x400031b, 0xfffffffffffffffd) listen(0xffffffffffffffff, 0x10001) ioctl$TIOCGSID(r0, 0x5429, 0x0) r10 = dup(0xffffffffffffffff) ioctl$sock_inet_SIOCDARP(r10, 0x8953, &(0x7f0000000340)={{0x2, 0x4e24, @broadcast}, {0x1, @broadcast}, 0x28, {0x2, 0x4e21, @multicast2}, 'syzkaller1\x00'}) ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) ioctl$KDDELIO(r0, 0x4b35, 0x0) unshare(0x60000000) socket$inet_tcp(0x2, 0x1, 0x0) [ 95.710973] audit: type=1400 audit(1567931702.139:12): avc: denied { map_create } for pid=2689 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 95.738563] audit: type=1400 audit(1567931702.139:13): avc: denied { map_read map_write } for pid=2689 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 08:35:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) sendmsg$inet6(r1, &(0x7f00000017c0)={&(0x7f00000002c0)={0xa, 0x0, 0x81, @dev={0xfe, 0x80, [], 0x23}, 0x7}, 0x1c, &(0x7f0000001740)=[{&(0x7f0000000400)="7c4b8bb631339904e95ad1ab4c00adaa799d16d56d5f5020eff8923f1176e7ce7c1b52b3b7303f55470801257c6358d1944c616754065178c8b7c499ce9f13b0b991347c65a2fc0e5efcc6b4abd8b7fc39b5df6e4527053131c83435661535", 0x5f}, {&(0x7f0000000480)="0a0656c17bf79e44c51b608f56189a7a612ba25271661b64278b22c556dbda7c0a1142b058476ccd6a2f6d02f555cfc514a7734088e9b3d93990aaea8ef7d597f04542f14ec2afb4f8882e871fbc379a2a08373ff203dd1f25896fae48f2f5914af8d5bd4dfeac94d129394b2bcf8d324d653e414b8d7b8caec2f449fed551d55afa1dee72d7dbb6f7b55f3e5cc3ee8438cece41d6119134f04d77e4c66fea3827596fb9429c85234cf9ba22e4478d7b82a18e8139f6306e479cbfec", 0xbc}, {&(0x7f0000000580)="0ff8a8b476509a684afce14bf4f8207d16f065435de0b3addfd8fc94220f82fb69287431204f67a69f5fd7ac9121f16e821a188fbbd06029467da7a68eb8ad7fdf5f8ca511b8a1ff46ceb26c52e2cd838a79548c4646a9ae2c8c6c82cdb03f220c52d54b699a8d8faf374c6e8c58fe6740d6537f3a7ab41ed28fc7fa14baea0fac92bd4d5858487b2e1f9cc4464aadd4d57dbbcb0b1aadca4d03935b7e2ad8aa7f134f7f9c89310d1c4341935bfe4149bf081f", 0xb3}, {&(0x7f0000000300)="3b0cadd19f6c7d44148e81b30ddb06e53201107680865ca4f607bbf793da114bab2b9a3f532f2f76eea55a1c18faf44b", 0x30}, {&(0x7f0000000680)}, {&(0x7f0000001680)="2339fc10cccf960595cab667ad222d3898418e41ae2d2fc5101d87f88407abe9d77ec8835992195ec948ba8a12eec25bdda64a3966487f38a741e9cfd66533e56c2d70365c7733a9fe5fca857317c922249f3b4bb0c9ff38cd987e14b841ce5e052104d142ef2405b8c9358eabd3c4329e1ee893c029143a08bd176dcf66af8aa1e298a09455", 0x86}], 0x6}, 0x810) socket$inet(0x2, 0xa, 0x7fff) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000100)="e83e8841b7d3df035e966bb2df9d343c281597fbfad9b706c644c01fd3bac23c70f5c9bd2fa8f8b1d1f6394580"}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000019c0)={r1, &(0x7f00000018c0)="3c2cd6e40ae37d7a90e66f96a80136dd8b5bb76530c037f2dad01806be97507c68711ba240726fc6f62ddfcb4460faf7032db17e0768fc0410894b0502fc996f1bc40cf398842b79bab67719a69ea8e06e7c5b27d6fd1bf83f", &(0x7f0000001980)=""/23}, 0x18) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1e0a) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000640)={0x5, 0x0, 0x7, 0x9, 0x1ff, 0x9}) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000001800)='trusted.overlay.upper\x00', &(0x7f0000001840)=ANY=[@ANYBLOB="00fb440000c0585b0779eb510fc08c030000ea653b150ae405b6e652aeef0f4b11ce00c2e103f87749ad7ae5942aae9b7596f8ca74dc71cf0c3bcd7f0c7d3a3b01630000"], 0x44, 0xa0ba1ab11ccbd4cb) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r3, 0x0, 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000680)=""/211) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000780)=0xc) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r6, 0x0, 0x0, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r7) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@remote, @in=@multicast1, 0x4e24, 0x100000000, 0x4e21, 0x8, 0xa, 0x3594661e62234265, 0xa0, 0x5c, r2, r4}, {0x8, 0x0, 0x6, 0x8, 0x100000001, 0x4, 0xffffffffffffffff, 0x6}, {0x9, 0x7, 0x1f, 0x1ff}, 0x100000001, 0x6e6bbf, 0x1, 0x1, 0x2, 0x3}, {{@in=@dev, 0x4d4, 0xff}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x17}, 0x3504, 0x0, 0x0, 0x4, 0x6, 0x4}}, 0xe8) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000001a00), &(0x7f0000001a40)=0x40) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0x2}, {0x801, 0x0, 0x0, 0x80000009}]}) r8 = gettid() openat$rtc(0xffffffffffffff9c, &(0x7f0000001940)='/dev/rtc0\x00', 0x200, 0x0) perf_event_open(&(0x7f0000001a80)={0x1, 0x70, 0x4, 0x5, 0x10000, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x7, 0x6, 0xa9d, 0x1, 0x9, 0xfffffffffffff941, 0x5, 0x400, 0x8, 0x5, 0x2, 0x4, 0x100000000, 0x6, 0x8000, 0x101, 0xffff, 0x0, 0x6, 0x6, 0x4, 0x400, 0xb, 0x3b2, 0x8, 0x1, 0x2, 0x0, 0x1, 0x0, @perf_config_ext={0xc48, 0x4}, 0x14002, 0x27c2, 0xe000000000000, 0xbc25400036c1f80, 0x1f, 0x3, 0x9}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xd99016da6fd96b32) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x80000000004, 0x8000000007}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xd, 0xdd, 0x4, 0x6, 0x0, r9}, 0x3c) ioctl$LOOP_SET_FD(r3, 0x4c00, r9) open(&(0x7f0000000080)='./file1\x00', 0x2000000000008042, 0x0) unlink(&(0x7f0000000000)='./file1\x00') 08:35:02 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x80000000004, 0x8000000007}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0xdd, 0x4, 0x6, 0x0, r0}, 0x2c) mmap(&(0x7f000007e000/0x2000)=nil, 0x2000, 0x103b0e93b836670b, 0x4010, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r1, 0x0, 0x0, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000000)={0x11, 0x7, 0x1, {{0x4, 'proc'}, 0xf10}}, 0x11) futex(&(0x7f0000000040), 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f0000000280), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) [ 96.246818] syz-executor.0 uses obsolete (PF_INET,SOCK_PACKET) [ 96.313463] hrtimer: interrupt took 52353 ns 08:35:02 executing program 5: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r1, 0x0, 0x0, 0x0) epoll_wait(r1, &(0x7f0000000000)=[{}, {}, {}, {}], 0x4, 0x7) ioprio_get$uid(0x3, 0x0) 08:35:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) sendmsg$inet6(r1, &(0x7f00000017c0)={&(0x7f00000002c0)={0xa, 0x0, 0x81, @dev={0xfe, 0x80, [], 0x23}, 0x7}, 0x1c, &(0x7f0000001740)=[{&(0x7f0000000400)="7c4b8bb631339904e95ad1ab4c00adaa799d16d56d5f5020eff8923f1176e7ce7c1b52b3b7303f55470801257c6358d1944c616754065178c8b7c499ce9f13b0b991347c65a2fc0e5efcc6b4abd8b7fc39b5df6e4527053131c83435661535", 0x5f}, {&(0x7f0000000480)="0a0656c17bf79e44c51b608f56189a7a612ba25271661b64278b22c556dbda7c0a1142b058476ccd6a2f6d02f555cfc514a7734088e9b3d93990aaea8ef7d597f04542f14ec2afb4f8882e871fbc379a2a08373ff203dd1f25896fae48f2f5914af8d5bd4dfeac94d129394b2bcf8d324d653e414b8d7b8caec2f449fed551d55afa1dee72d7dbb6f7b55f3e5cc3ee8438cece41d6119134f04d77e4c66fea3827596fb9429c85234cf9ba22e4478d7b82a18e8139f6306e479cbfec", 0xbc}, {&(0x7f0000000580)="0ff8a8b476509a684afce14bf4f8207d16f065435de0b3addfd8fc94220f82fb69287431204f67a69f5fd7ac9121f16e821a188fbbd06029467da7a68eb8ad7fdf5f8ca511b8a1ff46ceb26c52e2cd838a79548c4646a9ae2c8c6c82cdb03f220c52d54b699a8d8faf374c6e8c58fe6740d6537f3a7ab41ed28fc7fa14baea0fac92bd4d5858487b2e1f9cc4464aadd4d57dbbcb0b1aadca4d03935b7e2ad8aa7f134f7f9c89310d1c4341935bfe4149bf081f", 0xb3}, {&(0x7f0000000300)="3b0cadd19f6c7d44148e81b30ddb06e53201107680865ca4f607bbf793da114bab2b9a3f532f2f76eea55a1c18faf44b", 0x30}, {&(0x7f0000000680)}, {&(0x7f0000001680)="2339fc10cccf960595cab667ad222d3898418e41ae2d2fc5101d87f88407abe9d77ec8835992195ec948ba8a12eec25bdda64a3966487f38a741e9cfd66533e56c2d70365c7733a9fe5fca857317c922249f3b4bb0c9ff38cd987e14b841ce5e052104d142ef2405b8c9358eabd3c4329e1ee893c029143a08bd176dcf66af8aa1e298a09455", 0x86}], 0x6}, 0x810) socket$inet(0x2, 0xa, 0x7fff) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000140)={r1, &(0x7f0000000100)="e83e8841b7d3df035e966bb2df9d343c281597fbfad9b706c644c01fd3bac23c70f5c9bd2fa8f8b1d1f6394580"}, 0x10) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000019c0)={r1, &(0x7f00000018c0)="3c2cd6e40ae37d7a90e66f96a80136dd8b5bb76530c037f2dad01806be97507c68711ba240726fc6f62ddfcb4460faf7032db17e0768fc0410894b0502fc996f1bc40cf398842b79bab67719a69ea8e06e7c5b27d6fd1bf83f", &(0x7f0000001980)=""/23}, 0x18) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1e0a) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000640)={0x5, 0x0, 0x7, 0x9, 0x1ff, 0x9}) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000001800)='trusted.overlay.upper\x00', &(0x7f0000001840)=ANY=[@ANYBLOB="00fb440000c0585b0779eb510fc08c030000ea653b150ae405b6e652aeef0f4b11ce00c2e103f87749ad7ae5942aae9b7596f8ca74dc71cf0c3bcd7f0c7d3a3b01630000"], 0x44, 0xa0ba1ab11ccbd4cb) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r3, 0x0, 0x0, 0x0) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000680)=""/211) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000780)=0xc) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r6, 0x0, 0x0, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r7) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@remote, @in=@multicast1, 0x4e24, 0x100000000, 0x4e21, 0x8, 0xa, 0x3594661e62234265, 0xa0, 0x5c, r2, r4}, {0x8, 0x0, 0x6, 0x8, 0x100000001, 0x4, 0xffffffffffffffff, 0x6}, {0x9, 0x7, 0x1f, 0x1ff}, 0x100000001, 0x6e6bbf, 0x1, 0x1, 0x2, 0x3}, {{@in=@dev, 0x4d4, 0xff}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x17}, 0x3504, 0x0, 0x0, 0x4, 0x6, 0x4}}, 0xe8) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000001a00), &(0x7f0000001a40)=0x40) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, [], [{0x0, 0x0, 0x2}, {0x801, 0x0, 0x0, 0x80000009}]}) r8 = gettid() openat$rtc(0xffffffffffffff9c, &(0x7f0000001940)='/dev/rtc0\x00', 0x200, 0x0) perf_event_open(&(0x7f0000001a80)={0x1, 0x70, 0x4, 0x5, 0x10000, 0x0, 0x0, 0x2, 0x1, 0x1, 0x0, 0x7, 0x6, 0xa9d, 0x1, 0x9, 0xfffffffffffff941, 0x5, 0x400, 0x8, 0x5, 0x2, 0x4, 0x100000000, 0x6, 0x8000, 0x101, 0xffff, 0x0, 0x6, 0x6, 0x4, 0x400, 0xb, 0x3b2, 0x8, 0x1, 0x2, 0x0, 0x1, 0x0, @perf_config_ext={0xc48, 0x4}, 0x14002, 0x27c2, 0xe000000000000, 0xbc25400036c1f80, 0x1f, 0x3, 0x9}, r8, 0xffffffffffffffff, 0xffffffffffffffff, 0xd99016da6fd96b32) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x80000000004, 0x8000000007}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f00000007c0)={0xd, 0xdd, 0x4, 0x6, 0x0, r9}, 0x3c) ioctl$LOOP_SET_FD(r3, 0x4c00, r9) open(&(0x7f0000000080)='./file1\x00', 0x2000000000008042, 0x0) unlink(&(0x7f0000000000)='./file1\x00') 08:35:02 executing program 5: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x80000000004, 0x8000000007}, 0x2c) r2 = request_key(&(0x7f0000000340)='asymmetric\x00', &(0x7f0000000580)={'syz', 0x0}, &(0x7f0000000600)='procproc\x00', 0xfffffffffffffffd) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000004c0)="d7fe15c1b673255e04c6bc15a6da85ac708c1efa9418b9f8ed300cb5f7e08d71ecbeb5c3f4732f9a69a42fd3c83abbbecde436a3ace485da0cf6d8a90c818b759ea59b380ff72d528b2612557886e4941f98453ebd034622fc74ed3dee49556c6cbab6dd55fdeef6e863f1ae2ae22ab977108dbdc04127217bf6bef88916fd6daaf4ada969e09f3cad", 0x89, r2) r3 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000580)={'syz', 0x1}, 0x0, 0x0, r2) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f00000004c0)="311d0e31193443091dccbb1d48c732b9ee1eebeb0f8c4857a7c689227820c612dc3b939b9ff5ae2b53282b0983dd2d57b8c156e7c7b730f344e611058b87ad737e717e9758bd53f060137f895209746bbd536222148713569d18d9773247d9134bcd96c16cc1eb63a06d3f5bf68b45be8c473f6b", 0x74, r3) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0xdd, 0x4, 0x6, 0x0, r1}, 0x2c) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U-', 0xbf3d}, 0x28, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000080)={0x0, 0x0, 0x0, {}, {}, @period={0x0, 0x0, 0x0, 0x0, 0x0, {}, 0x0, &(0x7f0000000040)}}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') r5 = ioctl$TUNGETDEVNETNS(r4, 0x54e3, 0x0) pread64(r5, 0x0, 0xa4, 0x1000000000000) sendmsg$nl_netfilter(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[]}, 0x1, 0x0, 0x0, 0x60040d8}, 0x4000000) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x80000000004, 0x8000000007}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0xdd, 0x4, 0x6, 0x0, r6}, 0x2c) write$binfmt_script(r6, &(0x7f0000000640)={'#! ', './file0', [{}], 0xa, "cfb4db9205ad4408b2c0ed885b52658ee96c9db1307d7d7856474091467eacbac929a5764f6b5f5e3348a7ddc4a4c4f19acf40575b7e36bbc6b7e57bd086831f3517e38f7b55dedddb166be9b1e36bc0a718cd4a9d1a3bf35de3f1ea1b055e353b8fb2aa7be670a289a1ecd34b037dc1c03844e62f7ddbf63cdff91200c56a66ae6c22a0e58a9f3a1d23d461ef0bae44edb4645a7b904c18a07c421be79ac19f34e4ff45f77dfc64bf18c250bec36f96b7362c7dbc3e1eba0e11f47eef0ac825fe2754250e945e77e9ccd042e98adee0a97e548aa4bbf45fa87515151fe910bbede719708b25e7fefc873160ad7f"}, 0xfa) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="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", @ANYBLOB="2de70a67757310554a9ca66864eef1c8c72bdc35"], 0x0, 0x7c}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) 08:35:02 executing program 5: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) ioctl$TIOCSIG(r0, 0x40045436, 0x23) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20020000) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x40000, 0x0) r4 = creat(&(0x7f0000000c80)='./file1\x00', 0x91) ioctl$BLKROGET(r4, 0x125e, &(0x7f0000000cc0)) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000240)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000480)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f0000000600000070070000b005000050020000b00500000000000038010000a0060000a0060000a0060000a0060000a006000006000000", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB='\x00'/96], @ANYBLOB="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"/1904], 0x7d0) rmdir(&(0x7f00000001c0)='./file0\x00') socket$inet6(0xa, 0x0, 0x0) rmdir(&(0x7f0000000080)='./file0\x00') rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) close(0xffffffffffffffff) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) pipe(0x0) close(0xffffffffffffffff) tee(r1, r2, 0x401, 0x0) 08:35:02 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sync() socket$inet6(0xa, 0x400000000001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) fallocate(0xffffffffffffffff, 0x4, 0x0, 0x0) sched_rr_get_interval(0x0, &(0x7f00000003c0)) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001d00)={0x4, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="000f09000200000095000000000000003f36f0ffad8bffff18", @ANYRES32, @ANYBLOB], 0x0, 0x7fffffff, 0xd1, &(0x7f0000000180)=""/209, 0x40f00, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001cc0)={0x0, 0x5, 0x0, 0x87ed}, 0x10}, 0x70) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002e80)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, 0xffffffffffffffff) sendmsg$netlink(r4, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000)=[{&(0x7f00000001c0)=ANY=[@ANYRES64], 0x1}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32], 0x4}, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x5763, 0x1, 0x0, 0x7, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffffff, 0x4, 0x7, 0x7, 0x10000, 0x0, 0x3, 0xffffffff, 0x10001, 0x8, 0x2, 0x3433911a, 0x7f, 0x77f8, 0x0, 0x7, 0x0, 0x0, 0x3, 0x4, 0x80, 0x6, 0x2, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x1000, 0x0, 0x0, 0x0, 0x7, 0x8, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000000000412d1fbc000000030006000000f9180200ee00e0000054d81458186fe8b90002000100000000000000030200044a7b030005000000000002000000e0193f010000000000fca0d9e936d7544cd80dbc46f144fb02af932377ac08fce2f1231ada7ed6a60d3a60d7c9772cf085a525a55f2e15d4481380ac866feea858a85d52d76bfef79f094901094468d7b470aef23110649d472a4661c4e142ea9311bdd8125802db0000000000000000"], 0x60}}, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000340)={@remote, @dev}, &(0x7f0000000380)=0xffffff1c) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x1, 0x0) [ 96.587274] audit: type=1400 audit(1567931703.009:14): avc: denied { write } for pid=2789 comm="syz-executor.3" name="net" dev="proc" ino=8327 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 96.640091] audit: type=1400 audit(1567931703.009:15): avc: denied { add_name } for pid=2789 comm="syz-executor.3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 96.663757] audit: type=1400 audit(1567931703.009:16): avc: denied { create } for pid=2789 comm="syz-executor.3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 [ 96.686731] audit: type=1400 audit(1567931703.009:17): avc: denied { create } for pid=2789 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 08:35:03 executing program 1: setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0xc6) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1, 0x1, 0x3) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000008c0)={0x0, 0x0}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000000c0)=0x14) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6, @broadcast}, 0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r2, 0x0, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000180)=0xc) clone(0x40000000040007fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() request_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0xffffffffffffffff) ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x11) wait4(0x0, 0x0, 0x0, 0x0) sched_getattr(0x0, 0x0, 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r2, 0xc0184908, &(0x7f0000000200)={0x34, 0x0, &(0x7f00000001c0)}) wait4(0x0, 0x0, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x9000, 0x0) 08:35:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000)=0x1000000000001e, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x3ffe, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)=0x80000004) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) ioctl$TIOCEXCL(r2, 0x540c) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r3 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x50d140, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$BLKPBSZGET(r4, 0x127b, &(0x7f00000000c0)) ioctl$PPPIOCSPASS(r3, 0x40107447, &(0x7f00000002c0)={0x0, &(0x7f0000000240)}) socket$inet6(0xa, 0x0, 0x0) 08:35:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x20000102000007) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x80000000004, 0x8000000007}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0xdd, 0x4, 0x6, 0x0, r2}, 0x2c) vmsplice(r2, &(0x7f0000000680)=[{&(0x7f0000000500)="9c8ad2c8b6f07a77471dec435e81cc264982a62355218aeed250598036323da1e4fbbc42533f43f47c535a454104a1cddfa8b4090b2dd8a33ed7c165e9d89abc51285e56e7ac9607cbd205cf56df8c0c600770aa1c02c17a62063269cb4c65dbc35b1bededeaa7f1f08acb38eefe88386631f5b0fce1f0247faae89aa6721ecd3ef0053172f542933fd0991ccb615bfbd5d3b0ed1c79f492a307a7c3d2044464e58ac80fc4168fae30651f84b8c933aacc145dfa717dd3e5b4e92dfc297867521a1b6934f25101c1adb3f48afdd2c2c4b45985b30469889dd750bf56e95e7661a654322207be16eb226d022026aa63b3e5c0c90893491ca9f285", 0xfa}, {&(0x7f0000000600)="602a9ae89e50282d17dfb2acbf086fcb031234d14326c83508cb131b12e8ae66ab3f4f3ee6c946ee88a1f04604aa66e55aa58b01b9b7546286255a0c18f946c8a41bc25abdfaff82b27b28e874d8aafa15f749ac9378173b871b238e9fe131f77e4b430542eb", 0x66}], 0x2, 0x1) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x9, 0x1, &(0x7f0000000180)=[{&(0x7f0000000100)="91de0ea5ed5392169a70c2182ed33b6b1ef5fa18ddd6bab593b4b79497efeb51d3f56a6aee96210b0a2df44b054998addc27826e12ce1af7324657655ddfa8239acdff9cbd817758e8d01e640f4cb4fa9b4bee2c3317025dcc5fd651f0ec2e76f9bbfef4", 0x64, 0x3}], 0x300030, &(0x7f0000000200)={[{@nodots='nodots'}], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@subj_role={'subj_role', 0x3d, '['}}, {@subj_type={'subj_type', 0x3d, '\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00'}}]}) 08:35:03 executing program 1: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) personality(0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r0, 0x0, 0x4a0, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r1, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000180)="75b4ecf632c329bd3ebc7c6468f298710e403f6862a448", 0x17, 0x4, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'bridge0\x00', 0x100000001}) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/validatetrans\x00', 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r2, 0x0, 0x0, 0x0) ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000140)) sendmmsg(0xffffffffffffffff, &(0x7f0000007040)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="46d7168f0150b4189ca915c4429fcecc", 0x10}], 0x1}}, {{&(0x7f0000000240)=@nl=@proc={0x10, 0x0, 0x25dfdbfe}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000002c0)="4ec4ed8a7104587fb3ac8c5d631283f5", 0x10}], 0x1}}], 0x2, 0x0) 08:35:03 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, 0x0, 0x16b}}], 0x1, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0xfffffffffffffd16) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@loopback, @in=@broadcast, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x80000000000001, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0xff}, 0x0, @in6=@dev}}, 0xe8) perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3ff}, 0x0, 0x0, 0xffffffffffffffff, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f00000004c0)={0x1f, 0xffffffffffffff28, &(0x7f0000000700)="34561df07c5dfb30c5329179ade3b8a0fe680063d78a29da1850673a2fc27f4205a0966be3fc421b916ea51bda2f289913a3942a0386f64f3d04e8ccb864b3ae1c8512c9780afef931dc65d299f5fc0b94cc9edc9353cf3245266574e1bc910406d3e9a48b50b633424969716795cd24ebe0a58d5290dff3ed6d5a7c4e0530da0b"}) openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x0, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$KDGKBTYPE(r3, 0x4b33, 0x0) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000280)=0xfffffffffffffffd, 0x227) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x4e21, @dev}, {0x2, 0x4e21, @local}, {0x2, 0x4e20, @broadcast}, 0xfffffffffffffdfe, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0x800000000}) sendmmsg(r4, &(0x7f0000000400)=[{{0x0, 0x0, 0x0, 0xfffffffffffffc24}, 0x9}], 0x1, 0x40000001) ioctl$sock_inet_SIOCGARP(r1, 0x8954, 0x0) ioctl$PIO_UNIMAPCLR(r3, 0x4b68, &(0x7f0000000580)={0x8, 0x5, 0x2}) getsockname$inet(r3, &(0x7f00000002c0)={0x2, 0x0, @local}, &(0x7f0000000380)=0x10) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$TIOCGSID(r3, 0x5429, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(0xffffffffffffffff, 0x54a1) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/status\x00', 0x0, 0x0) rename(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./file0\x00') socket$key(0xf, 0x3, 0x2) unshare(0x60000000) perf_event_open(&(0x7f0000000100)={0x1, 0x26b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0xad3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x10000000, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, @perf_config_ext={0x1, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 08:35:03 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x800000000040, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x20200, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x80000000004, 0x8000000007}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0xdd, 0x4, 0x6, 0x0, r2}, 0x2c) r3 = dup3(r2, r0, 0x1c0000) renameat2(r1, &(0x7f0000000040)='./file0\x00', r3, &(0x7f0000000080)='./file0\x00', 0x7) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r4, 0x0, 0x0, 0x0) ioctl$EVIOCGRAB(r4, 0x40044590, &(0x7f00000000c0)=0x80) r5 = creat(&(0x7f0000000140)='./file0\x00', 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RREAD(r5, &(0x7f0000000580)=ANY=[@ANYBLOB='a'], 0x1) fallocate(r5, 0x0, 0x40000, 0xfff) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) 08:35:03 executing program 4: mkdir(&(0x7f0000000080)='./file1\x00', 0x0) r0 = open$dir(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) rmdir(&(0x7f0000000100)='./file1\x00') fchdir(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r1, 0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x41018c10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00032cbd7000fcdbf15bd61a8a871af50a004e200000080001004e2200006fd7eac6d154ff04e035f58eaa3c1fd7da7184018d5a4cb7e34cd9d1f4f8fa16f46aa7e72ba6ed4e59d89e2f5bab5ed151852072b44612a27a1b0e3ad781ac48d51bffddc58a821e12e00c7fec01276fcd09ee79a5dfad85fcecf4e463e2d1b02385c0981e89014d42e64de100212a6a3dc32d668d8102c37a561d0aa24d8a85c6e66b78d7357d5ace15eef66dd0e2dca6"], 0x24}, 0x1, 0x0, 0x0, 0x2001080}, 0x4000) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) getcwd(0x0, 0xffffffffffffff3b) 08:35:03 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800, 0x0, 0x3}, 0x20) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x800, 0x0, 0x3, 0x2, 0x0, 0xfffffffffffffffc}, 0x20) 08:35:03 executing program 4: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x80000000004, 0x8000000007}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0xdd, 0x4, 0x6, 0x0, r1}, 0x2c) ioctl$FICLONE(r0, 0x40049409, r1) r2 = gettid() bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x3, 0x65f72fff}}, @ptr={0x6, 0x0, 0x0, 0x2, 0x5}, @int={0x9, 0x0, 0x0, 0x1, 0x0, 0x63, 0x0, 0x80, 0x2}]}, {0x0, [0x30, 0x5f, 0xde0d100900007d66, 0x0, 0xc2, 0x2e]}}, &(0x7f0000000080)=""/19, 0x54, 0x13}, 0x20) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1c) getpgrp(r2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r3, &(0x7f0000000340)=[{&(0x7f0000000040)='9', 0x1}], 0x1, 0x881806) read(r3, &(0x7f0000000200)=""/30, 0x1000003da) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) openat$cgroup_ro(r3, &(0x7f0000000000)='cgroup.controllers\x00', 0x0, 0x0) 08:35:03 executing program 2: utime(0x0, &(0x7f00000009c0)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, @perf_bp={&(0x7f0000000080), 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1c) sched_setparam(r0, &(0x7f0000000040)=0x37) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) write$P9_RXATTRWALK(0xffffffffffffffff, &(0x7f0000000440)={0xf, 0x1f, 0x2, 0x100000001}, 0xf) openat$pfkey(0xffffffffffffff9c, 0x0, 0x10000, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="b702000000000000000703000000feffff7a0af0fff8ffff73fd8d6aff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000008970a26b890d454f29ab305fb5ee8315fe52d555d30d0d3bb04980327e94969f37af42fad419e6ef55ba6a54e25bd5c6e49a1f05adb3e84f8e8000000000000002"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xb0}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e15f02cea", 0x0, 0x100}, 0x28) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={r1, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x800}, 0x28) [ 97.278114] print_req_error: I/O error, dev loop0, sector 272 [ 97.284367] Buffer I/O error on dev loop0, logical block 34, lost async page write 08:35:03 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x80000000004, 0x8000000007}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0xdd, 0x4, 0x6, 0x0, r1}, 0x2c) lseek(r1, 0x0, 0x2) fallocate(r0, 0x0, 0x40000, 0xfff) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000040)={0x5, 0x6, 0x20, 0x4, 0x2}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) write$UHID_SET_REPORT_REPLY(r2, 0x0, 0x0) 08:35:03 executing program 2: syz_emit_ethernet(0x6f, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0xffffffb3, 0x0, @initdev, @local}, @udp={0x0, 0x0, 0x4d, 0x0, [@guehdr={0x2, 0x0, 0x0, 0x0, 0x0, [0x0]}, @guehdr={0x1}, @guehdr={0x2, 0x0, 0x0, 0x0, 0x0, [0x0]}, @guehdr={0x2, 0x0, 0x0, 0x0, 0x0, [0x0]}], "8abe601f4ccb4ea5ce5a51d90f5ff4eb4b5014ceee914fade6084d37057cd9726c489eab730530d094"}}}}}, 0x0) 08:35:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x80201000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$inet(0x10, 0x3, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x21a000, 0x100) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xa0124}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x8c, r3, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x68, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) sendmsg(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000200)="2400000018007be11dfffd946f6105000a0000031f0014a101000800080011000400ff7e280000001100ffffba16a0aa1c0900000000000020000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 97.629274] IPv6: NLM_F_CREATE should be specified when creating new route [ 97.647315] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 97.716231] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 08:35:04 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000bfdfdc)={0x9, 0x0, 0x10000001, 0x800000001, 0x70bd2b, 0x0, {0x17}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast1}]}]}, 0x20}}, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) 08:35:04 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x9) setsockopt$sock_int(r0, 0x1, 0x4000000200000002, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e20, 0x1, @mcast1}, 0x1c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x100000001}, 0xffffffbc) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='fdinfo/3\x00') pread64(r2, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0xefa0f0c00b1c3c4f, &(0x7f0000000240)={@loopback, 0x0}, &(0x7f0000000280)=0x14) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000002c0)={@mcast1, r3}, 0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000000040)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@rand_addr="50c4c39ef45b45c64239300d211e5d55", @in6=@remote, 0x4e24, 0x1, 0x4e22, 0x7, 0xc655290b16e5973e, 0x90, 0x20, 0x2c, r3, r4}, {0x6, 0x3, 0x1ff, 0x4, 0x7ff, 0x400, 0x81, 0x81}, {0xffffffff, 0x5, 0x0, 0x8}, 0x2, 0x6e6bbd, 0xdbbdb6cf6683c88, 0x0, 0x2, 0x3}, {{@in=@multicast1, 0x4d6, 0x6c}, 0x2, @in6=@ipv4={[], [], @rand_addr=0x10001}, 0x3503, 0x4, 0x7, 0x6, 0x5, 0x5, 0x4}}, 0xe8) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x80000000004, 0x8000000007}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0xdd, 0x4, 0x6, 0x0, r5, 0x0, [], 0x0, 0xffffffffffffffff, 0x5}, 0x3c) r6 = inotify_init1(0x80000) ioctl$INOTIFY_IOC_SETNEXTWD(r6, 0x40044900, 0x10001) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x2, 0x4, 0x80000000004, 0x8000000007, 0x0, 0xffffffffffffffff, 0x4}, 0x3c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x22, &(0x7f0000000080)=0x400, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0xdd, 0x4, 0x6, 0x0, r7}, 0x2c) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f0000000000)={0x0, r7, 0x9, 0xa55, 0x3, 0x100000001}) sendto$inet6(r0, 0x0, 0x0, 0xfffffefffffffffe, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 08:35:04 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x0) timer_create(0x1, &(0x7f0000000100)={0x0, 0x15, 0x1, @thr={&(0x7f0000000480)="e44bcc7a1d4e1fe73d8d9c90af0214ab67e39ab46d39f78c08a74984c506a6acc4be5a9b510f2fde612cdca873e0e53dc25fe9fcd84adaabc1a42301f7784d5dde788725060a172cd9e63400b01161bef24dc13f28f4c36ee49b901771d4257cda7fddefb54e3a2187b22be138dd1184460de12a444c184e38f9d329a6c6866df763eb0e5679f68ba26ed436702ce730bc2a3c18bd8714bf3ec6c65f245df55df8ccaae56abdeff13bc3cf169fe3b3f652f8bf0673e7196f2d69bc8f2d49be31c4a90070c85ed182ef32a2f9b2e13210cfc046bdf097679e82e6d377ec54b01fe362e143ba3f10a856b61d554ed43f74c19086", &(0x7f0000000580)="da36e3013773013572f91844e7dbc1f7f494b746284bee7dc3f75998dd44cbb5ee8dfadd3cf009131727b8635f072949502fa980e22353d085142f789dc37687a65d68877e9578c6f4e1b6eaa14b457c63e7e8375354e8057e763a2706189c2ce3c5e056caa4882789bebb8161e9dd2e29b7b78d2c2d9ae34a65ec8be376b06b91c966fd77e569946f0ffcf6ad925829b4b62a7558878562296f855e74c0eb67f3474481325a015ce4ddbdc6fbd73680d04a2076b329f1a6733db4cd906907361b7dcad7db2a75005c5fc79a67dc91483329e0652f422fda3d7590ebe60c60c4e1fae07a671d298173fab981eb3e1d438b53"}}, &(0x7f0000000180)=0x0) timer_delete(r1) timer_delete(r1) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, r0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xee65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) [ 98.170859] ------------[ cut here ]------------ [ 98.175807] WARNING: CPU: 0 PID: 2947 at kernel/events/core.c:1690 add_event_to_ctx+0x84a/0xa70 [ 98.184628] Kernel panic - not syncing: panic_on_warn set ... [ 98.184628] [ 98.191979] CPU: 0 PID: 2947 Comm: syz-executor.1 Not tainted 4.14.142+ #0 [ 98.201067] Call Trace: [ 98.203644] dump_stack+0xca/0x134 [ 98.207194] panic+0x1ea/0x3d3 [ 98.210385] ? add_taint.cold+0x16/0x16 [ 98.214349] ? add_event_to_ctx+0x84a/0xa70 [ 98.218654] ? __probe_kernel_read+0x163/0x1c0 [ 98.223226] ? add_event_to_ctx+0x84a/0xa70 [ 98.227528] __warn.cold+0x2f/0x3a [ 98.231066] ? add_event_to_ctx+0x84a/0xa70 [ 98.235388] report_bug+0x20a/0x248 [ 98.239011] do_error_trap+0x1bf/0x2d0 [ 98.242883] ? math_error+0x2d0/0x2d0 [ 98.246674] ? trace_hardirqs_on+0x10/0x10 [ 98.250888] ? __lock_acquire+0x5d7/0x4320 [ 98.255109] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 98.259943] invalid_op+0x18/0x40 [ 98.263382] RIP: 0010:add_event_to_ctx+0x84a/0xa70 [ 98.268308] RSP: 0018:ffff8881cab07ae0 EFLAGS: 00010016 [ 98.273655] RAX: 0000000000040000 RBX: ffff8881d06acc80 RCX: 0000000000000a07 [ 98.280908] RDX: ffffffff813f533a RSI: ffffc90004f96000 RDI: ffff8881d06ace88 [ 98.288182] RBP: ffff8881cabcc400 R08: 0000000000001963 R09: ffffed103b745d02 [ 98.295452] R10: ffffed103b745d01 R11: ffff8881dba2e80b R12: ffff8881dba31fc0 [ 98.302728] R13: ffff8881cabcc48c R14: ffff8881dba2e8f0 R15: ffff8881dba2e8f0 [ 98.310011] ? ctx_sched_out+0xd8/0x680 [ 98.313993] __perf_install_in_context+0x241/0x2f0 [ 98.318906] ? __mutex_lock+0x8e2/0x13e0 [ 98.322949] ? ctx_resched+0x100/0x100 [ 98.326823] remote_function+0x110/0x190 [ 98.330968] ? perf_duration_warn+0x30/0x30 [ 98.335274] generic_exec_single+0x1b0/0x2e0 [ 98.339755] smp_call_function_single+0x103/0x340 [ 98.344581] ? perf_duration_warn+0x30/0x30 [ 98.348886] ? generic_exec_single+0x2e0/0x2e0 [ 98.353470] perf_install_in_context+0x2c6/0x320 [ 98.358208] ? add_event_to_ctx+0xa70/0xa70 [ 98.362527] ? ctx_resched+0x100/0x100 [ 98.366404] ? exclusive_event_installable+0x196/0x210 [ 98.371672] SyS_perf_event_open+0x19bb/0x2560 [ 98.376247] ? perf_bp_event+0x1a0/0x1a0 [ 98.380302] ? nsecs_to_jiffies+0x30/0x30 [ 98.384450] ? do_clock_gettime+0xd0/0xd0 [ 98.388587] ? do_syscall_64+0x43/0x520 [ 98.392547] ? perf_bp_event+0x1a0/0x1a0 [ 98.396593] do_syscall_64+0x19b/0x520 [ 98.400475] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 98.405649] RIP: 0033:0x4598e9 [ 98.408934] RSP: 002b:00007fe6d53b9c78 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 98.416630] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00000000004598e9 [ 98.423884] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 98.431139] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 98.438404] R10: 0000000000000003 R11: 0000000000000246 R12: 00007fe6d53ba6d4 [ 98.445656] R13: 00000000004c671d R14: 00000000004db7d8 R15: 00000000ffffffff [ 98.453709] Kernel Offset: 0x1e400000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 98.464734] Rebooting in 86400 seconds..