[ 31.462873] kauditd_printk_skb: 9 callbacks suppressed [ 31.462880] audit: type=1800 audit(1564300787.239:33): pid=6883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 31.490567] audit: type=1800 audit(1564300787.239:34): pid=6883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 [ 32.324918] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 32.693115] audit: type=1400 audit(1564300788.469:35): avc: denied { map } for pid=7057 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 32.744897] random: sshd: uninitialized urandom read (32 bytes read) [ 33.395264] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.132' (ECDSA) to the list of known hosts. [ 38.902248] random: sshd: uninitialized urandom read (32 bytes read) 2019/07/28 07:59:54 fuzzer started [ 39.099124] audit: type=1400 audit(1564300794.869:36): avc: denied { map } for pid=7067 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 40.868415] random: cc1: uninitialized urandom read (8 bytes read) 2019/07/28 07:59:57 dialing manager at 10.128.0.105:45179 2019/07/28 07:59:57 syscalls: 2461 2019/07/28 07:59:57 code coverage: enabled 2019/07/28 07:59:57 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/07/28 07:59:57 extra coverage: extra coverage is not supported by the kernel 2019/07/28 07:59:57 setuid sandbox: enabled 2019/07/28 07:59:57 namespace sandbox: enabled 2019/07/28 07:59:57 Android sandbox: /sys/fs/selinux/policy does not exist 2019/07/28 07:59:57 fault injection: enabled 2019/07/28 07:59:57 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/07/28 07:59:57 net packet injection: enabled 2019/07/28 07:59:57 net device setup: enabled [ 43.835047] random: crng init done 08:01:57 executing program 5: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x5, &(0x7f0000000080)) 08:01:57 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40044590, &(0x7f0000000140)={0x0, 0x0, 0x0}) 08:01:57 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc008551a, 0x0) 08:01:57 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000000)=""/179) 08:01:57 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x3d, &(0x7f0000000580)={@mcast2}, &(0x7f00000005c0)=0x20) 08:01:57 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001500192340834b80040d8c5602067fffffff81004e220000000058000b4824ca945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010009080800414900000004fcff", 0x58}], 0x1) accept4(r1, &(0x7f0000000000)=@pppol2tpin6, &(0x7f0000000080)=0x80, 0x0) [ 161.249912] audit: type=1400 audit(1564300917.019:37): avc: denied { map } for pid=7085 comm="syz-executor.3" path="/sys/kernel/debug/kcov" dev="debugfs" ino=13737 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 161.512290] IPVS: ftp: loaded support on port[0] = 21 [ 161.805880] chnl_net:caif_netlink_parms(): no params data found [ 161.814937] IPVS: ftp: loaded support on port[0] = 21 [ 161.866144] bridge0: port 1(bridge_slave_0) entered blocking state [ 161.873040] bridge0: port 1(bridge_slave_0) entered disabled state [ 161.880227] device bridge_slave_0 entered promiscuous mode [ 161.889289] bridge0: port 2(bridge_slave_1) entered blocking state [ 161.895702] bridge0: port 2(bridge_slave_1) entered disabled state [ 161.902610] device bridge_slave_1 entered promiscuous mode [ 161.922837] IPVS: ftp: loaded support on port[0] = 21 [ 161.941580] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 161.952082] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 161.975649] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 161.983138] team0: Port device team_slave_0 added [ 161.995304] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 162.002646] team0: Port device team_slave_1 added [ 162.019771] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 162.029955] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 162.093496] IPVS: ftp: loaded support on port[0] = 21 [ 162.142123] device hsr_slave_0 entered promiscuous mode [ 162.180270] device hsr_slave_1 entered promiscuous mode [ 162.223936] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 162.230705] chnl_net:caif_netlink_parms(): no params data found [ 162.239817] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 162.345174] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.352363] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.359554] device bridge_slave_0 entered promiscuous mode [ 162.368525] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.374957] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.381938] device bridge_slave_1 entered promiscuous mode [ 162.388539] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.394998] bridge0: port 2(bridge_slave_1) entered forwarding state [ 162.401883] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.408231] bridge0: port 1(bridge_slave_0) entered forwarding state [ 162.418363] chnl_net:caif_netlink_parms(): no params data found [ 162.443839] IPVS: ftp: loaded support on port[0] = 21 [ 162.463367] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 162.492527] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 162.540226] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 162.547323] team0: Port device team_slave_0 added [ 162.555632] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 162.563117] team0: Port device team_slave_1 added [ 162.594002] bridge0: port 1(bridge_slave_0) entered blocking state [ 162.601958] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.608800] device bridge_slave_0 entered promiscuous mode [ 162.616141] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 162.624737] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 162.657916] bridge0: port 2(bridge_slave_1) entered blocking state [ 162.665130] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.672081] device bridge_slave_1 entered promiscuous mode [ 162.733176] device hsr_slave_0 entered promiscuous mode [ 162.780260] device hsr_slave_1 entered promiscuous mode [ 162.843603] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 162.852265] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 162.863590] chnl_net:caif_netlink_parms(): no params data found [ 162.884163] bridge0: port 1(bridge_slave_0) entered disabled state [ 162.901756] bridge0: port 2(bridge_slave_1) entered disabled state [ 162.923230] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 162.936245] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 163.008527] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 163.016476] IPVS: ftp: loaded support on port[0] = 21 [ 163.016976] team0: Port device team_slave_0 added [ 163.028518] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 163.056907] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.063699] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.070971] device bridge_slave_0 entered promiscuous mode [ 163.077537] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 163.084617] team0: Port device team_slave_1 added [ 163.090237] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 163.118754] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.125169] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.132273] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.139169] device bridge_slave_1 entered promiscuous mode [ 163.146472] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 163.222195] device hsr_slave_0 entered promiscuous mode [ 163.261010] device hsr_slave_1 entered promiscuous mode [ 163.321439] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 163.347009] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 163.355877] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 163.367185] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 163.375688] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 163.382282] chnl_net:caif_netlink_parms(): no params data found [ 163.426044] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 163.433514] team0: Port device team_slave_0 added [ 163.451576] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 163.459433] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 163.468512] team0: Port device team_slave_1 added [ 163.485899] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 163.494405] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 163.501804] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 163.517096] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.524032] bridge0: port 1(bridge_slave_0) entered disabled state [ 163.531309] device bridge_slave_0 entered promiscuous mode [ 163.538590] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 163.546346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 163.565037] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 163.571849] 8021q: adding VLAN 0 to HW filter on device team0 [ 163.595464] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.601964] bridge0: port 2(bridge_slave_1) entered disabled state [ 163.609080] device bridge_slave_1 entered promiscuous mode [ 163.631761] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 163.640416] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 163.712091] device hsr_slave_0 entered promiscuous mode [ 163.762262] device hsr_slave_1 entered promiscuous mode [ 163.808043] 8021q: adding VLAN 0 to HW filter on device bond0 [ 163.814658] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 163.822778] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 163.830333] bridge0: port 1(bridge_slave_0) entered blocking state [ 163.836664] bridge0: port 1(bridge_slave_0) entered forwarding state [ 163.844934] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 163.854561] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 163.872347] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 163.885594] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 163.892924] team0: Port device team_slave_0 added [ 163.898223] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 163.906196] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 163.913749] bridge0: port 2(bridge_slave_1) entered blocking state [ 163.920150] bridge0: port 2(bridge_slave_1) entered forwarding state [ 163.933793] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 163.941599] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 163.949182] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 163.959516] team0: Port device team_slave_1 added [ 163.965824] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 163.982610] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 163.995363] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 164.004322] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 164.018940] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 164.028298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 164.035585] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.043696] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.051759] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.059201] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.084513] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 164.092604] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 164.108592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.117029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.124592] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.131471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.164827] chnl_net:caif_netlink_parms(): no params data found [ 164.176488] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 164.194132] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 164.205913] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 164.212814] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.218863] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.226611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.238841] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 164.294045] device hsr_slave_0 entered promiscuous mode [ 164.350322] device hsr_slave_1 entered promiscuous mode [ 164.392168] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.398631] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 164.406201] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 164.415665] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 164.423522] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 164.438477] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 164.444784] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 164.456553] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 164.468492] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 164.478150] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.491940] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.499522] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.505911] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.513795] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.524885] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 164.535565] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 164.545685] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 164.552039] 8021q: adding VLAN 0 to HW filter on device team0 [ 164.558086] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.566510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.574211] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.580599] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.587355] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 164.594619] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 164.604743] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 164.625747] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 164.634845] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 164.642203] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.649903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 164.657840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 164.665478] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.671863] bridge0: port 1(bridge_slave_0) entered forwarding state [ 164.679904] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 164.689121] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 164.698683] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 164.717580] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 164.729984] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 164.737998] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 164.745987] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 164.754402] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.760826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 164.769580] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 164.776766] bridge0: port 1(bridge_slave_0) entered blocking state [ 164.783218] bridge0: port 1(bridge_slave_0) entered disabled state [ 164.791011] device bridge_slave_0 entered promiscuous mode [ 164.797542] bridge0: port 2(bridge_slave_1) entered blocking state [ 164.804042] bridge0: port 2(bridge_slave_1) entered disabled state [ 164.811870] device bridge_slave_1 entered promiscuous mode [ 164.833698] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 164.841706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 164.849254] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 164.857830] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 164.870655] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 164.878108] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 164.887821] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 164.896357] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 164.904544] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 164.912207] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 164.919621] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 164.928041] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 164.937064] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 164.950718] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 164.969648] 8021q: adding VLAN 0 to HW filter on device bond0 [ 164.982641] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 164.996441] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 165.017454] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 165.028025] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.038588] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 165.046490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.063384] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 165.071716] team0: Port device team_slave_0 added [ 165.083868] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready 08:02:00 executing program 5: [ 165.098520] team0: Port device team_slave_1 added [ 165.107771] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 165.123801] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 165.129839] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.144383] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready 08:02:00 executing program 5: r0 = socket$caif_stream(0x25, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000001400)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x80) [ 165.151646] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 165.159154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.173134] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.182936] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.189858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.197919] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.213685] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 165.227386] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 165.237153] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready 08:02:01 executing program 5: creat(&(0x7f00000001c0)='./bus\x00', 0x0) listxattr(&(0x7f0000000280)='./bus\x00', &(0x7f0000000380)=""/13, 0xd) [ 165.246776] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 165.256032] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 165.266362] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 165.284079] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready 08:02:01 executing program 5: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006fe000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) [ 165.298132] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.307840] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.315523] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 165.323536] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 165.331351] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 165.339011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 08:02:01 executing program 5: r0 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) [ 165.349662] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 165.357724] audit: type=1400 audit(1564300921.129:38): avc: denied { map } for pid=7130 comm="syz-executor.5" path="/dev/ashmem" dev="devtmpfs" ino=15309 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 165.380663] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready 08:02:01 executing program 5: bpf$OBJ_GET_PROG(0x7, 0x0, 0x514) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x7, 0x3, 0x0, 0xa01, 0xa}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) setxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) 08:02:01 executing program 5: mkdir(&(0x7f00000000c0)='./control\x00', 0x0) r0 = inotify_init() r1 = epoll_create(0x1000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) r2 = inotify_add_watch(r0, &(0x7f0000000380)='./control\x00', 0x4000004) ppoll(&(0x7f0000000180)=[{r0}, {r1}], 0x2, 0x0, 0x0, 0x0) inotify_rm_watch(r0, r2) [ 165.401184] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 165.407259] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.483865] device hsr_slave_0 entered promiscuous mode [ 165.540689] device hsr_slave_1 entered promiscuous mode [ 165.595207] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.608707] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 165.617142] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 165.627405] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 165.643386] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 165.651858] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 165.659782] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 165.667997] bridge0: port 1(bridge_slave_0) entered blocking state [ 165.674410] bridge0: port 1(bridge_slave_0) entered forwarding state [ 165.682141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 165.689820] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 165.697587] bridge0: port 2(bridge_slave_1) entered blocking state [ 165.703974] bridge0: port 2(bridge_slave_1) entered forwarding state [ 165.711222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 165.720837] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 165.730977] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 165.738556] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 165.752006] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.762968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 165.779174] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 165.793042] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 165.810302] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 165.830543] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 165.836743] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 165.850613] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 165.866717] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 165.882157] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 165.901765] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 165.909665] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 165.917965] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 165.930806] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 165.946073] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 165.952772] 8021q: adding VLAN 0 to HW filter on device team0 [ 165.961189] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 165.969557] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 165.977431] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 165.986046] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 165.994122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.001957] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.009680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.018519] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.047934] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 166.058143] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 166.066182] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.073151] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.082204] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.089779] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.096171] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.111431] 8021q: adding VLAN 0 to HW filter on device bond0 [ 166.119806] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 166.126939] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.135583] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 166.147087] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 166.158396] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 166.165707] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.173738] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.182209] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.188548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.195598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.205607] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 166.214346] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 166.224603] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 166.232031] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 166.238873] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.249733] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 166.259151] 8021q: adding VLAN 0 to HW filter on device team0 08:02:02 executing program 3: ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) 08:02:02 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, 0x0) [ 166.270334] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.279880] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 166.289444] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 166.318802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 166.334943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 166.362208] bridge0: port 1(bridge_slave_0) entered blocking state [ 166.368598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 166.384653] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.396183] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.416358] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 166.426993] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 166.438723] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 166.446696] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.453851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 166.461919] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 166.469499] bridge0: port 2(bridge_slave_1) entered blocking state [ 166.475976] bridge0: port 2(bridge_slave_1) entered forwarding state [ 166.483398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.491313] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.501588] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 166.509315] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 166.521815] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 166.528729] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 166.536484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.544196] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.551749] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.559122] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.568969] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 166.582000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 166.592895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 166.603533] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 166.613374] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 166.622196] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 166.628221] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.638179] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 166.646111] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 166.653605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 166.661506] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 166.674040] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 166.685409] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 166.693824] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 166.705938] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 166.727174] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 166.737828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 166.748987] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 166.759765] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 166.769529] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 166.779736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 166.795172] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 166.814840] 8021q: adding VLAN 0 to HW filter on device batadv0 08:02:02 executing program 4: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x10000000000000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x3, 0x0, 0x0, 0x1, 0x6, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f00000000c0)={0x2, 0x1000, 0x81, 0xffff, 0x2, 0x3}) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) futex(&(0x7f0000000540)=0x2, 0x3, 0x0, &(0x7f00000005c0)={r2, r3+10000000}, &(0x7f0000000600)=0x2, 0x2) socket$isdn_base(0x22, 0x3, 0x0) clone(0x4000000000003fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 08:02:03 executing program 2: 08:02:03 executing program 1: 08:02:03 executing program 5: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0), 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 08:02:03 executing program 3: futex(&(0x7f0000000540), 0x0, 0x0, &(0x7f00000005c0), 0x0, 0x0) 08:02:03 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, 0x0) 08:02:03 executing program 4: 08:02:03 executing program 2: [ 167.996688] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. [ 168.008856] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.1'. 08:02:03 executing program 1: 08:02:03 executing program 4: 08:02:03 executing program 2: 08:02:03 executing program 0: 08:02:03 executing program 3: 08:02:03 executing program 4: 08:02:03 executing program 1: [ 168.320038] hrtimer: interrupt took 27927 ns 08:02:04 executing program 5: 08:02:04 executing program 2: 08:02:04 executing program 0: 08:02:04 executing program 4: 08:02:04 executing program 3: 08:02:04 executing program 1: 08:02:04 executing program 1: 08:02:04 executing program 5: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) eventfd(0x0) socket$inet_udp(0x2, 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000900)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 08:02:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000200)="409582bd35639319f0ac00e2f0e136ef963fc55e8ac823a837d8f3104e27efc0dfd5989bb1985be3de1018e5f10ba40d3bc9ff8a2967d80805", 0x39}], 0x1}, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 08:02:04 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) 08:02:04 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000100)={'bridge0\x00\x0f\x00', &(0x7f00000000c0)=@ethtool_ringparam={0x12, 0x0, 0x0, 0x0, 0xf}}) 08:02:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x9) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) close(r2) recvmmsg(r1, &(0x7f0000000080), 0x1ca, 0x0, 0x0) 08:02:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000000200)="409582bd35639319f0ac00e2f0e136ef963fc55e8ac823a837d8f3104e27efc0dfd5989bb1985be3de1018e5f10ba40d3bc9ff8a2967d80805cd", 0x3a}], 0x1}, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 08:02:04 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00008be000)='/dev/usbmon#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000a05000/0x400000)=nil, 0x400000, 0x1000002, 0x8012, r0, 0x0) [ 168.599218] audit: type=1400 audit(1564300924.369:39): avc: denied { name_bind } for pid=7259 comm="syz-executor.4" src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 08:02:04 executing program 3: mkdir(&(0x7f0000000d40)='./file0\x00', 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000480)={'trans=unix,'}) 08:02:04 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) clock_gettime(0x0, &(0x7f0000007c00)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000080)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000006d00), 0x400034b, 0x24000004) 08:02:04 executing program 4: syz_open_dev$media(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, 0x0) clock_gettime(0x0, &(0x7f0000007c00)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f0000000080)={0x1}, 0x8) sendmmsg(r0, &(0x7f0000006d00), 0x400034b, 0x24000004) [ 168.722742] 9pnet: p9_fd_create_unix (7275): problem connecting socket: ./file0: -111 [ 168.731848] audit: type=1400 audit(1564300924.399:40): avc: denied { node_bind } for pid=7259 comm="syz-executor.4" saddr=::1 src=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 168.745880] 9pnet: p9_fd_create_unix (7277): problem connecting socket: ./file0: -111 08:02:04 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f00000001c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x56) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 08:02:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) sendmsg$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) clock_nanosleep(0x0, 0x1, 0x0, 0x0) unshare(0x8020000) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f00000000c0)) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'trusted.', 'ns/ipc\x00'}) ioctl$SNDRV_TIMER_IOCTL_TREAD(0xffffffffffffffff, 0x40045402, &(0x7f0000000180)) [ 168.915312] audit: type=1400 audit(1564300924.409:41): avc: denied { name_connect } for pid=7259 comm="syz-executor.4" dest=20000 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 169.047803] audit: type=1400 audit(1564300924.469:42): avc: denied { map } for pid=7268 comm="syz-executor.0" path="/dev/usbmon0" dev="devtmpfs" ino=1533 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file permissive=1 08:02:04 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, 0x0, 0x400000000000000, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20}, 0x1c) r3 = open(&(0x7f00000003c0)='./file0\x00', 0x20141042, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)=0x3) capget(0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000200)=@ccm_128={{0x307}, "975a9391d7cfeaac", "fb0e74f781c62c99181f0bd5e0a05479", "45ba3e75", "d71659cb5fdbf104"}, 0x28) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r4 = getpid() rt_sigqueueinfo(r4, 0x13, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syslog(0x0, 0x0, 0x2b) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ftruncate(r3, 0x280080) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff}]}, 0x10) sendfile(r2, r3, &(0x7f0000000140), 0x200800900000003) 08:02:04 executing program 1: r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x8000000001) write$vhci(r0, &(0x7f0000000200)=@HCI_VENDOR_PKT, 0x2) [ 169.079388] audit: type=1400 audit(1564300924.599:43): avc: denied { create } for pid=7282 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:02:05 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x2}}, 0x9) 08:02:05 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0xffffffff, 0x2}}, 0x9) [ 169.179808] audit: type=1400 audit(1564300924.609:44): avc: denied { write } for pid=7282 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 169.204549] audit: type=1400 audit(1564300924.649:45): avc: denied { read } for pid=7282 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 08:02:05 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB="4000000012003b0e000000000000000400000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000c710b55f", @ANYRES32=0x6, @ANYBLOB="1800120008000100767469000c00020008000400e0000002"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) [ 169.278275] audit: type=1400 audit(1564300925.049:46): avc: denied { syslog } for pid=7300 comm="syz-executor.5" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 08:02:05 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) connect$inet6(r0, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}, 0xfffffffffffffffc}, 0x1c) r1 = open(&(0x7f0000000240)='./file0\x00', 0x80000, 0xb4b9afebc74d48c9) accept$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000380)='cgroupwlan0lo\\ppp1&\x00') r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f00000002c0)={0x4, &(0x7f0000000180)=[{0xffff, 0xffffffff, 0x4, 0x5}, {0x0, 0x5, 0x4, 0x4}, {0x0, 0xec, 0x100000000, 0x1000000000000000}, {0x3, 0x1, 0x2, 0x1f}]}) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getsockopt$netlink(r3, 0x10e, 0x2, &(0x7f00000003c0)=""/194, &(0x7f00000001c0)=0xc2) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) sendmsg$inet6(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)="330d3b54d45dc3f566359fe98674a7d6afb333c996a76cbd9f61f603d0b6757de38a05b7c2b213d3d7bd301858f56906ca407d9dc3", 0x35}, {&(0x7f0000000500)="1b32841966f88550a0fe00d4de452decdf2c12eccedc8e0c71dd5d5d896a3b8db155e674cd3b0340a2bed32dbdad662d127efdb0319e27b18f7869028f27e9ab01acc0626627", 0x46}], 0x2}, 0x4000000) 08:02:05 executing program 4: clone(0x802102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() select(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000080)="777cdfc3c429680ce9525f98df762cf988f411285270e50ef97ffc8a0a7aeded1c01f65c86d9fd81c10db6d893f3271f24f806eb04a440f34f", 0x39) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x800, 0x1564, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 08:02:05 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480), 0x1000000000000207, 0x0) [ 169.389619] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 169.422955] ptrace attach of "/root/syz-executor.4"[7323] was attempted by "/root/syz-executor.4"[7326] 08:02:05 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000100)={0x0, 0x0, 0x0}) [ 169.445657] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. 08:02:05 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001ee, 0x0) [ 169.526097] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. 08:02:05 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x806, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af14, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) write$uinput_user_dev(r0, &(0x7f0000000540)={'syz1\x00'}, 0x45c) 08:02:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f01000000450001070000001419001a000400030003000700550e69330f4de5020080080000", 0x39}], 0x100000000000039e) 08:02:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, 0x0, 0x400000000000000, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20}, 0x1c) r3 = open(&(0x7f00000003c0)='./file0\x00', 0x20141042, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)=0x3) capget(0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000200)=@ccm_128={{0x307}, "975a9391d7cfeaac", "fb0e74f781c62c99181f0bd5e0a05479", "45ba3e75", "d71659cb5fdbf104"}, 0x28) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r4 = getpid() rt_sigqueueinfo(r4, 0x13, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syslog(0x0, 0x0, 0x2b) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ftruncate(r3, 0x280080) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff}]}, 0x10) sendfile(r2, r3, &(0x7f0000000140), 0x200800900000003) 08:02:05 executing program 1: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000080)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/tcp6\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000480), 0x10000000000001ee, 0x0) 08:02:05 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) poll(&(0x7f0000000500)=[{r0, 0x10}, {r1}, {r0, 0x8022}, {r0, 0x1}, {r0}], 0x5, 0x3) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='n\x05\x00\x00\x00\x00\x00\x00\x00ter6\x00\xc3u\xd6\xe1') write$apparmor_exec(r2, &(0x7f0000000540)={'stack ', '\x00'}, 0x7) ioctl$int_out(0xffffffffffffffff, 0xfffffffffffffffd, &(0x7f0000000480)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r2, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x60, 0x0, 0x128, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2842}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x60}}, 0x4810) r4 = dup2(r3, r3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000004c0)={0x0, r4, 0x2}) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x43, &(0x7f00000001c0)={'ah\x00'}, &(0x7f0000000200)=0x1e) ptrace(0x5206, 0x0) wait4(0x0, 0x0, 0x0, 0x0) rt_sigreturn() pselect6(0x40, &(0x7f0000000080)={0x0, 0x1000, 0x6, 0xfffffffffffff801, 0x3f, 0x4, 0x401, 0x7}, 0x0, 0x0, &(0x7f0000000140), &(0x7f0000000240)={0x0}) 08:02:05 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) connect$inet6(r0, &(0x7f00000004c0)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) fcntl$getownex(r0, 0x10, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}, 0xfffffffffffffffc}, 0x1c) r1 = open(&(0x7f0000000240)='./file0\x00', 0x80000, 0xb4b9afebc74d48c9) accept$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x41007701, &(0x7f0000000380)='cgroupwlan0lo\\ppp1&\x00') r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) ioctl$PPPIOCSPASS(r1, 0x40107447, &(0x7f00000002c0)={0x4, &(0x7f0000000180)=[{0xffff, 0xffffffff, 0x4, 0x5}, {0x0, 0x5, 0x4, 0x4}, {0x0, 0xec, 0x100000000, 0x1000000000000000}, {0x3, 0x1, 0x2, 0x1f}]}) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) getsockopt$netlink(r3, 0x10e, 0x2, &(0x7f00000003c0)=""/194, &(0x7f00000001c0)=0xc2) r4 = socket$inet(0x10, 0x3, 0x0) sendmsg(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) sendmsg$inet6(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)="330d3b54d45dc3f566359fe98674a7d6afb333c996a76cbd9f61f603d0b6757de38a05b7c2b213d3d7bd301858f56906ca407d9dc3", 0x35}, {&(0x7f0000000500)="1b32841966f88550a0fe00d4de452decdf2c12eccedc8e0c71dd5d5d896a3b8db155e674cd3b0340a2bed32dbdad662d127efdb0319e27b18f7869028f27e9ab01acc0626627", 0x46}], 0x2}, 0x4000000) 08:02:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)='/dev/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x12, r2, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) 08:02:05 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1000004, 0xc012, r0, 0x0) 08:02:05 executing program 2: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$selinux_create(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='system_u:object_r:urandom_device_t:s0 unconfined_u:system_r:insmod_t:s0-\t0'], 0x4a) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/create\x00', 0x2, 0x0) splice(r0, 0x0, r2, 0x0, 0x1000, 0x0) [ 169.814198] audit: type=1400 audit(1564300925.589:47): avc: denied { map } for pid=7365 comm="syz-executor.3" path=2F6D656D66643A2F6465762F6175746F6673202864656C6574656429 dev="tmpfs" ino=26656 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 08:02:05 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000000000), 0x4, 0x0) 08:02:05 executing program 4: clone(0x80000000003ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0xfffffffffffffffa) request_key(0x0, &(0x7f00000003c0)={'syz', 0x0}, &(0x7f0000000400)='\xd1?\xf3\xd7v', 0xfffffffffffffffe) request_key(&(0x7f0000000500)='id_legacy\x00', &(0x7f0000000540)={'syz', 0x3}, &(0x7f0000000580)='^systemeth1/GPL\x00', 0x0) add_key$keyring(&(0x7f0000000680)='keyring\x00', 0x0, 0x0, 0x0, 0x0) capset(&(0x7f0000002ffa)={0x120080522}, &(0x7f0000000000)) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x6000, 0x0) ioctl$PPPIOCGDEBUG(r0, 0x80047441, &(0x7f0000000100)) keyctl$set_reqkey_keyring(0xe, 0x4) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)={0xb0, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x9c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth0_to_bond\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @empty}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x9, @ipv4={[], [], @broadcast}, 0x8}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}]}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x1}, 0x20000080) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) 08:02:05 executing program 1: 08:02:05 executing program 2: pipe(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$selinux_create(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='system_u:object_r:urandom_device_t:s0 unconfined_u:system_r:insmod_t:s0-\t0'], 0x4a) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/create\x00', 0x2, 0x0) splice(r0, 0x0, r2, 0x0, 0x1000, 0x0) 08:02:05 executing program 1: r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x0) 08:02:05 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, 0x0, 0x400000000000000, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20}, 0x1c) r3 = open(&(0x7f00000003c0)='./file0\x00', 0x20141042, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)=0x3) capget(0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000200)=@ccm_128={{0x307}, "975a9391d7cfeaac", "fb0e74f781c62c99181f0bd5e0a05479", "45ba3e75", "d71659cb5fdbf104"}, 0x28) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r4 = getpid() rt_sigqueueinfo(r4, 0x13, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syslog(0x0, 0x0, 0x2b) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ftruncate(r3, 0x280080) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff}]}, 0x10) sendfile(r2, r3, &(0x7f0000000140), 0x200800900000003) 08:02:05 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)='/dev/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x12, r2, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) [ 170.007760] audit: type=1400 audit(1564300925.659:48): avc: denied { map } for pid=7375 comm="syz-executor.1" path="/selinux/policy" dev="selinuxfs" ino=20 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 08:02:05 executing program 2: r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000080)="b156d4", 0x3) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='Z\x00') 08:02:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pivot_root(0x0, 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000800)='devtmpfs\x00', 0x847, &(0x7f0000000780)) 08:02:05 executing program 1: bpf$OBJ_GET_PROG(0x7, 0x0, 0x514) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0xffffffbd}, [@ldst={0x7, 0x3, 0x0, 0xa01, 0xa}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x48) getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, 0x0, 0x0) 08:02:05 executing program 4: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000340)=@req={0x3fc}, 0x10) 08:02:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)='/dev/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x12, r2, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) 08:02:06 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x20) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0xd}, 0x1c) sendto$inet6(r0, &(0x7f0000000000), 0xff77, 0x0, 0x0, 0x4d97) 08:02:06 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) 08:02:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') 08:02:06 executing program 1: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) shmdt(0x0) 08:02:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, 0x0, 0x400000000000000, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20}, 0x1c) r3 = open(&(0x7f00000003c0)='./file0\x00', 0x20141042, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)=0x3) capget(0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000200)=@ccm_128={{0x307}, "975a9391d7cfeaac", "fb0e74f781c62c99181f0bd5e0a05479", "45ba3e75", "d71659cb5fdbf104"}, 0x28) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r4 = getpid() rt_sigqueueinfo(r4, 0x13, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syslog(0x0, 0x0, 0x2b) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ftruncate(r3, 0x280080) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff}]}, 0x10) sendfile(r2, r3, &(0x7f0000000140), 0x200800900000003) 08:02:06 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, &(0x7f0000000880)=ANY=[@ANYBLOB="b7000000a5517f5fbfa30000000000000703000028feffff720af0fff8ffffff71a4f0ff00000000b7060000000000016d400300000000006506000001ed000071182800000000006c640000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000023bc065b7a379d179fc9e94af69912435f1b6a693172e61917adef6ee1c8a2b4f8ef1e50beca090f32050e436fe275daf51efd601b6bf01c8e8b1b5e4fef3bef7054815ae98743d1ace4c46631256dd19aed0d600c095199fe3ff3128e599b0eaebbdbd7359a48f5b0afc646cb779ae485a860a09816aebd761d2c9"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 08:02:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = memfd_create(&(0x7f0000000040)='/dev/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x12, r2, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) 08:02:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000440)={0x750, {0x2, 0x0, @remote}, {0x2, 0x0, @remote}, {0x2, 0x0, @loopback}, 0x800000000000047, 0x8, 0x5, 0x46a}) 08:02:06 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0x0) 08:02:06 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 08:02:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x15}, 0x455}}, 0x0) 08:02:06 executing program 1: r0 = socket(0x400000000010, 0x803, 0x0) getsockopt$sock_linger(r0, 0x1, 0x2f, 0x0, &(0x7f0000001440)) 08:02:06 executing program 2: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000340), 0x10) 08:02:06 executing program 4: r0 = epoll_create1(0x0) epoll_wait(r0, &(0x7f0000000000)=[{}], 0x1, 0x90000) 08:02:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) memfd_create(&(0x7f0000000040)='/dev/autofs\x00', 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) 08:02:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) dup2(r0, r1) 08:02:06 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, 0x0, 0x400000000000000, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20}, 0x1c) r3 = open(&(0x7f00000003c0)='./file0\x00', 0x20141042, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)=0x3) capget(0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000200)=@ccm_128={{0x307}, "975a9391d7cfeaac", "fb0e74f781c62c99181f0bd5e0a05479", "45ba3e75", "d71659cb5fdbf104"}, 0x28) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r4 = getpid() rt_sigqueueinfo(r4, 0x13, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syslog(0x0, 0x0, 0x2b) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ftruncate(r3, 0x280080) sendfile(r2, r3, &(0x7f0000000140), 0x200800900000003) 08:02:06 executing program 0: r0 = socket(0x400000000010, 0x803, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000180), 0x10) 08:02:06 executing program 2: memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) clone(0x41be, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000000c0)) ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000280)={0x0}) 08:02:06 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf74, 0x8000000000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, 0x0) fallocate(r0, 0x1, 0x0, 0x369e5d84) 08:02:06 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) 08:02:06 executing program 0: r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}}, 0x24) sendmmsg(r0, &(0x7f0000005c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[{0x18, 0x110, 0x1, 'w'}], 0x18}}], 0x1, 0x0) [ 170.904647] kasan: CONFIG_KASAN_INLINE enabled [ 170.913419] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 170.937835] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 170.944077] Modules linked in: [ 170.947267] CPU: 0 PID: 7502 Comm: syz-executor.0 Not tainted 4.14.134 #30 [ 170.954265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.963609] task: ffff888057036700 task.stack: ffff888057038000 [ 170.969753] RIP: 0010:rxrpc_connect_call+0xc9/0x41a0 [ 170.974838] RSP: 0018:ffff88805703f738 EFLAGS: 00010206 [ 170.980193] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90007438000 [ 170.987455] RDX: 0000000000000003 RSI: ffffffff8593c089 RDI: 0000000000000018 [ 170.994716] RBP: ffff88805703f880 R08: 0000000000000001 R09: ffff888057036fa0 [ 171.001986] R10: 0000000000000000 R11: 0000000000000000 R12: ffff888091e28c00 [ 171.009254] R13: ffff88805f3304e0 R14: ffff88805f3304d0 R15: ffff88805703f998 [ 171.016512] FS: 00007f2f94795700(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 [ 171.024818] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 171.030689] CR2: 00007ffe3dd04b50 CR3: 0000000090993000 CR4: 00000000001406f0 [ 171.037954] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 171.045213] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 171.052469] Call Trace: [ 171.055056] ? release_sock+0x14a/0x1b0 [ 171.059025] ? rxrpc_discard_expired_client_conns+0x7e0/0x7e0 [ 171.064900] ? __local_bh_enable_ip+0x99/0x1a0 [ 171.069473] ? trace_hardirqs_on_caller+0x400/0x590 [ 171.074489] ? release_sock+0x14a/0x1b0 [ 171.078454] ? trace_hardirqs_on+0xd/0x10 [ 171.082602] ? __local_bh_enable_ip+0x99/0x1a0 [ 171.087183] ? _raw_spin_unlock_bh+0x31/0x40 [ 171.091602] rxrpc_new_client_call+0x8f7/0x1420 [ 171.096263] ? rxrpc_do_sendmsg+0x91a/0x1103 [ 171.100667] rxrpc_do_sendmsg+0x91a/0x1103 [ 171.104895] ? rxrpc_kernel_send_data+0x470/0x470 [ 171.109728] ? __local_bh_enable_ip+0x99/0x1a0 [ 171.114307] rxrpc_sendmsg+0x48a/0x650 [ 171.118184] ? security_socket_sendmsg+0x89/0xb0 [ 171.122925] ? rxrpc_sock_destructor+0x130/0x130 [ 171.127674] sock_sendmsg+0xce/0x110 [ 171.131382] ___sys_sendmsg+0x349/0x840 [ 171.135342] ? copy_msghdr_from_user+0x3f0/0x3f0 [ 171.140092] ? __fget+0x210/0x370 [ 171.143543] ? lock_downgrade+0x6e0/0x6e0 [ 171.147686] ? __fget+0x237/0x370 [ 171.151134] ? __fget_light+0x172/0x1f0 [ 171.155099] ? __fdget+0x1b/0x20 [ 171.158464] ? sockfd_lookup_light+0xb4/0x160 [ 171.162952] __sys_sendmmsg+0x152/0x3a0 [ 171.166918] ? SyS_sendmsg+0x50/0x50 [ 171.170636] ? kasan_check_read+0x11/0x20 [ 171.174777] ? _copy_to_user+0x87/0xd0 [ 171.178655] ? put_timespec64+0xb4/0x100 [ 171.182706] ? nsecs_to_jiffies+0x30/0x30 [ 171.186850] ? SyS_clock_gettime+0xf8/0x180 [ 171.191163] SyS_sendmmsg+0x35/0x60 [ 171.194785] ? __sys_sendmmsg+0x3a0/0x3a0 [ 171.198919] do_syscall_64+0x1e8/0x640 [ 171.202798] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 171.207817] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 171.213013] RIP: 0033:0x459829 [ 171.216200] RSP: 002b:00007f2f94794c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 171.224072] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000459829 [ 171.231328] RDX: 0000000000000001 RSI: 0000000020005c00 RDI: 0000000000000003 [ 171.238583] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 171.245841] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2f947956d4 [ 171.253101] R13: 00000000004c6fe8 R14: 00000000004dc518 R15: 00000000ffffffff [ 171.260385] Code: e8 03 80 3c 18 00 0f 85 6f 39 00 00 48 8b 85 28 ff ff ff 48 8b 18 48 b8 00 00 00 00 00 fc ff df 48 8d 7b 18 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 8a 39 00 00 48 8b 5b 18 48 8d bb 00 02 00 00 [ 171.279591] RIP: rxrpc_connect_call+0xc9/0x41a0 RSP: ffff88805703f738 [ 171.290829] kobject: 'vet' (ffff888057631070): kobject_cleanup, parent (null) 08:02:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$pfkey(0xffffffffffffff9c, 0x0, 0x400000000000000, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup(r1) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20}, 0x1c) r3 = open(&(0x7f00000003c0)='./file0\x00', 0x20141042, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000000)=0x3) capget(0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f0000000200)=@ccm_128={{0x307}, "975a9391d7cfeaac", "fb0e74f781c62c99181f0bd5e0a05479", "45ba3e75", "d71659cb5fdbf104"}, 0x28) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) lstat(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r4 = getpid() rt_sigqueueinfo(r4, 0x13, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$EVIOCGABS0(0xffffffffffffffff, 0x80184540, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) syslog(0x0, 0x0, 0x2b) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) ftruncate(r3, 0x280080) sendfile(r2, r3, &(0x7f0000000140), 0x200800900000003) 08:02:07 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) ioctl$TUNGETSNDBUF(r0, 0x800454d3, 0x0) [ 171.301345] kobject: 'vet' (ffff888057631070): calling ktype release [ 171.303273] kobject: 'loop5' (ffff8880a4ac2b60): kobject_uevent_env [ 171.308475] kobject: 'vet': free name [ 171.323382] kobject: 'loop5' (ffff8880a4ac2b60): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 171.333447] ---[ end trace 790fedea949c9083 ]--- [ 171.338740] Kernel panic - not syncing: Fatal exception [ 171.345124] Kernel Offset: disabled [ 171.348742] Rebooting in 86400 seconds..