[ 12.103004] random: sshd: uninitialized urandom read (32 bytes read) [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 26.686763] random: sshd: uninitialized urandom read (32 bytes read) [ 26.835890] audit: type=1400 audit(1568614904.051:6): avc: denied { map } for pid=1768 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 26.879693] random: sshd: uninitialized urandom read (32 bytes read) [ 27.481021] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.148' (ECDSA) to the list of known hosts. [ 32.908848] random: sshd: uninitialized urandom read (32 bytes read) 2019/09/16 06:21:50 fuzzer started [ 33.006225] audit: type=1400 audit(1568614910.221:7): avc: denied { map } for pid=1783 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 33.488332] random: cc1: uninitialized urandom read (8 bytes read) 2019/09/16 06:21:51 dialing manager at 10.128.0.26:37083 2019/09/16 06:21:51 syscalls: 1347 2019/09/16 06:21:51 code coverage: enabled 2019/09/16 06:21:51 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/09/16 06:21:51 extra coverage: extra coverage is not supported by the kernel 2019/09/16 06:21:51 setuid sandbox: enabled 2019/09/16 06:21:51 namespace sandbox: enabled 2019/09/16 06:21:51 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/16 06:21:51 fault injection: CONFIG_FAULT_INJECTION is not enabled 2019/09/16 06:21:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/16 06:21:51 net packet injection: enabled 2019/09/16 06:21:51 net device setup: enabled [ 35.889888] random: crng init done 06:22:56 executing program 0: 06:22:56 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') lseek(r0, 0x0, 0x2) 06:22:56 executing program 4: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000b80)='./bus\x00', 0x0) write$binfmt_elf64(r2, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) fsetxattr$security_selinux(r1, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000040)='sys\x01e\x00\x00\x00\x00d_va\xf2_run_t:s0\xe6\xa5\xca\'\xe8\x00'/49, 0x1c6, 0x0) dup2(r2, r1) 06:22:56 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xeaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7ff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000000)='\x88})+\x00', 0x0) write(r1, &(0x7f00000004c0)='&', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000040), 0xff8) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000380)=')et\x02\x16\x00W\xca\xdad\x8dt0:loppp0\x00') write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) 06:22:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='devtmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000001780)='./file0\x00', &(0x7f0000001800)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0xfe3f, 0x0) fsync(0xffffffffffffffff) 06:22:56 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) faccessat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) r0 = memfd_create(&(0x7f0000000000)='\x88})+\x00', 0x0) write(r0, &(0x7f00000004c0)="2641eeb931ca089043e37463b8f489944fae4edf2aeef6667a95310e63ba934c3d12ad0a634c8fd8160ea97d137ebec9bd6917f2640979fa22bd6643db1c1c4bca48eba2e9155b005a5c00c6c950c2f25024dc3caff864dc42ae34526a63115bfc9c758d9d89b63d06acdd574d39a3ff1b23", 0x14) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) sendfile(r0, r0, &(0x7f0000000040), 0xff8) [ 99.264616] audit: type=1400 audit(1568614976.481:8): avc: denied { map } for pid=1835 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5044 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 06:22:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000140)=0xeb2, 0x4) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fb, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x20000, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x0) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 102.064947] audit: type=1400 audit(1568614979.281:9): avc: denied { map } for pid=2669 comm="syz-executor.5" path=2F6D656D66643A887D292B202864656C6574656429 dev="tmpfs" ino=8461 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 102.629000] audit: type=1400 audit(1568614979.841:10): avc: denied { mac_admin } for pid=2736 comm="syz-executor.4" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 102.629062] SELinux: Context syse is not valid (left unmapped). 06:23:00 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x1100082) r1 = memfd_create(&(0x7f00000003c0)='/\xd2\a\xaa(\t0\xedj\\\xe6W\x14E\x80VfM\'\x80\xb1\xce\x86Wp#\x00\xc2\x11\x04\xb5\a\x9e\x83X\x8e?yE\xec\xeb2-\xbb\vO\xf9P\xd7\xd7\xf5\xa8\xaeW\x8e\xe5Q\xd9\x9ew\x8e}\x868\x9f2\xf9\x17\xf5\xf8;\xd5g\bS\x91Q\xf1a\x0e$9[k@\x0fj\x83\x9d\xb1\xd5\xd7\xa5\xc1\x05ox\xe4\xdc6\x04\xc1n\xf6\xf8\x1c\xf2\xa9\xbb\xbc\x12u\xfd\xeb0bK\xb8A\x93\xb3\x8co\a\xe1}R\xa6x\xde\xb5;\xea\xa0', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, "70011d871554c11cd59c081025bad6b39d77f70a7c0f30f65f57a96aae15c13f0dceb29700", "a8a4cd01e527e6fd3de45387daf7b1ac786d0e8a75e89046553a61edb7d52d51c055fa3342fdff6d0c0800276939a3410334eaffffffffffffff00", "2f18ff4efeb50001000000000000000000000000000000000600"}) 06:23:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) socket$inet6(0xa, 0x80003, 0x800000000000006) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x48, 0x14, 0x7, 0x0, 0x0, {0xa, 0xf0ffff, 0x600}, [@generic="667e279639a91d7b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5"]}, 0x48}}, 0x0) 06:23:00 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x4) socket$inet6(0xa, 0x80003, 0x800000000000006) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000001400070200000000000000000aff0006667e279639a9057b7f0000017daf4204a00b32eadc2828417f000001e3d8960f65b27ee8125f42360500000015739d53d5000000"], 0x48}}, 0x0) 06:23:00 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000140)=""/41, 0x29) 06:23:00 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, r1, 0x805, 0x0, 0x0, {{0x1, 0x40030000000000}, 0x0, 0x4, 0x0, {0x14}}}, 0x30}}, 0x0) 06:23:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socket$key(0xf, 0x3, 0x2) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) [ 103.046528] audit: type=1400 audit(1568614980.261:11): avc: denied { create } for pid=2776 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 103.090936] audit: type=1400 audit(1568614980.261:12): avc: denied { write } for pid=2776 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 103.115513] audit: type=1400 audit(1568614980.261:13): avc: denied { read } for pid=2776 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:23:00 executing program 1: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') lseek(r0, 0x0, 0x2) 06:23:00 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x60}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 103.503978] audit: type=1400 audit(1568614980.721:14): avc: denied { prog_load } for pid=2800 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 06:23:00 executing program 2: clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) socket(0x2, 0x0, 0x0) ioctl$EVIOCGVERSION(0xffffffffffffffff, 0x80044501, 0x0) sendmmsg$unix(r0, &(0x7f0000002640)=[{&(0x7f0000000240)=@abs, 0x6e, 0x0}], 0x1, 0x20004000) 06:23:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', 0x0}) 06:23:00 executing program 0: futex(&(0x7f000000cffc)=0x2000000000000004, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0xa, 0x0, 0x0, 0x0, 0x2) 06:23:00 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0x2b}, 0x0, @in6=@empty}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b000102000000005768ba3b000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a6ea597d3d34473"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x8, 0x0, &(0x7f0000001000)={0x77359400}) r2 = socket$key(0xf, 0x3, 0x2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) 06:23:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000006c0)=0x2000000000000001, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='veth1_to_team\x00', 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) connect$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) write$binfmt_elf32(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="db"], 0x1) 06:23:00 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x6, &(0x7f0000000180), 0x0) clone(0x11000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:23:01 executing program 3: syz_emit_ethernet(0xaa, &(0x7f0000000000)={@local, @empty=[0xf00b, 0xe000000089060608, 0x0, 0xf0ffff, 0x15000000], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x6, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864, 0x11, 0x0, @local, @dev={0xac, 0x14, 0x14, 0xac1414aa}, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) 06:23:01 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r1 = dup2(r0, r0) ioctl$EVIOCGPROP(r1, 0xc004743e, &(0x7f0000000000)=""/246) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, 0x0) 06:23:01 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000000000002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000005001}) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="14"], 0x1) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:23:01 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @empty}}, 0x5c) 06:23:01 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "954e80000000000000001e0000d100"}) 06:23:01 executing program 0: creat(&(0x7f0000000440)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000340)={[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) [ 103.917439] SELinux: security_context_str_to_sid(staff_u) failed for (dev bpf, type bpf) errno=-22 06:23:01 executing program 2: getdents(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @dev}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e23}, 0x10) 06:23:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e") r1 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x7226}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7ff}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a989000000007ba79554354cdddb4e767263a7192f6f0100000028db38a5668b145e6313f3ee41e2f28204b8de607a25340b579ac761976cae3a9a9e01785afd31885d362411ef23cd8fef4aa6dac6acb5ded04e5435e7a3bfaab8d914916ee79d501a7aa4f0972e376bb9f94c5268f7ee158864d444d4bf66e8d85cc74a0000000000000000"], 0x10}}, 0x0) 06:23:01 executing program 5: seccomp(0x1, 0x8, &(0x7f0000000080)={0x1, &(0x7f0000000240)=[{0x100000006}]}) 06:23:01 executing program 1: prctl$PR_SET_DUMPABLE(0x4, 0x3) syz_extract_tcp_res(&(0x7f0000000040), 0x40, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)) r1 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r1, &(0x7f0000002000)='/', 0x1) sendfile(r1, r1, &(0x7f0000000200), 0x87) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x400802, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000940)='smaps\x00') lstat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000000280)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x3, 0x6, &(0x7f0000000740)=[{&(0x7f0000000300)="6a3518b0aeba5d9f23921f4868c88c2051a5153e57d911e667182d7bf5036eaf63b6f35f02579b4a84ddbd7b93b1633886190efb994bc6c028d28dcc26f65ae799da605b16ffe600a8e7ffbd33d776f18c39a36bd133c4e76f0fa54fa1c778842dfff6f7feb2bdfcb91045b8", 0x6c, 0x100}, {&(0x7f00000003c0), 0x0, 0x1}, {&(0x7f0000000400)="b0ce7e95a03813c3a103144918271e4263ac1fe8dd3dff74cdd53a39e86aa2f8dfd18e76ff921b0a063f337aeeee6c60f2d94f1314197c45879b22a81236ec77958175476f6a212930ef3c0f60713c18e751aa93d461e980b15c225bee2880ef54b716bcc39bce10491626b321c87e464c73ff7c0fa5649a90a885f47070c0b6dc336503ffd0a0d9aff79fa1ecab478fb3e86238a1b3c18418379a710f336c7d3344778e48065e3f08272b65822076fc0e39c4e1bfba9c25dd6c86037c96bdd435343a9cca", 0xc5, 0x1}, {&(0x7f0000000500)="5fc050c1dda003e704ff0f2d802436199d6e61a6d0510b86ea33c2c956c9cda8a3797d710a1f38f2d48a7b7875d2ee7340e1908bf7ce14dedc73", 0x3a, 0x9}, {&(0x7f0000000540)="8fd992cc0657a877f8ac406c1c7de6e294eee05999988a73a0e1a0fff1093969f2a89bbe5a54f735dafb4aa4cd5b3ccdeaf71c35700744ebcdae179d17af005662ebb4c105b0460a15e3298ae63e7d7f214c3d01c86492b26dd3538a0c31c53a9a5004b4d8f193837cdeac63cc475182c411f1b12c6ca67a40e9d21bea015a8d428099b069800b6f178ab869e517950c0970f73c1172e5b0f23dcd42ddfb3a2debdbb27e236ce179760dbd7d594159ea3d435d1e3c383118d885c9f639ab5e6ddd78280425e75b695c9f3fd48e3a1b330aec15abaf0c6d1d1cb0bee7ddc35aacbdb7ca6f5c725c2b007219a267b034", 0x1ca, 0xeb0}, {&(0x7f0000000640)="e97dcf101d7250fd5c243d5a069af8eb6e4218c1cad0f27c5bff8826edf083d754c33f521c26cee15122b7cf8b24c3170bb2d4c4d879480e41496336df81f62bd1fafd62c9144d12a2265d4949e8d4ffedbba77a2d3448c9289c833f9b507f1dd8852c9e2f57a59d63afea20b042d0b2e1a029c4461930dc9230d6434ef0259e86e5eb96463540ee2503cb014081c0f785716d3d92149079ba161b26b1f0769040baa8a6f5770648215749e7a547469a72ef296439e962aeda2f6a94e02f7d488656d4a30c6321", 0xc7, 0x7fffffff}], 0x2, &(0x7f00000009c0)=ANY=[@ANYBLOB='rodir,sho_xlate=0,shortname=wi\x0095,nonumtail=0,shortname=lower,euid>', @ANYRESDEC=r4, @ANYBLOB="0000eb3cebc604a3b3d3314e0eea1468092e51c30791520f15baa0886bf3423b5c38fcc23f7f65f3beac1334dd82c1641b8d552e46502ca0bf4ab6f583824fe4cfbeeaea6d1447a842e91b3fb261fbbe4854ed91bfc91e67d955cb7e86c5089fc9fa5b0eb7f3ec247b58eeb1d5"]) ioctl$TCSBRKP(r3, 0x5425, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TUNSETLINK(r2, 0x400454cd, 0x18) pipe2(&(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}, 0x5aaaf0ca97f53eda) ioctl$EXT4_IOC_SWAP_BOOT(r6, 0x6611) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000040)=0x78) prlimit64(0x0, 0xa, &(0x7f00000008c0)={0x0, 0x4e2}, &(0x7f0000000900)) sendfile(r1, r1, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r1, 0x0) mount(&(0x7f0000000080), &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback, 0x3}, 0x1c) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x5, &(0x7f0000000280)="4190e2b34a52b20591ff6c6638375733533520f47f88765c8d9c56d298cb6c48c10aec847b02000000358bde95156306bcc0f3b88f6ad9ff350e0000000000000000000000000000000000003c5240a3cb7422ddfb1e5ba850dcec1171bf66b5e27a0f3861c8981f294dcfaa93f71ea48f8cb746c2973e5656f65d879e5eb1c39e7fcad433935114062d1d7f188ad63d06223c2bdb62c5b7338eb8ee7602b943ce87e219") r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r8, 0x107, 0x14, 0x0, 0x0) r9 = gettid() ptrace$setopts(0x4206, r9, 0x0, 0x0) tkill(r9, 0x38) ptrace$cont(0x18, r9, 0x0, 0x0) ptrace$setregs(0xd, r9, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r9, 0x0, 0x0) fcntl$setownex(r8, 0xf, &(0x7f0000000240)={0x0, r9}) 06:23:01 executing program 4: creat(&(0x7f0000000180)='./bus\x00', 0x0) setxattr$security_evm(&(0x7f0000000080)='./bus\x00', &(0x7f00000001c0)='security.evm\x00', &(0x7f0000000200)=@v2={0x5}, 0xa, 0x0) 06:23:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x7226}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r1, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902000000a8a989000000007ba79554354cdddb4e767263a7192f6f0100000028db38a5668b145e6313f3ee41e2f28204b8de607a25340b579ac761976cae3a9a9e01785afd31885d362411ef23cd8fef4aa6dac6acb5ded04e5435e7a3bfaab8d914916ee79d501a7aa4f0972e376bb9f94c5268f7ee158864d444d4bf66e8d85cc74a0000000000000000"], 0x10}}, 0x0) 06:23:01 executing program 4: r0 = socket(0x2000000100000010, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=@ipv4_newroute={0x24, 0x18, 0x401, 0x0, 0x0, {}, [@RTA_DST={0x8, 0x1, @multicast2}]}, 0x24}}, 0x0) 06:23:01 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x3) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) dup3(r1, r0, 0x0) 06:23:01 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x80002, 0x0) setsockopt$inet_int(r3, 0x0, 0xb, &(0x7f00000000c0)=0x1002, 0x4) sendto$inet(r3, 0x0, 0xffe5, 0x0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) recvmsg(r3, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x2001) ioctl$SIOCGSTAMP(r3, 0x8906, &(0x7f0000000040)) [ 104.702206] hrtimer: interrupt took 36008 ns [ 104.709698] FAT-fs (loop1): Unrecognized mount option "sho_xlate=0" or missing value 06:23:02 executing program 4: r0 = memfd_create(&(0x7f0000000780)='\x00', 0x0) write(r0, &(0x7f00000000c0)='i', 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r1, 0x0, 0x9, 0x0, &(0x7f0000000080)) 06:23:02 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 06:23:02 executing program 2: 06:23:02 executing program 1: 06:23:02 executing program 0: 06:23:02 executing program 4: 06:23:02 executing program 2: 06:23:02 executing program 1: 06:23:02 executing program 3: 06:23:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000340)=@nat={'nat\x00', 0x19, 0x1, 0x1e0, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x20000120], 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]}, 0x258) [ 105.478984] syz-executor.3 (2875) used greatest stack depth: 24224 bytes left 06:23:02 executing program 1: 06:23:02 executing program 4: 06:23:02 executing program 0: 06:23:02 executing program 2: 06:23:02 executing program 3: 06:23:02 executing program 5: 06:23:02 executing program 4: 06:23:02 executing program 1: 06:23:02 executing program 0: 06:23:02 executing program 3: 06:23:02 executing program 5: 06:23:02 executing program 2: 06:23:02 executing program 4: 06:23:02 executing program 3: 06:23:02 executing program 5: 06:23:02 executing program 0: 06:23:02 executing program 1: 06:23:02 executing program 2: 06:23:02 executing program 4: 06:23:03 executing program 3: 06:23:03 executing program 0: 06:23:03 executing program 2: 06:23:03 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000000000002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000005001}) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="14012000"], 0x4) write$P9_RREAD(r1, &(0x7f00000002c0)={0x26, 0x75, 0x0, {0x1b, "25e3c648efe1936fbcdcaef6cf760067b6da0179ae19a06c9cfcc7"}}, 0x26) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:23:03 executing program 1: 06:23:03 executing program 4: 06:23:03 executing program 3: 06:23:03 executing program 2: 06:23:03 executing program 4: 06:23:03 executing program 1: 06:23:03 executing program 0: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000140)=""/41, 0x29) getdents(r0, 0x0, 0x0) 06:23:03 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000280)={{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @empty}}, 0x5c) 06:23:03 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000040)={0x0, 0x0, 0xd049, 0x0, 0x0, "c14bca486204a65c22fc94c68251b79f6b4596"}) 06:23:03 executing program 4: r0 = socket$inet(0xa, 0x801, 0x0) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000180)={0x11, @empty=0x8400, 0x0, 0x0, 'dh\x00'}, 0x2c) r1 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8924, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x1}) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) 06:23:03 executing program 1: 06:23:03 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prlimit64(0x0, 0x0, &(0x7f0000000180), 0x0) 06:23:03 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000001c0), 0x924924924924b7b, 0x0) timer_gettime(0x0, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 06:23:03 executing program 0: socket$netlink(0x10, 0x3, 0x4) r0 = socket(0xa, 0x1, 0x0) close(r0) 06:23:03 executing program 1: r0 = socket(0x400000000000010, 0x802, 0x0) write(r0, &(0x7f00000003c0)="24000000200099f00014530000ed190e020008160000100000ba1080060002007f196be0", 0x24) 06:23:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000002100010000004a427ea6000004000000ca567cbf9a326d03c8c58ed2af070d75aae4487f559c0e43df498913e106f8088a3053ae53c75224ec7275e80ead2b22306bb23f0e8c81d7b8653782f6683e114ced81b0ec588c4fce"], 0x14}}, 0x0) 06:23:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYBLOB='#'], 0x1) recvmmsg(r1, &(0x7f0000003d40)=[{{&(0x7f0000000240)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1}}], 0x1, 0x0, 0x0) 06:23:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x890b, &(0x7f00000002c0)={'ifb0\x02\x00', @ifru_settings={0x0, 0x2, @raw_hdlc=&(0x7f0000000400)}}) 06:23:03 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)="24000000070107031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 06:23:03 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setreuid(0x0, 0xee00) prlimit64(0x0, 0x6, &(0x7f0000000180), 0x0) clone(0x11000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:23:03 executing program 2: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000200)=[@timestamp={0x4}, @timestamp, @sack_perm, @timestamp, @window, @mss, @timestamp, @sack_perm], 0x8) 06:23:03 executing program 5: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000080)={'ip\xbbI\xf7\xb2R\xbcK\x9e\x00\x00\x00\x80\x00', @ifru_data=&(0x7f0000000040)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"}) ioctl$sock_ifreq(r0, 0x89f2, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) [ 106.184205] audit: type=1400 audit(1568614983.401:15): avc: denied { create } for pid=3138 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 06:23:03 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x6000, 0x0, 0x6, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @remote}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 06:23:03 executing program 1: r0 = memfd_create(&(0x7f0000000100)='#\'%nodev\x00', 0x0) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f00000001c0), 0xfec) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000080)='.', 0x0, 0x5010, 0x0) [ 106.273907] audit: type=1400 audit(1568614983.431:16): avc: denied { write } for pid=3138 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 06:23:04 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='status\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x19e, 0x0) 06:23:04 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x7ff}}, 0xe8) connect$inet6(r0, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 06:23:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) accept4$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14, 0xc0000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) futex(&(0x7f0000000000), 0x8c, 0x1, 0x0, &(0x7f00000000c0), 0x0) 06:23:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 06:23:04 executing program 4: creat(&(0x7f0000000440)='./file0\x00', 0x98) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000340)={[{@mode={'mode'}}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 06:23:04 executing program 1: r0 = socket$inet(0x2b, 0x1, 0x0) connect$inet(r0, 0x0, 0x0) 06:23:04 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 06:23:04 executing program 2: r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0xe8}}, 0x10) [ 106.984630] SELinux: security_context_str_to_sid(staff_u) failed for (dev bpf, type bpf) errno=-22 06:23:04 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='status\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x19e, 0x0) 06:23:04 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x800000000000006) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev}, 0x1c) 06:23:04 executing program 1: r0 = getpgrp(0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() r3 = fcntl$dupfd(r1, 0x0, r1) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x81, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x10010000000035) fcntl$setstatus(r1, 0x4, 0x80000000002c00) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) [ 107.051808] netlink: 196 bytes leftover after parsing attributes in process `syz-executor.2'. 06:23:04 executing program 2: 06:23:04 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000000000002, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000005001}) write$P9_RLERRORu(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="14012000070000070025"], 0xa) write$P9_RREAD(r1, &(0x7f00000002c0)={0x40, 0x75, 0x0, {0x35, "25e3c648efe1936fbcdcaef6cf760067b6da0179ae19a06c9cfcc7caa408bfdfd09b58ff204b579e430ea72934c62a01f014189094"}}, 0x40) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 06:23:04 executing program 0: 06:23:04 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) socket(0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='status\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x19e, 0x0) 06:23:04 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40104593, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x10000, "954e80000000000000001e0000d100"}) 06:23:04 executing program 0: r0 = socket$inet(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000200)=[@timestamp={0x4}, @timestamp, @sack_perm, @timestamp], 0x4) 06:23:04 executing program 3: 06:23:04 executing program 2: 06:23:04 executing program 0: 06:23:05 executing program 5: 06:23:05 executing program 3: 06:23:07 executing program 1: 06:23:07 executing program 2: 06:23:07 executing program 0: 06:23:07 executing program 3: 06:23:07 executing program 5: 06:23:07 executing program 4: 06:23:07 executing program 2: 06:23:07 executing program 5: 06:23:07 executing program 3: 06:23:07 executing program 0: 06:23:07 executing program 1: 06:23:07 executing program 4: 06:23:07 executing program 2: 06:23:07 executing program 0: 06:23:07 executing program 5: 06:23:07 executing program 3: 06:23:07 executing program 1: 06:23:07 executing program 4: 06:23:07 executing program 2: 06:23:07 executing program 0: 06:23:07 executing program 5: 06:23:07 executing program 3: 06:23:07 executing program 1: 06:23:07 executing program 4: 06:23:07 executing program 2: 06:23:07 executing program 0: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCDELDLCI(r2, 0x8981, 0x0) 06:23:07 executing program 5: r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r0, &(0x7f0000000600)="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", 0xe00) sendfile(r0, r1, 0x0, 0xad9f) 06:23:07 executing program 3: preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x4002) io_setup(0xc32f, &(0x7f0000000440)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) io_destroy(r1) 06:23:07 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x40505412, 0x0) 06:23:07 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='io\x00') lseek(r0, 0x0, 0x5) 06:23:07 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@ipv4_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0x2, 0x60}}, 0x1c}}, 0x0) [ 110.457083] audit: type=1400 audit(1568614987.671:17): avc: denied { ioctl } for pid=3303 comm="syz-executor.0" path="socket:[10328]" dev="sockfs" ino=10328 ioctlcmd=0x8981 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:23:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)={[{0x0, 'memory'}]}, 0x3ff800) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) 06:23:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r1, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_buf(r2, 0x0, 0x480, 0x0, &(0x7f0000000000)=0x1000000) 06:23:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 06:23:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xfc, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000000)) r3 = syz_open_pts(r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r5 = dup3(r4, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000000080)=0x5, 0x4) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="a1f920a5c67b"}, 0x14) sendto$inet6(r0, &(0x7f00000004c0)="0304000703004c0000001100fff55b4202938207d9fb3780398d5375000000007929301ee616d5c01843e06590080053a6e385472da7222a2bb401000000c3b50035110f118d0000f5cfe606f6925cbf34658ea132797b1abc5dc62600009b000000faffffff00000000aeb4ea15da74", 0xfd7f, 0x0, 0x0, 0x0) 06:23:07 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x800000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndtimer(&(0x7f0000000500)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000000)={{0x1}}) 06:23:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000001c0), 0x924924924924b7b, 0x0) connect$unix(r0, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 06:23:07 executing program 4: r0 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = socket$unix(0x1, 0x400040000000001, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) 06:23:07 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40104593, &(0x7f0000000080)={0x8001, 0x0, 0x0, 0x0, "954e8000000000000000000000000000000029000000000000001e00"}) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000300)={0x1, 0x0, 0x0}) 06:23:07 executing program 4: socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r4, &(0x7f00000001c0), 0x924924924924b7b, 0x0) connect$unix(r3, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 06:23:07 executing program 5: r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f00000014c0)="12cb96df", 0x4) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) write$binfmt_aout(r0, &(0x7f0000000140)={{0x107, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x20) 06:23:07 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000001cc0)={@local, @local, [], {@arp={0x806, @ether_ipv4={0x6, 0x800, 0x6, 0x4, 0x0, @empty, @empty=0xac141402, @random="ff7f0000ab20", @broadcast}}}}, 0x0) 06:23:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff00c}, {0x80000006}]}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) shutdown(r1, 0x1) 06:23:08 executing program 0: r0 = socket$inet(0x2, 0x3, 0x7f) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000080)=0x801, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) write$binfmt_elf64(r0, &(0x7f00000007c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 06:23:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0xfffffffffffffca5, &(0x7f0000000140)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a290930206040000000001040009000300090035000c031600000019000b4023dc0b00000022dc1338d54404009b84136ef75afb83de4411000500c43ab8220000060ced4f7826de", 0x55}], 0x1}, 0x0) [ 110.801568] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Dropping request. Check SNMP counters. 06:23:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='io\x00') exit(0x0) lseek(r0, 0x5, 0x0) 06:23:08 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast2, 0x0, 0x33}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) 06:23:08 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x19, 0x0, &(0x7f0000000000)=0x1000000) 06:23:08 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x11}, 0x3c) 06:23:08 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r2, 0x0) write$apparmor_exec(r0, 0x0, 0x0) 06:23:08 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) r1 = open$dir(&(0x7f0000000580)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file1\x00', 0x0) mkdirat(r1, &(0x7f0000000280)='./file1/file0\x00', 0x0) renameat2(r1, &(0x7f0000001700)='./file0\x00', r1, &(0x7f00000016c0)='./file1/file0\x00', 0x2) [ 110.959966] audit: type=1400 audit(1568614988.171:18): avc: denied { getopt } for pid=3397 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 06:23:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000100)={0x0, 0xfffffffffffffca5, &(0x7f0000000140)=[{&(0x7f0000000080)="5500000018007f5f00fe01b2a4a290930206040000000001040009003900090035000c03160000001900154023dc0b00000022dc1338d54404009b84136ef75afb83de4411000500c43ab8220000060ced4f7826de", 0x55}], 0x1}, 0x0) 06:23:08 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) 06:23:08 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local, @dev, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @broadcast, @empty, @dev, @local={0xac, 0x223}}}}}, 0x0) 06:23:08 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x8, 0x16, 0x0, 0x0, 0x3}}, &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x346, &(0x7f000000d000)=""/153}, 0x3e) 06:23:08 executing program 4: 06:23:08 executing program 2: 06:23:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='io\x00') exit(0x0) lseek(r0, 0x5, 0x0) 06:23:08 executing program 0: 06:23:08 executing program 4: 06:23:08 executing program 3: 06:23:08 executing program 5: syz_emit_ethernet(0x37, &(0x7f0000000040)={@local, @empty=[0xffffffffa0008000, 0xd00, 0x689], [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @remote}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5}}}}}}, 0x0) 06:23:08 executing program 2: 06:23:08 executing program 5: 06:23:08 executing program 3: 06:23:08 executing program 0: 06:23:08 executing program 2: 06:23:09 executing program 4: 06:23:09 executing program 2: 06:23:09 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='io\x00') exit(0x0) lseek(r0, 0x5, 0x0) 06:23:09 executing program 3: 06:23:09 executing program 0: 06:23:09 executing program 5: 06:23:09 executing program 4: 06:23:09 executing program 2: 06:23:09 executing program 5: 06:23:09 executing program 4: INIT: Id "3" respawning too fast: disabled for 5 minutes 06:23:09 executing program 2: 06:23:09 executing program 0: 06:23:09 executing program 3: 06:23:09 executing program 5: INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes 06:23:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='io\x00') exit(0x0) lseek(r0, 0x5, 0x0) 06:23:10 executing program 4: 06:23:10 executing program 0: 06:23:10 executing program 2: 06:23:10 executing program 3: 06:23:10 executing program 5: 06:23:10 executing program 2: 06:23:10 executing program 0: 06:23:10 executing program 3: 06:23:10 executing program 5: 06:23:10 executing program 4: 06:23:10 executing program 3: 06:23:11 executing program 2: 06:23:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='io\x00') lseek(r0, 0x5, 0x0) 06:23:11 executing program 0: 06:23:11 executing program 4: 06:23:11 executing program 5: 06:23:11 executing program 3: 06:23:11 executing program 2: 06:23:11 executing program 5: 06:23:11 executing program 4: 06:23:11 executing program 0: 06:23:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='io\x00') lseek(r0, 0x5, 0x0) 06:23:11 executing program 3: 06:23:11 executing program 0: 06:23:11 executing program 5: 06:23:11 executing program 4: 06:23:11 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x7f6, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") setsockopt$inet_int(r0, 0x0, 0x6, &(0x7f0000000080)=0xd3, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e21}, 0x10) recvmmsg(r0, &(0x7f0000000080), 0x400000000000384, 0x12001, 0x0) 06:23:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='io\x00') lseek(r0, 0x5, 0x0) 06:23:11 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[.\xf6\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+\x8d\xed\xa6\\\x1c\xc3\x97\x94\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4\xc4\x88C\xa2B\x8b\x81\v\xea\t\xf0\x8fw\a\f\x15\xe2\xd0q\xbb\r\x17`s\xec\x85>\xcf\xab9(\xf6.\x15\xcd2-\xf2\xc4\xd8\x00a\xd5\xd9\xb5Z\xd7\xb4\xac\x1d_+k\xd6\x8ag\xdceHE\xd5\x1c\x8a\xbd#\xcc\x82\xca\xc2(\xb6\xe1\x99p\x9b\xa3D\xd2\x91\x96\xef\x05\fv\x16\x14\xcc\xea\x9d\x11w\x1e\xb5VG\x9ad\x9a`=^h\x8c8\xc9\"\x1eO\xb5vk\xc9\xcfi\x90\xd7\xd3H\xa1\xb4\xda\v\x17\x95\xf7\x19\x99\x99\x92\xc3\xc0\x8a\x18\xc7\"g\xd7B\x8f\x85\x18\xf3\x02\xa7\xb6\x83\x92\xefY\xef\x85\x92\x10E\x18\xbc\xacy\xd6\xa7Wh\xcd\xd0\xfa\xcc\xde\xeb\xdf\xad\xfd\xb0\xee\xfb\xc2(\x8cj\xd0uj{4\xb2\xe1p\x88u6\x9a;\xaa\x9f+J\x9e\xe3\xcc\xc7O\xad\x84\x8c;\x92~,\x15\xb2\x97\f~\xa0W\x16\x8b\a\x88\xaa\xe4C\xaf\x90\xdf\x7f\xe51\x00/n\xb5f\x1a\x8c+\xea<\xe3N@\x9e\xec\xbe{\x90x\xc6\x95!\xea\x11\xda\xe1I\x1d\xcbY\xe1\x01\xd2d\xae\xd1(>\xa3\xa9\x93\x16\xc6G\x94|', 0x2761, 0x0) write$cgroup_pid(r0, &(0x7f0000000080), 0xfffffe38) getdents64(r0, 0x0, 0x0) 06:23:11 executing program 0: 06:23:11 executing program 4: 06:23:11 executing program 5: 06:23:11 executing program 1: exit(0x0) lseek(0xffffffffffffffff, 0x5, 0x0) 06:23:11 executing program 2: 06:23:11 executing program 4: r0 = getpid() r1 = getpgid(0x0) tgkill(r0, r1, 0x200010) 06:23:11 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=@ipv4_newroute={0x34, 0x18, 0x1, 0x0, 0x0, {0x2, 0x60}, [@RTA_ENCAP={0x4}, @RTA_METRICS={0x4}, @RTA_PREFSRC={0x8, 0x7, @multicast1}, @RTA_IIF={0x8}]}, 0x34}}, 0x0) 06:23:11 executing program 0: clone(0x1410c1bc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000001c0)) ptrace(0x4206, r0) ptrace(0x4202, r0) 06:23:11 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x9a8f74f0234963e9}}, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x70}}, 0x0) sendmmsg(r0, &(0x7f0000000180), 0x80000000000022c, 0x0) 06:23:11 executing program 4: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = getpgrp(0x0) sendmsg$unix(r0, &(0x7f0000000480)={&(0x7f0000000240)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000440)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) 06:23:11 executing program 5: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) write$apparmor_exec(r0, 0x0, 0x10) [ 114.591512] audit: type=1400 audit(1568614991.811:19): avc: denied { sys_admin } for pid=3555 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 114.678823] audit: type=1400 audit(1568614991.891:20): avc: denied { sys_ptrace } for pid=3555 comm="syz-executor.0" capability=19 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 06:23:12 executing program 3: perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000007580)=[{{&(0x7f00000002c0)={0xa, 0x4e23, 0x1f, @loopback}, 0x1c, 0x0}}], 0x1, 0x0) 06:23:12 executing program 4: 06:23:12 executing program 5: 06:23:12 executing program 2: 06:23:12 executing program 1: exit(0x0) lseek(0xffffffffffffffff, 0x5, 0x0) 06:23:12 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0xfd28, 0x0, 0x0, 0x0, 0xfffffffffffffffa}}], 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/raw\x00') preadv(r0, &(0x7f00000017c0), 0x199, 0x73) 06:23:12 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000140)={'TPROXY\x00'}, &(0x7f00000001c0)=0x1e) 06:23:12 executing program 2: 06:23:12 executing program 2: 06:23:12 executing program 3: 06:23:12 executing program 5: 06:23:12 executing program 0: 06:23:12 executing program 4: 06:23:12 executing program 3: 06:23:12 executing program 5: 06:23:12 executing program 0: 06:23:13 executing program 1: exit(0x0) lseek(0xffffffffffffffff, 0x5, 0x0) 06:23:13 executing program 2: 06:23:13 executing program 4: 06:23:13 executing program 3: 06:23:13 executing program 5: 06:23:13 executing program 0: 06:23:13 executing program 0: 06:23:13 executing program 2: 06:23:13 executing program 3: 06:23:13 executing program 5: 06:23:13 executing program 4: 06:23:13 executing program 2: 06:23:14 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) exit(0x0) lseek(r0, 0x5, 0x0) 06:23:14 executing program 3: 06:23:14 executing program 4: 06:23:14 executing program 0: 06:23:14 executing program 5: 06:23:14 executing program 2: 06:23:14 executing program 0: 06:23:14 executing program 5: 06:23:14 executing program 3: 06:23:14 executing program 2: 06:23:14 executing program 4: 06:23:14 executing program 0: 06:23:15 executing program 2: 06:23:15 executing program 3: 06:23:15 executing program 4: 06:23:15 executing program 5: 06:23:15 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) exit(0x0) lseek(r0, 0x5, 0x0) 06:23:15 executing program 0: 06:23:15 executing program 2: 06:23:15 executing program 3: 06:23:15 executing program 0: 06:23:15 executing program 5: 06:23:15 executing program 2: 06:23:15 executing program 4: 06:23:15 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000002600)=@updpolicy={0xb8, 0x13, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 06:23:15 executing program 0: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000002c0)={'yz\x00', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000001440)="b0", 0x58, r0) keyctl$unlink(0x9, r1, 0xfffffffffffffffb) 06:23:15 executing program 5: 06:23:15 executing program 4: 06:23:15 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) exit(0x0) lseek(r0, 0x5, 0x0) 06:23:15 executing program 2: 06:23:15 executing program 4: 06:23:15 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpu.weight.nice\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") write$cgroup_int(r1, &(0x7f0000000280)=ANY=[@ANYRESOCT, @ANYRESOCT], 0x2e) 06:23:15 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400000, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x343042, 0x0) write$P9_ROPEN(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() write$P9_RCLUNK(0xffffffffffffffff, 0x0, 0x12d) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) write$P9_RMKNOD(r1, 0x0, 0x592e738214cc6dfb) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r2, 0x1000000000016) 06:23:15 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000), 0x4) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = open(0x0, 0x2002, 0x0) write$selinux_attr(r0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = dup(r2) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000180)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)={@initdev, @multicast1}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) sendmmsg$unix(r0, &(0x7f0000004ac0)=[{0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}], 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0xa, &(0x7f0000000100)=0x81, 0x195) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x8000000004e20, 0x6bf}, 0x1c) sendto$inet6(r2, 0x0, 0xffffffffffffff7a, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback, 0xffffffffffffffff}, 0x1c) setsockopt$inet6_int(r3, 0x29, 0x31, &(0x7f0000000140)=0x4, 0x4) rmdir(&(0x7f00000003c0)='./bus\x00') ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f00000002c0)=""/170) clock_adjtime(0x7, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x36, &(0x7f0000000440)=@fragment, 0x8) r4 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) ftruncate(r4, 0x7fff) sendfile(r3, r4, 0x0, 0x8040fffffffd) 06:23:15 executing program 4: r0 = creat(&(0x7f0000000180)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6000) io_setup(0x2, &(0x7f00000004c0)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x800000}]) 06:23:15 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000013, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000380)=0xb, 0x41) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) 06:23:15 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x1, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="640a0000000000003500000000000000950000000000000010b6573a3da8dfd842106af28e4dd303702600204dfd4ee2842a093d7fa5796b56da384ba33159ad5cc2e3c6170b9f6f570365076f910f6274cb5a5793447b084bb672042052e1487137552fca37910372"], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x346, &(0x7f000000d000)=""/153}, 0x3e) [ 118.705545] kasan: CONFIG_KASAN_INLINE enabled [ 118.712678] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 118.747283] general protection fault: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 118.754090] Modules linked in: [ 118.757278] CPU: 0 PID: 3711 Comm: syz-executor.3 Not tainted 4.14.143+ #0 [ 118.764281] task: 000000006a31eb7a task.stack: 000000002c4a52c2 [ 118.770341] RIP: 0010:do_tcp_sendpages+0x33c/0x1780 [ 118.775336] RSP: 0018:ffff8881987f76a8 EFLAGS: 00010206 [ 118.780679] RAX: 000000000000000f RBX: 0000000000000000 RCX: 0000000000001a2b [ 118.787927] RDX: ffffffff8252c8ca RSI: ffffc90002f4e000 RDI: 0000000000000078 [ 118.795268] RBP: 0000000000000240 R08: 0000000000028000 R09: ffffed1039fa59e8 [ 118.802517] R10: ffffed1039fa59e7 R11: ffff8881cfd2cf3f R12: ffffea0006590c80 [ 118.809765] R13: dffffc0000000000 R14: ffff8881cfd2cd00 R15: 0000000000028000 [ 118.817014] FS: 00007fefa42dc700(0000) GS:ffff8881dba00000(0000) knlGS:0000000000000000 [ 118.825230] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 118.831103] CR2: 00007fdf9b97b000 CR3: 00000001d5680005 CR4: 00000000001606b0 [ 118.838365] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 118.845617] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 118.852864] Call Trace: [ 118.855443] ? retint_kernel+0x2d/0x2d [ 118.859315] ? sk_stream_alloc_skb+0x8a0/0x8a0 [ 118.863881] ? tcp_rate_check_app_limited+0x85/0x330 [ 118.868966] tcp_sendpage_locked+0x81/0x130 [ 118.873268] tcp_sendpage+0x3a/0x60 [ 118.876877] inet_sendpage+0x197/0x5d0 [ 118.880744] ? tcp_sendpage_locked+0x130/0x130 [ 118.885910] ? retint_kernel+0x2d/0x2d [ 118.889788] ? inet_getname+0x390/0x390 [ 118.893742] kernel_sendpage+0x84/0xd0 [ 118.897618] sock_sendpage+0x84/0xa0 [ 118.901314] pipe_to_sendpage+0x23d/0x300 [ 118.905439] ? kernel_sendpage+0xd0/0xd0 [ 118.909480] ? direct_splice_actor+0x160/0x160 [ 118.914051] ? pipe_to_sendpage+0x300/0x300 [ 118.918399] __splice_from_pipe+0x331/0x740 [ 118.922703] ? direct_splice_actor+0x160/0x160 [ 118.927267] ? direct_splice_actor+0x160/0x160 [ 118.931826] splice_from_pipe+0xd9/0x140 [ 118.935868] ? splice_shrink_spd+0xb0/0xb0 [ 118.940081] ? retint_kernel+0x2d/0x2d [ 118.943954] ? splice_from_pipe+0x140/0x140 [ 118.948255] direct_splice_actor+0x118/0x160 [ 118.952643] splice_direct_to_actor+0x292/0x760 [ 118.957290] ? generic_pipe_buf_nosteal+0x10/0x10 [ 118.962113] ? do_splice_to+0x150/0x150 [ 118.966078] ? security_file_permission+0x88/0x1e0 [ 118.970991] do_splice_direct+0x177/0x240 [ 118.975121] ? splice_direct_to_actor+0x760/0x760 [ 118.979945] ? security_file_permission+0x88/0x1e0 [ 118.984857] do_sendfile+0x493/0xb20 [ 118.988564] ? do_compat_pwritev64+0x170/0x170 [ 118.993134] ? put_timespec64+0xbe/0x110 [ 118.997175] ? nsecs_to_jiffies+0x30/0x30 [ 119.001321] SyS_sendfile64+0x11f/0x140 [ 119.005309] ? SyS_sendfile+0x150/0x150 [ 119.010391] ? do_clock_gettime+0xd0/0xd0 [ 119.014515] ? fput+0x19/0x150 [ 119.017689] ? do_syscall_64+0x43/0x520 [ 119.021639] ? SyS_sendfile+0x150/0x150 [ 119.025594] do_syscall_64+0x19b/0x520 [ 119.029466] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 119.034648] RIP: 0033:0x4598e9 [ 119.037815] RSP: 002b:00007fefa42dbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 119.045502] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 00000000004598e9 [ 119.052760] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000004 [ 119.060012] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 119.067271] R10: 00008040fffffffd R11: 0000000000000246 R12: 00007fefa42dc6d4 [ 119.074528] R13: 00000000004c709e R14: 00000000004dc750 R15: 00000000ffffffff 06:23:16 executing program 0: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffccf, 0x1f4, 0x0, 0xffffffffffffff37) [ 119.081782] Code: 24 08 48 0f 44 d8 e8 24 4d de fe 48 85 ed 0f 84 7e 03 00 00 e8 16 4d de fe 48 8d 7b 78 8b ac 24 c8 00 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 28 84 c0 74 08 3c 03 0f 8e 15 11 00 00 2b 6b 78 85 [ 119.100910] RIP: do_tcp_sendpages+0x33c/0x1780 RSP: ffff8881987f76a8 [ 119.113758] ---[ end trace 8108b02ddacd0cd6 ]--- [ 119.124489] Kernel panic - not syncing: Fatal exception [ 119.130706] Kernel Offset: 0x8400000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 119.141683] Rebooting in 86400 seconds..