[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 18.233367] audit: type=1400 audit(1518378512.733:6): avc: denied { map } for pid=4128 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.202' (ECDSA) to the list of known hosts. 2018/02/11 19:48:39 fuzzer started syzkaller login: [ 24.491887] audit: type=1400 audit(1518378518.991:7): avc: denied { map } for pid=4139 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/02/11 19:48:39 dialing manager at 10.128.0.26:36727 [ 27.876056] can: request_module (can-proto-0) failed. [ 27.884905] can: request_module (can-proto-0) failed. 2018/02/11 19:48:42 kcov=true, comps=false 2018/02/11 19:48:44 executing program 7: mlock(&(0x7f00000da000/0x2000)=nil, 0x2000) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f000072b000), &(0x7f0000001000-0x8), 0xb48, &(0x7f0000012000/0x3000)=nil, 0x2) exit(0x100) r0 = socket$pptp(0x18, 0x1, 0x2) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x9, &(0x7f0000001000-0x48)=[{0x0, 0x7, 0x7fffffff, 0x81}, {0x0, 0x3, 0x4, 0x81}, {0xffffffffffffffc0, 0x3f, 0xdbff}, {0x6, 0xfff, 0x3, 0x1}, {0x5, 0x0, 0xdebb, 0x101}, {0x80, 0x20, 0x9, 0x2}, {0x6, 0x1c92, 0x0, 0xffffffff}, {0xffffffffffffffff, 0xffffffffffff86cc, 0xcc5c, 0x1}, {0x2, 0x3, 0xfffffffffffff000, 0x8}]}, 0x8) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$audion(&(0x7f0000001000)='/dev/audio#\x00', 0xff, 0x200282) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000002000-0x7)=""/71) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000001000-0x10)=@generic="38cf922c6574006f14f4f21eedc35df8") mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000002000)=""/7) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000003000)=@add_del={0x2, &(0x7f0000003000)=@common='tunl0\x00', 0x9}) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) write$selinux_context(r1, &(0x7f0000004000)='system_u:object_r:mail_spool_t:s0\x00', 0x22) fcntl$setlease(r0, 0x400, 0x2) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001000-0x8)={0x0, 0x7f}, &(0x7f0000001000)=0x8) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000005000)=@assoc_value={r2, 0x7}, 0x8) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0086426, &(0x7f0000005000-0x8)={0x5, &(0x7f0000002000-0x28)=[{}, {}, {}, {}, {0x0}]}) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_DMA(r1, 0xc0286429, &(0x7f0000006000)={r3, 0x4, &(0x7f0000002000)=[0x6, 0x7fffffff, 0x5, 0x200], &(0x7f0000005000)=[0x0, 0x9, 0x63, 0x12, 0xff, 0x6, 0x4739, 0x69, 0x9], 0x40, 0x7, 0xffffffff00000001, &(0x7f0000006000)=[0x5, 0x80000000, 0x9, 0x0, 0x5, 0xcb, 0x8000], &(0x7f0000006000)=[0x0, 0x6, 0x40]}) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000001000-0x96)=""/150) socket$vsock_stream(0x28, 0x1, 0x0) userfaultfd(0x80000) 2018/02/11 19:48:44 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000c58000-0x1e)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000001000-0x20)={0x563, 0xfff, 0x8000, 0x4, 0x0, 0x4, 0x8, 0x1ff, 0x0}, &(0x7f0000000000)=0x20) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000001000-0x8c)={r1, @in6={{0xa, 0x3, 0x80000001, @mcast1={0xff, 0x1, [], 0x1}}}}, &(0x7f0000000000)=0x8c) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) accept4$vsock_stream(r0, &(0x7f0000001000)={0x28, 0x0, 0x2711, @reserved=0x1}, 0x10, 0x800) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000001000)={r2, 0xc07}, &(0x7f0000003000-0x2)=0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000001000-0x10)=[@in={0x2, 0x0, @broadcast=0xffffffff}], 0x10) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) connect$nfc_llcp(r0, &(0x7f0000004000-0x58)={0x27, 0x100, 0x7dd73712, 0x7, 0x8, 0xfffffffffffff77f, "d453a061d2edf6d1e2b8c05d425a626ecf1846dfa29fecf6538e0f9468ff7a6ce53018f01344dab2ae6b713c603110dc63fa0bbe9e077f30823a98980064b8", 0x3}, 0x58) r3 = syz_open_dev$usbmon(&(0x7f0000001000-0xd)='/dev/usbmon#\x00', 0x7ff, 0x80082) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) epoll_pwait(r3, &(0x7f0000004000)=[{}, {}, {}, {}, {}, {}], 0x6, 0x1, &(0x7f0000004000)={0xffffffff}, 0x8) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sndpcmp(&(0x7f0000006000-0x12)='/dev/snd/pcmC#D#p\x00', 0x0, 0x800) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000006000)='./file0\x00', &(0x7f0000005000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000005000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r4, r5, r6) r7 = getpgrp(0xffffffffffffffff) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) process_vm_readv(r7, &(0x7f0000002000)=[{&(0x7f0000007000)=""/26, 0x1a}, {&(0x7f0000008000-0x44)=""/68, 0x44}, {&(0x7f0000001000)=""/55, 0x37}], 0x3, &(0x7f0000000000)=[{&(0x7f0000008000-0x9)=""/9, 0x9}, {&(0x7f0000005000-0x50)=""/80, 0x50}, {&(0x7f0000003000-0x1c)=""/28, 0x1c}, {&(0x7f0000008000-0x6c)=""/108, 0x6c}, {&(0x7f0000007000)=""/123, 0x7b}, {&(0x7f0000005000-0x92)=""/146, 0x92}], 0x6, 0x0) 2018/02/11 19:48:44 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00007c5000)='/dev/audio\x00', 0x20001, 0x0) accept4$ipx(r0, &(0x7f0000c33000), &(0x7f0000921000)=0x10, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000001000-0x4)=0xfffffffffffffffb, 0x4) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000001000-0x4)=0x2, 0x4) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000001000-0x4), &(0x7f0000001000)=0x4) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000002000)={0x2, &(0x7f0000001000-0x10)=[{0x1, 0x7f, 0x80000000, 0xc159}, {0x20, 0x3, 0x5, 0x1000}]}, 0x8) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003000), &(0x7f0000003000)=0xc) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000004000)={@empty, @local={0xac, 0x14, 0x0, 0xaa}}, 0x8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001000-0xc)='/dev/autofs\x00', 0x80000, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000004000-0xc)={0x80000000}) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000006000-0x4)=0x6, 0x4) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000006000)=@req={0x3, 0x935, 0x3, 0xff}, 0x10) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000008000-0x18)=[{&(0x7f0000006000)}, {&(0x7f0000000000)="7eb3e393c74251bd8e29479c4ed106126a1dfde16be46f7c7f5a1b58b68f522fe92b1891a26c18683335094446bf", 0x2e}, {&(0x7f0000008000-0x78)="c38041fa749e5215a00e6a5e0c55531f600d5daa0e9293185edd3a258d09676537dbdb3140fafda31f32b7b00d485815ec053a19099ffd2187bc857e47ff65d80e71b4a39c72336e98bb3f9d4aa404b04c7c59c46a81020471161929ef96122e87fac59f9f05ad7a795d7719a111b7da077ce1a37c08d7f4", 0x78}], 0x3, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000009000-0xa)='/dev/dsp#\x00', 0x2, 0x4001) mmap(&(0x7f0000009000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000001000), &(0x7f000000a000-0x4)=0x14) mmap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) connect$nfc_llcp(r1, &(0x7f000000a000)={0x27, 0xf1, 0x100, 0x7, 0x6, 0xffffffffffffff1c, "85e5b36691f64c3853be92ac6ccb10248bf810c6152843bcf9014aff05bb5e883d471b756d43fbdb84929a366177eb811707c71ed85a2ce38bc5f7e2a3c138", 0x3}, 0x58) ioctl$KIOCSOUND(r2, 0x4b2f, 0x7) 2018/02/11 19:48:44 executing program 0: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000164000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty}, &(0x7f0000001000-0x4)=0x14) bpf$PROG_LOAD(0x5, &(0x7f0000f94000-0x48)={0x2, 0x9, &(0x7f000025b000-0x48)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, [@exit={0x95}, @alu={0x7, 0x9, 0x6, 0xf, 0x7, 0xffffffc3, 0xfffffffffffffff0}, @generic={0x7, 0x8, 0x2, 0x66f5}], {0x95}}, &(0x7f0000001000-0x4)='GPL\x00', 0x7, 0xb2, &(0x7f0000000000)=""/178, 0x41000, 0x1, [], r0}, 0x48) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001000-0xd)='/selinux/mls\x00', 0x0, 0x0) ioctl$TUNDETACHFILTER(r1, 0x400854d6, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000001000-0x28)={@syzn={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000002000-0x14)=@ethtool_modinfo={0x42, 0x4, 0x0, "4bf731b453b79606"}}) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$packet_int(r1, 0x107, 0x1f, &(0x7f0000002000), &(0x7f0000003000-0x4)=0x4) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000001000-0x4), &(0x7f0000001000)=0x4) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000001000)={@generic="fda44863a0095876942d51a06de0c3cf", @ifru_addrs={0x2, 0x1, @local={0xac, 0x14, 0x0, 0xaa}}}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000001000-0x8)={0x0}) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r1, 0x4008af23, &(0x7f0000003000)={0x0, 0x7fff}) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000002000)={0x7, r2, 0x1}) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITKEY(r1, 0x80404521, &(0x7f0000005000-0x7f)=""/127) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sendmsg(r2, &(0x7f0000006000-0x1c)={0x0, 0x0, &(0x7f0000005000)=[{&(0x7f0000005000-0xa5)="eb054964d0d59e7c6de053369f81cdc6372f0ea09fbb945964dd9655912c6b519626f275efd6f674fef589a0ca4061c01d0b5e0d408b74937592836f36eb7326640e9fbc40ce36c9fffdb6df952e5291fcc0555e5d545b93d3a081ef77186ef0976bd9c6e49739681768281837c88de7937052c3946c5228c925019dfd8b5ee20834777e7e71fd90f7c1355ebcc12d966e9d2b472de8931e3c0ea77402e40bdf1b80065987", 0xa5}, {&(0x7f0000001000)="2e479b45edbc5e8c1b9bd33724192552a09e43ad5c1a2af7ecbb3d1769595430c50fccdeca2e60024a5566", 0x2b}, {&(0x7f0000006000-0x1d)="51fdb99c24014b3c682c8f531a7313c3c61f51a81e0f25d11431b56493", 0x1d}, {&(0x7f0000004000-0xc6)="cc4ba257d37073a5ac6b2c95a2627752f6967b39f3c15160edddbf6de1925211bede2fab384053e93cfb1720913e3a36ea05f9b5cbb7d7ea35769be9c1fad0335e71e3d4a296810c50aabc84245bfb3416bc7d04c8666a9dfdd4642b1837983e740b686fe50a5e6c6bc35a659d52eda1fc05d6c1ac50953459a67887ae53b0e2d11b52f9b4cc590efd941fa83ade00b0044aac5a3384bbf63cee3db0e16ce4f94eb10f6431f073a94884a9a7e0599fa5b738c276221f6a3f8243946f0576fc30e70d2772b045", 0xc6}, {&(0x7f0000006000-0xf0)="7f1de6dbd364304b29f4c2d48b26cecc667cdc6aa8cddf9755e03818fa0de88ae29214b49719bdc8b18c68ac0489d0af5011670e82f1b27685b9ff66d22345572d2fa30e82b14cfa477a0a013bdbb5c10ca5f601aefc4fec174446ad70066885c0c210a032a8d28429d9ec1972b2d464f95aada7bae2429450e1928a91afb9a7df3a4f5a18aff1e7491b75c7548d10b08ac33e13c6bca7824d2d36403c7942457f4ed7190c3a42977d85a91900c52837fbf2e3190c4e9bfcb3213f6c2bcea56d114f1ef04491395d57c20de5839109b22caa15ec232baebaf9efc4892c06ee3b66c102134bdfadd0ba8f4ec705db5749", 0xf0}, {&(0x7f0000006000-0x14)="a7cf2e4fe9030279ea5bfc981eadc4becea198c5", 0x14}, {&(0x7f0000006000-0x92)="7e0cf11d1a7139b56d65c3a87334d21b1e9002c5399e973e3b7cc39d0d20ab1949f6315795f9c077353ecf0a14cbb8307e66db7e58035370ad1002a154d39ef73d6ba9cdcee6bcdecb76f234364819a5350af1d2b5c3e0792bb0ee6199ad33d00ebea312c0c93c56aa1ec091057b6c8d25e728bf79ff50d8f16766651348ef250cae1d92001ba5bb06c458bdc021328022b3", 0x92}, {&(0x7f0000006000-0xa9)="41f59b449e8d241efce723d7d15f95f83ce67bd8d16ee61418e5b9753528ce1f060466b48b0c75e2c7b86767e1837d612866dbf4d8ce5e903f162d0d28de2ba8a12f7721648dc25d91310672ff00761eb44e93da18fbb98b5f40f59c1671cebcea687c7fe51e5da9f172095048017ee010c755651f82d7ed083ab8eaf2cd1fbce60fa0e97e9eaf2310cbfffde6be874fa7a36c6d364655a555c12950d1fd4c3182ed585d3a4a960e4d", 0xa9}, {&(0x7f0000005000)="3f107be25d56ef37be8885e7bc8890a9a14bed2af56bb508c16ee7719b86cd3c5d90bf108090277994ba1b5af050b8c757e3fa1f5baa283e09053d3d75f990cefcf0024f772165cbe56b347c39dec1a083cdf1b64d3f62befcfce8412f590a03c431f92e0cdf8a4bfe2b8681a7e5e771913dcac00f54c4eae198e97ddf1323dce3b0619b544846159e249c6e97a1b73c9b2c520faff769a023eba0f0a0f14b3ca5e750247ca457a4c93b9fd6b05449", 0xaf}], 0x9, &(0x7f0000001000-0x1e0)=[{0xf4, 0x10d, 0x3, "80307d1d57e71c9ebf514a2c4f5f83586f3845101a6d1e1873040569f7ba6763ffdef14b6ba10990ae08cbb5114b32c0fff90a67fd775dfcbbfe4b31fd9eeaf9228911f300b13d41613dc381694a37a28a9b6d0eb114a8d1304920500691d9d9a301e356b852ee9ddeeadbdd8d777360c06bd49ccb3bd41e9d4825ae03128c48e5b187cf1938ef65bff4f73984a418f45293226d9e13511876386adca89f2607aca75d629968a98175aad7a131f233010ecde43d5da91c6e79377fce394425baa5b1aee8e7e881a05940576fbed1a59f8d222dbca2c901b95b8f04c3304b8b29a1d3e2563217676c"}, {0xec, 0x11b, 0x59, "ec681b327cc2c522c3ae81b3de114997dc239d876a4715656d0c71104e4f8421be9ba8aa343311e4b6c765dbec9a6d77f561f7e7d194447f25c890422b87927ae3c26d1e70655de617be31c07618beb6905176f87489ab72f23b006af145fb5c7d30225fbfe6b5f3739b7fa4097c7ed50779c7530736298bbf7ccca6c2bec965593c6c3c8d0deba88c745a1f48bb7b3f38a80a64f3ee7a6f2d635e4532e30abc71962aaf560244d90881efa492a39d50fc69414f35c0efc46527b6b04df34a8d8fd35e8a3719bf12cd79013e6c5da34edd3944e80df19b292a94dd82fd"}], 0x1e0, 0x4000000}, 0x40) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000006000)='/selinux/mls\x00', 0x0, 0x0) [ 30.199795] audit: type=1400 audit(1518378524.699:8): avc: denied { map } for pid=4139 comm="syz-fuzzer" path="/root/syzkaller-shm198534347" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2018/02/11 19:48:44 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000d0e000-0xb)='/dev/audio\x00', 0x10000, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000efe000)=""/53, &(0x7f0000001000-0x4)=0x35) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0106434, &(0x7f0000002000-0x10)={0xb2a7, 0x0, 0x1, 0x4bc}) ioctl$DRM_IOCTL_AGP_BIND(r0, 0x40086436, &(0x7f0000000000)={r1, 0xfffffffffffffffd}) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000002000)=@assoc_id=0x0, &(0x7f0000003000-0x4)=0x4) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000002000)={r2, @in={{0x2, 0x1, @loopback=0x7f000001}}, 0x7fff, 0x1, 0x6, 0x3, 0x40}, 0xa0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000003000)={{0x1ff, 0x5}, 0x1, 0xffffffffffff0000, 0x5a, {0x10001, 0x7}, 0x200, 0x100000001}) setsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000000)="b0516f376b5705072d8d24c0ab97eab1d3de5173895623794b95fd51cd20b8be11abcd8669da87f45a738e7784eaffe56beb85a1d9040f0fbd8acc5a3a67924f85f506c7ee04528e39566a08ebd944260b61", 0x52) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000002000)={0xff, 0x8, 0x3, 0x7, r2}, 0x10) ioctl$sock_netrom_TIOCOUTQ(r0, 0x5411, &(0x7f0000001000)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000003000-0x8c)={0x3, 0x10001, 0x8000, 'queue0\x00', 0x1}) timer_create(0x0, &(0x7f0000004000-0x58)={0x0, 0x10, 0x6, @tid=0xffffffffffffffff}, &(0x7f0000003000)=0x0) timer_gettime(r3, &(0x7f0000001000-0x10)) socket$inet6(0xa, 0x8000a, 0x77c8) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000005000-0x17)={r2, 0xf, "bef509cb8423a01dda30c740d2458f"}, &(0x7f0000005000-0x4)=0x17) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_netrom_SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000005000)) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000006000), &(0x7f0000004000), &(0x7f0000007000-0x4)) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000007000)={0x2, [0x0, 0x0]}, &(0x7f0000006000)=0xc) 2018/02/11 19:48:44 executing program 2: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001000-0xc)='/dev/autofs\x00', 0x0, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00009c4000)=0x8, 0x4) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000002000-0x4), 0x4) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000003000-0x8c)={0x0, @in6={{0xa, 0x3, 0x0, @remote={0xfe, 0x80, [], 0x0, 0xbb}, 0x6}}}, &(0x7f0000003000-0x4)=0x8c) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000002000)={r1, 0x9, 0x8000, 0x19f4d880}, 0x10) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000003000)={r1, 0x2}, 0x8) r2 = getpid() mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sched_setscheduler(r2, 0x3, &(0x7f0000004000)) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001000)={{{@in=@multicast2, @in=@local, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@ipv4={[], [], @rand_addr}}}, &(0x7f0000005000)=0xe8) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000005000-0x10)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x1f, &(0x7f0000003000)=0x3f, 0x4) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000005000)={{0x1, 0x2, 0x5, 0x800, "508d917e79449f44a7e14909318475bcbc4da7c25590956c644bb37715889ef4f15006db79a58aa3630f4099", 0x2}, 0x0, 0x0, 0xffffffff, r2, 0x9, 0x97, "581b364d135bf579ba0e3095cb8d434bcc91130f314957529fd1b9ae29c813f75579d7e11d23a0d57b0c77268ddab9b662ca932f0b412c7abe81eae03e5e4bf6", &(0x7f0000006000)='/dev/autofs\x00', 0xc, [], [0x4, 0xcf5, 0xfffffffffffffc00, 0x4]}) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000006000-0x2)=0x5, &(0x7f0000002000)=0x2) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x990fbe56649cf65f, &(0x7f0000007000)="5ecb249aa425fb3ac1cff8f5c9d5767167c93361bdc10cd9ff3f90a279c3704bb3c0165cb6b1ef3465", &(0x7f0000006000-0x4), &(0x7f0000000000), &(0x7f0000007000)="7c4155f9d79a2411c1fcd149843315cbaac71b8095fae4fa0d166ad08a19b5dab0a4d96e1b73a4fd3dcfafd39a07071d6909512aa2a45ba341d604478f6ac56d539c5f41f4029b3ce6341b094464fbf440f9994fa0ac055017bad0c64cd706a251662becd2d997b713ee8b5583b1889f2275000d31a65148f611c555ec7a4eb278194435") ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000003000-0x4)) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000003000)=[{&(0x7f0000008000)=""/240, 0xf0}, {&(0x7f0000001000-0x54)=""/84, 0x54}, {&(0x7f0000007000)=""/251, 0xfb}, {&(0x7f0000002000-0xfa)=""/250, 0xfa}, {&(0x7f0000008000)=""/53, 0x35}], 0x5) mmap(&(0x7f0000009000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000009000)='./file0\x00', 0x8100, 0x4) 2018/02/11 19:48:44 executing program 6: 2018/02/11 19:48:44 executing program 5: [ 30.230101] audit: type=1400 audit(1518378524.729:9): avc: denied { map } for pid=4183 comm="syz-executor7" path="/sys/kernel/debug/kcov" dev="debugfs" ino=9081 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 30.255435] audit: type=1400 audit(1518378524.730:10): avc: denied { sys_admin } for pid=4184 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 30.266245] IPVS: ftp: loaded support on port[0] = 21 [ 30.361087] audit: type=1400 audit(1518378524.859:11): avc: denied { net_admin } for pid=4186 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 30.387207] IPVS: ftp: loaded support on port[0] = 21 [ 30.423692] IPVS: ftp: loaded support on port[0] = 21 [ 30.467811] IPVS: ftp: loaded support on port[0] = 21 [ 30.524354] IPVS: ftp: loaded support on port[0] = 21 [ 30.609763] IPVS: ftp: loaded support on port[0] = 21 [ 30.697611] IPVS: ftp: loaded support on port[0] = 21 [ 30.801250] IPVS: ftp: loaded support on port[0] = 21 [ 31.554986] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 31.737563] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 31.812885] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 31.953452] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 32.007525] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 32.051888] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 32.241120] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 32.258729] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.059715] audit: type=1400 audit(1518378528.559:12): avc: denied { sys_chroot } for pid=4186 comm="syz-executor3" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/02/11 19:48:48 executing program 3: 2018/02/11 19:48:48 executing program 3: 2018/02/11 19:48:48 executing program 3: 2018/02/11 19:48:48 executing program 3: mmap(&(0x7f0000000000/0x33000)=nil, 0x33000, 0x3, 0x32, 0xffffffffffffffff, 0x0) set_mempolicy(0x4003, &(0x7f0000014000)=0x9, 0x3ff) timer_create(0x0, &(0x7f0000031000)={0x0, 0x0, 0x0, @thr={&(0x7f0000032000-0x11), &(0x7f0000031000)}}, &(0x7f000002a000-0x4)) 2018/02/11 19:48:48 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x48, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000639000)='./file0\x00', 0x0) mount(&(0x7f0000a3d000-0x8)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000019000-0x6)='ramfs\x00', 0x2000000, &(0x7f000000a000)) creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) uselib(&(0x7f0000485000-0xc)='./file0/bus\x00') [ 34.373577] audit: type=1400 audit(1518378528.873:13): avc: denied { dac_override } for pid=5171 comm="syz-executor3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/02/11 19:48:48 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x2, 0x78, 0x48, 0x80000002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000c36000-0x9)="284028657468302c10", 0x0) r1 = syz_open_procfs(0x0, &(0x7f000064e000-0xe)='net/mcfilter6\x00') sendfile(r0, r1, &(0x7f00006dc000-0x8), 0x401) 2018/02/11 19:48:48 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000fdf000)=@add_del={0x2, &(0x7f0000dea000-0x10)=@generic="2564494327845a4bc7ff03fd35bfe0b7"}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000d3c000-0xc)) [ 34.467506] IPVS: ftp: loaded support on port[0] = 21 2018/02/11 19:48:49 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fcc000-0x9)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000740000)={0x2, 0x63, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x2, 0x78, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000ae5000)=@ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x3}]}) 2018/02/11 19:48:49 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clock_gettime(0x800, &(0x7f0000f0a000)={0x0}) socket$nfc_llcp(0x27, 0x3, 0x1) mq_timedreceive(0xffffffffffffffff, &(0x7f00005e9000)=""/155, 0x9b, 0x0, &(0x7f0000c8a000-0x8)={r0}) 2018/02/11 19:48:49 executing program 2: mmap(&(0x7f0000000000/0xffe000)=nil, 0xffe000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000f7e000-0x10), 0x10) 2018/02/11 19:48:49 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000553000)='/dev/dsp#\x00', 0x5, 0x40842) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000acc000-0xc)={0x5, 0x4, [0x2]}) r1 = syz_open_dev$sndctrl(&(0x7f000035c000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0xc1105517, &(0x7f0000001000)=""/250) r2 = fcntl$getown(r1, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000d79000-0x10c)={{0x6, 0x7, 0x6, 0xed7a, "a05cd7a479fe3688bd04c3994d0841967d3510b24c377948f0d378d0b0bfe6c7cbda28cf67e1063b90e86458", 0x800}, 0x0, 0x0, 0x7, r2, 0x6, 0x8, "544ed76e663fb6c6efc98dd87c0611194e9aea425225f445fc5a254f537f2a676c30bf192dd6f077b1a2887b2a0fc75b5f7ecfc043c9961dd7ede9f5949525f5", &(0x7f00004ae000)='-\x00', 0x2, [], [0x100000000, 0x1, 0xfffffffffffffffa, 0x9a6c]}) ioctl$sock_netrom_TIOCINQ(r0, 0x541b, &(0x7f0000cd0000)) 2018/02/11 19:48:49 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x9) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000baa000-0x8)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00006d1000)={{{@in6=@empty, @in=@local, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@broadcast}}, &(0x7f00005b5000)=0xe8) r3 = syz_open_procfs(r1, &(0x7f0000d6f000-0x9)='net/tcp6\x00') accept4$ipx(r3, &(0x7f0000644000-0x10), &(0x7f000024f000)=0x10, 0x80000) ptrace$getregset(0x4204, r1, 0x0, &(0x7f0000d54000)={&(0x7f0000287000-0x1000)=""/4096, 0x1000}) lstat(&(0x7f0000c7b000-0x8)='./file0\x00', &(0x7f0000a87000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f000002f000-0xc)={r1, r2, r4}, 0xc) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000057000)={0x0, 0x11, "1ed5fb314445ae911dd769e78d42cf993f"}, &(0x7f0000b34000-0x4)=0x19) getsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000a8b000-0x8)={r6, 0x4817ad8f}, &(0x7f00001c1000-0x4)=0x8) prlimit64(0x0, 0x7, 0x0, &(0x7f000001e000)) bpf$MAP_CREATE(0x0, &(0x7f0000348000)={0x5, 0x8, 0x4, 0x9, 0x0, 0xffffffffffffffff}, 0x2c) 2018/02/11 19:48:49 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000fdf000-0x78)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000003000-0x38)={&(0x7f000000a000)=@rc={0x1f}, 0x9, &(0x7f0000009000)=[{&(0x7f0000004000-0x7c), 0xfe4c}], 0x1, &(0x7f0000009000)=[]}, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000fa1000)={@local={0xfe, 0x80, [], 0x0, 0xaa}, 0x3, 0x2, 0xff, 0x2, 0x8001, 0x7, 0x8}, &(0x7f000003c000-0x4)=0x20) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x3, 0x0, @ipv4={[], [0xff, 0xff], @empty}}, 0x1c) listen(r0, 0x43) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087e000-0x2)='F', 0x1, 0x0, &(0x7f0000060000-0x1c)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) r2 = accept4(r0, &(0x7f0000c72000-0x10)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f0000f5f000-0x4)=0x10, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000653000-0x8c)={0x0, @in={{0x2, 0x1, @rand_addr=0x1}}}, &(0x7f000027e000-0x4)=0x8c) setsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f00001f5000-0x8)={r3, 0xffff}, 0x8) 2018/02/11 19:48:49 executing program 5: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000667000-0x5)='ceph\x00', &(0x7f000009c000-0x5)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000000)="af3a5f3e3aa7d770b5353cff57d9624e2b79f6cee24b062e9a8c376d1e9e0c7496648771003b53cf2349d5397256b1f9dc66be6c12643bb423887a0dd57785e46d7e83a3fb2a238b89fa99851b72f8bd8119f70d91b76bb0c8ba96afbd918e9c9e72c0650381416e54844e771b2fd842cec995283c01364b0920a0614e9e323ebcfbb31923657b5ff9e4be41307eb9d955eee12010fab4af6acf1d554122271ca61b2f9417f849c6a657d86dd6de59e6a3a4866a655e07d7b1ad345286d3d24c7eb2d11e685a827169b11dd48bf7fcc762675bb88ebb7f00f00e58224bb00313c5d22d35409eaebb490e394e34ded70d4a38", 0xf2, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000001000-0x10)='/selinux/access\x00', 0x2, 0x0) ftruncate(r1, 0x6a4) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000002000-0x5)='ceph\x00', 0x1) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000002000-0xc0)=""/192) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x2000000, 0x80010, r2, 0x0) keyctl$link(0x8, r0, r3) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000ed8000-0xb)='pkcs7_test\x00', &(0x7f0000fb4000)={0x73, 0x79, 0x7a}, &(0x7f00009fe000-0x60)="30f5", 0x2, 0xfffffffffffffffc) r4 = openat(0xffffffffffffffff, &(0x7f0000dbf000)='./file0\x00', 0x200000, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00004f9000), &(0x7f00001ef000)=0x14) 2018/02/11 19:48:49 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000000), 0x0) 2018/02/11 19:48:49 executing program 6: mmap(&(0x7f0000000000/0xe000)=nil, 0xe000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000e000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) accept4$ipx(0xffffffffffffffff, &(0x7f000000e000), &(0x7f000000c000-0x4)=0x10, 0x0) mmap(&(0x7f000000e000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f000000e000)='/dev/audio#\x00', 0x3, 0x2002) r1 = fcntl$getown(r0, 0x9) capget(&(0x7f0000006000)={0x399f1336, r1}, &(0x7f0000004000)={0x2, 0x7f, 0xfff, 0x9}) syz_emit_ethernet(0x4e, &(0x7f000000c000)={@random="2114defa76f6", @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x3, 0x102b, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}}}}, 0x0) 2018/02/11 19:48:49 executing program 2: mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000001000-0x1e)={0x18, 0x0, {0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff, 0xbb}, @syzn={0x73, 0x79, 0x7a, 0x0}}}, 0x1e) r1 = dup(r0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000008000-0x18)={0x5, 0x1, 0x7}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002000)='/dev/hwrng\x00', 0x8000, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) readahead(r2, 0x1, 0x0) ioctl$DRM_IOCTL_VERSION(r2, 0xc0246400, &(0x7f0000007000)={0x9, 0x6, 0x400, 0xf8, &(0x7f0000000000)=""/248, 0xc5, &(0x7f0000007000-0xc5)=""/197, 0xfc, &(0x7f0000008000-0xfc)=""/252}) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000004000)={0x18, 0x0, {0x4, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff, 0xbb}, @syzn={0x73, 0x79, 0x7a, 0x0}}}) r3 = syz_open_dev$mouse(&(0x7f0000005000)='/dev/input/mouse#\x00', 0x7fff, 0xe00) setsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f0000002000)=0x1000, 0x4) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) [ 34.770988] audit: type=1400 audit(1518378529.270:14): avc: denied { map } for pid=5264 comm="syz-executor5" path=2F6D656D66643A63657068202864656C6574656429 dev="tmpfs" ino=13993 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 34.836279] audit: type=1400 audit(1518378529.335:15): avc: denied { map_create } for pid=5257 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 34.858942] audit: type=1400 audit(1518378529.335:16): avc: denied { map_read map_write } for pid=5257 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 2018/02/11 19:48:49 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x100000000000001, 0x2d, &(0x7f00001a4000)=@security={'-ecurity\x00', 0xe, 0x4, 0x254, 0xffffffff, 0x12c, 0x94, 0x12c, 0xffffffff, 0xffffffff, 0x1c0, 0x1c0, 0x1c0, 0xffffffff, 0x4, &(0x7f0000023000), {[{{@uncond, 0x0, 0x70, 0x94, 0x0, {}, []}, @common=@unspec=@STANDARD={0x24, '\x00', 0x0, 0x12c}}, {{@ip={@loopback=0x7f000001, @rand_addr, 0x0, 0x0, @syzn={0x73, 0x79, 0x7a}, @syzn={0x73, 0x79, 0x7a, 0x0}, {0xfffffffffffffffd}, {0xff}}, 0x0, 0x70, 0x98, 0x0, {}, []}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x800, 0x3}}}, {{@ip={@multicast2=0xe0000002, @multicast1=0xe0000001, 0x0, 0x0, @common='syzkaller0\x00', @common='syzkaller0\x00'}, 0x0, 0x70, 0x94, 0x0, {}, []}, @common=@unspec=@NFQUEUE0={0xfffffffffffffc4f, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24, '\x00', 0x0, 0x70}}}}, 0x2b0) 2018/02/11 19:48:49 executing program 4: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0x23000)=nil, 0x23000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000023000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_BASE(0xffffffffffffffff, 0x4008af12, &(0x7f000001c000)={0x3, 0xca1}) syz_open_dev$vcsa(&(0x7f0000024000-0xb)='/dev/vcsa#\x00', 0xffffffffffffffff, 0x141202) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000024000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r0, &(0x7f0000515000-0xc)={0x10, 0x0, 0xffffffffffffffff, 0x2ffffffff}, 0xc) socket$unix(0x1, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000a0e000-0xb)='/dev/vcsa#\x00', 0x0, 0x400080) listen(0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000bc8000-0x9)='net/unix\x00') socket$netlink(0x10, 0x3, 0x0) 2018/02/11 19:48:49 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) unshare(0x8000000) openat$rtc(0xffffffffffffff9c, &(0x7f00003ab000-0x9)='/dev/rtc\x00', 0x0, 0x0) r0 = mq_open(&(0x7f0000000000)='^procwlan1\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000665000-0x40)={0x0, 0x3, 0x2}) r1 = getpid() getpgid(r1) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000c3d000)='/dev/cuse\x00', 0x2, 0x0) ioctl$sock_inet_udp_SIOCINQ(r2, 0x541b, &(0x7f0000833000)) lseek(r0, 0xfffffffffffffffe, 0x0) 2018/02/11 19:48:49 executing program 6: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 2018/02/11 19:48:49 executing program 3: socket$netlink(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000220000-0x4)=0x1, 0x4) 2018/02/11 19:48:49 executing program 2: socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f00008a8000-0x8)={0x0}) fadvise64(r0, 0x0, 0x7, 0x1) 2018/02/11 19:48:49 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000ae6000-0x1e)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000683000-0x4), &(0x7f0000841000-0x4)=0x4) mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000027000-0x8)='./file0\x00', &(0x7f00002f3000-0x6)='tmpfs\x00', 0x0, &(0x7f000055d000)="15") 2018/02/11 19:48:49 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000f70000-0x8)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00001c6000-0x9)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000431000-0x18)={0x38, 0x0, [{0x40c, 0x0, 0xffffffff}]}) 2018/02/11 19:48:49 executing program 2: mmap(&(0x7f0000000000/0xfd9000)=nil, 0xfd9000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000fd9000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fda000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fda000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000fda000)='/dev/autofs\x00', 0x880, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x9, 0x3, 0x218, 0x0, 0xffffffff, 0xffffffff, 0x94, 0xffffffff, 0x184, 0xffffffff, 0xffffffff, 0x184, 0xffffffff, 0x3, &(0x7f000047b000), {[{{@uncond, 0x0, 0x70, 0x94, 0x0, {}, []}, @common=@inet=@TCPMSS={0x24, 'TCPMSS\x00'}}, {{@ip={@rand_addr=0x6, @multicast2=0xe0000002, 0x0, 0x0, @syzn={0x73, 0x79, 0x7a}, @syzn={0x73, 0x79, 0x7a}}, 0x0, 0xb0, 0xf0, 0x0, {}, [@common=@set={0x40, 'set\x00'}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}], {{[], 0x0, 0x70, 0x94}, {0x24, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x274) [ 34.959490] audit: type=1400 audit(1518378529.459:17): avc: denied { create } for pid=5298 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 2018/02/11 19:48:49 executing program 7: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x80000d1, &(0x7f0000001000-0x4)=0xfffffffffffff800, 0x4) 2018/02/11 19:48:49 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000515000)={0x0}, &(0x7f0000a4d000-0x2)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000bef000)={0x0, 0x0}) r3 = getpgrp(0x0) kcmp(r2, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000715000-0x8)) [ 35.000502] tmpfs: No value for mount option '' 2018/02/11 19:48:49 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000b52000)='/dev/dmmidi#\x00', 0x1, 0x8000) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000ad6000-0x10)={0x7, 0x7, 0x9, 0x102}) ioctl$TCSBRK(r0, 0x5409, 0x7) r1 = syz_open_procfs(0x0, &(0x7f0000a78000)='net/igmp6\x00') readv(r1, &(0x7f0000a10000-0x90)=[{&(0x7f0000cc4000)=""/194, 0x2cf}], 0x1) 2018/02/11 19:48:49 executing program 7: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000295000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f0000001000-0x18)={0x3, 0x10001, 0x9}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f000008d000)='/dev/input/event#\x00', 0x2, 0x100fff) write$evdev(r1, &(0x7f0000a12000)=[{{0x77359400}, 0x4, 0x3a}], 0x18) 2018/02/11 19:48:49 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000a9e000-0xd)='/dev/net/tun\x00', 0x0, 0x6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000d89000)={@common='eql\x00', @ifru_names=@generic="c15c5d8b74308b1b2c9a0ce63d9d8226"}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00002eb000+0xe70)='/selinux/policy\x00', 0x0, 0x0) connect$rds(r2, &(0x7f0000818000)={0x2, 0x1, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000630000-0x20)={@common='eql\x00', @ifru_flags=0x301}) write$tun(r1, &(0x7f0000fbe000-0xfd2)=@hdr={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={{0x5, 0x4, 0x0, 0x0, 0xfc0, 0xffffffffffffffff, 0x0, 0x0, 0x32, 0x0, @empty, @broadcast=0xffffffff, {[]}}, @tcp={{0xffffffffffffffff, 0xffffffffffffffff, 0x42424242, 0x42424242, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa}]}}, {"8571dc48841a02d1d9d335faa1649dfbfdc89324cc1090ea0b77d8158b50074e261b0be93331d2a74b50c3734fc61b8a0eae79785170ced916a6cd18f61e365d4201932b195527653f8510bd7dd69eb2b4b9798f28f9b026c6bb84f1b3359ed9f3fd128217a6b2d31e9b2c058d597bad0861e6f586f051da944a19ae10450f9d9445152283621ebbe8d1da1129bac565b62e7a5bc65615dd7830ca84a5251a77e977e3f5279e0ca91a5d2c1b20b6efc94941cd8eed2b5365a160f93c6827c30fb7354d85c5b077f6af5dc0a68e84534c7d041c5894e557f9227e65b43d9207c6b287911e6faadfdde7071ffb7fb399f99c4482d5fcdca36839824acfc97ba366d548a841616b68fe78b20c0367faa82af1e230b7db9664bebd82ecc9162d121a052be5b95e4101d89562b2926d2db811cf03f27998f52ad9e8452bea0021cf976c09c2166e7949cd863e875aed198657eae956270f3a084545157c1a8e9fc3f7929e798c97ebac7a83420f4e1e254428152bd696c82959ae6d15d0a2a891c6c9c33ebe42084856276d59a0f95671b99e0ef3b6b3e6744f5ff3613153bc46fbc49c2868fb17b6da0913c8fb20e6eebedac5f154c56bda3a72f847969f01fee263c0ad201de4d3eb87aeb63ab870d9fa1e7f7ba529dfb6221545e4cedae7414d71a021dd9327180cb0ab13bbcf2690cb34e304d0e2cd2686cd003399e2cf2556fde2c69e39c05cb7666efede46326e7ae40819e7119c2cc94c37753bd1971ddc10c683298aacb75c550a2928e35503d437c237c593e06a515727afd71a46b94b2ab0a5d4d70cb16e63320aa714ca00e41d834a07ddefa0bfed71a3af9b34739a0cc8c732da41110ce2187a101d7f2c9ac1bf26c3469c27d5b8f15c579b9e25746b4420140ac89bd1a5fe30892069c31bd5773cb70fb3d7226dcd3b7296188ccffc9fa11fd0080dda8fe4041eae295af9af7d16b790f5c7dda1c597b9af5684c7b2d7d8746c6c1dae590e254d24f97cacebc5a7a3a60d36ae7fd2c7644afd7f778f64959d298bfd720ae620f5f894ada603a01b7da4e93cf685e1759860f44108b5acc7f9f881dad0a02b2c4fb998bfeea03faf548b6513c258c6673b476ef67e3219559eacc2132278a9f81cc956eb695a15e3dcbd6f03b07ed36fdd66755cca86bf5455343dbf47395e47aa57cddfb2e76f337bd1b4b019a8e67dda70906d66b9662b8c6948589e379f7da71795dc9d8beff97f0d71a6cfca640444274b9247a0eca4df21889e006b1aa4efc5c95737436e369aacfff374b9ea291b8a42395a88de39522589fda4a9ac55965fb09fe4bae6f5c82e0b11531fa5601fad4eed518b4ef7a24f7ba14261e4d4e6d7d49aacdcddad6f3c95c5cc1b6fdec8f5b5c0466f2984eaabef645d1cd872c1bbbcb71d85831b48849ddb5d656c1773b13f9071432c0817945bc446094ddc967e4fb31ccea6008d65d2bc4dc9e8c2cc50b77b22af4d60cd395e509b700f0120ab216914feadbf7e7d63e528685d78d2040ba35c0a7bf37603d67cb45b928e3f04f74190ad8a9037235bc48d486cf829797d24dd94ae0d6c3b2d6b1687a6c5c30ddf0a526ed24d3d289512a4d6addb4f3e3472ed640f18832bc4cdfbdaf38ce7992a20c909d7b238bf8bd9f5281af2bf357e1481e7e9430ea75e6e56a6c4923ee58a2656ded3e61742c648ea154d5bf0cad24aabac8218d00a3f18f36b9ab67e9edae8ae11b1113d3f77515934be3c6f85fd4806f0fdf2b738d7666aca4bf8ff31b9d195bdabe0949d8212d22b574a09da488cb3bd27a2eb5192786b416a8ac69d0c383fef59e3990c5c39660ba1078bec031666f3a61b6cf98381165bee35e6c5cd6366e856f006db700dcf6d38744c1e2b98f879934be80a7bd6f00f88527067b1b1a6fc26f9986040cc0195d12aef3446fff63c758488b9fe2b65b874bcb1c2396cc41d440299d24ff0c4dcefe10c31035e3d6cc470faff3bb88b4ecfc9a5a6299ecc0247ecd6f32e754cce49d1f35df5f5a6895e2de6757fd312546fc5498d1531fbf11a6414c25777163d239e03ce52f0dfbd095f4f609a657f8a93f47286a770d69aa5012542b00ee25870deddca3121899bb59132c5dd77bd73d9ad0138dc348c7427989eb72b4c2055f46783416a145a74f7fe061d9b27bb7e80edaaba792c479ab3f0d0f762e59710a28a37148a5ec48de6fc3315ae9f9a4ae087df6087b0f343a1165802be4f9c853ab62a9c8513d28f6d409cf640cd29a8e0fa2f08d6481e7b94dbcf85e6d83c5c26fc04aff723f5d2053d8ef32486d54e7167a93ee862cd9d3d02ea5b754bf44d7b400c683d5b1b117d123cf822ea60d4de108c2e9a185dea2b43ed5ee56420e8c6a2cdb04986a948f6bdefac70e3d1de5d89d6ea9e86a331199551423a0c1b7f4c993fc6b1f2c6a9ff879f422e6dffbc02e7abe3d9a45fb20b4687e5733f3c2c66e233a7f895d4e6b2292cea10abe8d6e5577708eafb2b604ded50be9fd29fd76698e27f4d5e1c75b7363ffd2582f2e4e7324c0d67c1f22d5a0f41cc66863c08da70b87c0424d9c9b284fa0f0f565132c6212811fd396f769f233baa6708d458864f0cdca98da0f135594e2f69291ae87e39e8e46e1bd17e7001de1f0813f881f3ead478958a06451d802d62fe511aa6e6ed9910e837124eb69e49eb2d8b917756fd54ac554e5674b8aafc6ddc8ca7e3826106d9cca344720284eeac05f25799482a2eb7c79391f036134d6934d573a93b37097f62f083cf418e1e30787178a2094dbe1cea94c218b6a24f4f6d9fc5903cfd5b7832750f0bac9859ef32f34aef9d0f19ae42161023220546c39dfe8d0bf60b895c46c4981cd2881d5b605c7a32a7d8b56dfd9184898e3463cf91b2270f9daf25f7b0494f36dacbf997743cbf1682eb009ffe477ffb8caa6fdb32e511cffc4df65feddbbf7fcad8c6ab1ef1aec110a3ec5a3287d42507d1e91822247cad068788e9113602c889d4117a7c897e0e4f017a53f8c88fc87c761f7a46c491796e9da44da5dc24b936ed778f479661bd301d01246facc4f84beab3f88ac7d571fe355edc5c4891f88a10adbbbd7812e19aadfe8ced9e33b2b39e7a2e7a2f9a389378330500e50e26cc0599334270319aa53fe701a257c3880ccf8142b64ec0ea0ab28ba67fb831001ba0fdc49a62ec40d0486698d44e878d1de9907cd993c729ff2a3db3c79f013c6710642b28bee754adc4bbd2e3ef0d8edac2358d3e323bd8bc7dc353f3a0c39d1fdf769edcad3274a8dc76d7ea76f34ebd790e270574f8c2fe2dcfda435df98a421490e21a6e1277b22ff4eef4c2c172a9f6c2d65707c8931988abd7555de72212589088ebc2fce246e906d6472dacb9ffc9d137fc6e6d66419b0fe215ebf5ead7be43850082cc6be9261aa9727ea5d63d30fd87e698c828df592fff5dde22641c86951a005f205bc10b12086afd39c751d94016e4d761911b83916da7be1ca4b492bd834173b08d2268f0c88f062b2ba6f96897855c1717873f50d038b5a67a2656baafcd48c516e85e5ee1f4d52de9aa170eda5142466fa2d722323c19c189110c95966e312c0f532ee204465890374fb57999009c67228bb7431ec366be4e1cf8f2adffb6d545257a9aaee8b5b8793f6e2ee43da13d6e720355a94cfa819fe61769411b506496d117dc11f054811c9088d82de1a77909823b8c3ab38dde94fbc7512333d13a6f6ccef5a868d9e776567628213b13d199926ce1b71f96648685f8614673bc85f051423a0d2995e682944799756b1152c9b8e086078432fe6fae04db1b799559d9cbcbb3618631032a36069eb73f7c0c27e34af5233e6cc6c39b6253bc9f62e6b09295d78a353787991ad30c0347d3ec1f2bc6b695a5b3c061191e89af2de61a47358963bf7cfdadf164da4f4576a3bac44b463abb2a86cdb7fa57d2cc536323e01ca06410d170cb75278c3b0fc50869c0878733e3ea557e5d3de8e9bb0932360d6273b9e67587eecb1e9e3ba9fcbfa0dff7b1211a661ab6d41a3d33c9462ae10eb6d89c29f8d3879f88779343d4e27963c00ecaa3b0f190e82cf5b300ebc8fc27cd3e0e7029c11bb85730548f556faaf6ed2f22e8492b770655cd1404cf6d877a760843cb2e12e42100932066ba6c7e841d201c7e6b221f2996242ab4e47e8804f9adcf7bc946a4a76671db32234128736177a208bf6e531682c68f8a7a3b5f5310ea213c51ea25c58c6d9a4f2b0dc8284ba278ec752b215f575e590d85143fd545456f29144b89fe9216a57048f50ef9a16489c09d9f61ca77f9f54fa497ff7cd05e4ea4b8644e1f903a6eb6a4b4f43f63ae0e0cceed147f07e40f7d8275968c287850c2e915812556a5806e18214abe4db243f19b1c011521d94d09f2c1d6893e569315ef930361eb2817840b8d9983e5d90bd842b95d98ab1e0d027401f2cd92a31311fc4129e09ea68eb49c53eb88de115cd2d6e81038b14ade54462ab4d07188dd0a9e01a5b67583b152a50cdbf97eccb290c6afb2cb3969d43bb71e024f9bfa320dd3ec3eb0b16e520b5c5d870b4086e88208a8daa06fb7940e045db1944157200be2a6e4aa8caae8ca9d4cd5f1c0f1a140d3b570aabdedb30d0cb1fd1a6a86afa1815caeb5a6f1d3c41ed8def8b5cc4cf45b13ba38026e321e05a2cfdac554c610f2a1ca97d016b134ccb1bee2c7c5818d107e27ea82e4f60e188a6487d43b38444355872f5214e757506e94c152de0ef576aa779a43e054ad5432687f47b172c0ef490d66f0711fc4acad8522cf7812bd9cbd4bfeb9bef56ae72f6db62449e9dc490e2e8424e62ed20bdec17954c686fd667b9e66c8876298e6d3614dfb97f8d259c5b32ed6ecf3da13e70aac8292a2442455d5bff3a84df87c871a91d21af6aa644d4f3b42cdaca91d3082c35e669de3ff63d56ba5656f3ed4588555494ff61243246131d1c447ea7eaf549ec46440693659ad3a77a1afb73725c64cf903bccf52b7d7703edd546e798a351b3a87051bc4a18545dad0a5b743a7ddd7a58548163a00bb21a9dda155602d153052685d857e46b74c5e60a12c702b05cecce801d3783644b4571c34211be1b3b0294d27ad7064b4df8dac216d6c8f44da06c207234000a80ab1e8509da3632c0ae4d1720f605114855fe5c0c35bab2a56801e1dcb21ebdddc382775991edc6ed1643256b8ca5d8d36693463b048a16beaf2a4897013e7a0f50b48f57bb93091af003f8993ee5adbd50824f6e69cea70480315a892d828b6c1e80b2d5985160aff6bddf33963c1e6fa594fcf21aa0ffe156671789a242844731233190b92bfe06466a621cdfa545c127baf188d153380c626a26fdf6bdb0f23be29f354c3121e4418ab93837f058310da12180b8d7bdad0156d94d808025137b42cdc0215cab31d5e8d0750be15a02ad83eeca6b311c2578872733f2c63f044f7462a3e78451cc5bf6e28d488e8e001a20b2940d219fb1d37d9eea9091e1a5bd1607140454a87faa753b66336fb38ab79e307563f723df15faae164b12ae9e59b111a8c751a8ef11b02ac2e4a49d55fc02e358e248363430c9d77990d518cdf4a518cb41fdd63bdc9009aff"}}}}, 0xfca) [ 35.048784] x_tables: ip_tables: TCPMSS target: only valid for protocol 6 2018/02/11 19:48:49 executing program 0: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x140, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000000), &(0x7f00009c8000-0x4)=0x4) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0xffffffffffffffb9, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x800000000000, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000a6b000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) syz_open_dev$sg(&(0x7f00001f7000-0x9)='/dev/sg#\x00', 0x1800000000, 0x4100) write(r1, &(0x7f0000f63000)="1f0000000104ff009143070007110000f305010008000300000004dcff9f00", 0x1f) 2018/02/11 19:48:49 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000001000-0xc)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x400) r1 = syz_open_dev$audion(&(0x7f0000667000)='/dev/audio#\x00', 0xff, 0x200000) setsockopt$inet_tcp_buf(r1, 0x6, 0xd, &(0x7f0000d8c000-0x97)="c20c8474c398b50d4155e95b559dcca3d40e4dfad6831faf73bbe239e4cd7bb28f51674e9c91344bbda690c87f8b386b2aca4fd654d7c807f7081f9fe52c129215a1363dd94f55c35d3ba99bfcfa297da4fc4246585513ecdfee96c2f15e87caf1917ac1c15c0b366fc2678adc8a48079dd33c89c1c38fe8ff5bcb47cff5019ad0e482d955fbbcff88a44067cc65e60819e37ee4fbc265", 0x97) mmap(&(0x7f0000447000/0x4000)=nil, 0x4000, 0x0, 0x13, r0, 0x0) readv(r0, &(0x7f0000a53000)=[{&(0x7f00000c5000)=""/4096, 0x64}], 0x1) 2018/02/11 19:48:49 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x31, &(0x7f0000001000-0x1)='#', 0x1) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000001000-0x28)='posix_acl_accessmime_type,GPLkeyring,:*\x00', 0x1) fcntl$dupfd(r1, 0x406, r0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f0000001000-0x14)="184bd8abc733ff5cfef70e51dee9a62c761d93bf", 0x14, 0x8000, &(0x7f0000198000)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}, 0x3}, 0x1c) 2018/02/11 19:48:49 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) finit_module(r0, &(0x7f0000a63000-0xe)='\\]ppp1em0ppp0\x00', 0x3) setsockopt(r0, 0x65, 0x5, &(0x7f0000cc2000-0x2e), 0x0) [ 35.127796] x_tables: ip_tables: TCPMSS target: only valid for protocol 6 [ 35.181670] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 35.207888] device eql entered promiscuous mode [ 35.219737] kauditd_printk_skb: 5 callbacks suppressed [ 35.219745] audit: type=1400 audit(1518378529.718:23): avc: denied { map } for pid=5351 comm="syz-executor3" path="/dev/ashmem" dev="devtmpfs" ino=129 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 35.245058] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/02/11 19:48:49 executing program 1: mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0, 0xa972, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a95000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000a93000/0x4000)=nil) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000001000-0x44)) 2018/02/11 19:48:49 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f00003fa000-0xb)='/dev/midi#\x00', 0x1ff, 0x10000) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000f1a000-0x8)=@req={0x50, &(0x7f00003c9000-0x50)={@common='gretap0\x00', @ifru_flags}}) write$selinux_create(r1, &(0x7f0000098000)=@access={'system_u:object_r:usbmon_device_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0x30, 0x33}, 0x3f) socket$bt_sco(0x1f, 0x5, 0x2) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, &(0x7f0000c97000-0x30)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00006fb000), 0x7) 2018/02/11 19:48:49 executing program 2: mmap(&(0x7f0000000000/0x29000)=nil, 0x29000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80001, 0x84) mmap(&(0x7f0000029000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000029000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000029000)={{{@in6=@dev, @in=@empty, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@mcast1}}, &(0x7f0000029000)=0xe8) mmap(&(0x7f0000029000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f000002a000-0xc)={@empty, @dev={0xac, 0x14, 0x0, 0x14}, r1}, 0xc) bind$inet(r0, &(0x7f0000023000-0x10)={0x2, 0x3, @empty}, 0x10) mmap(&(0x7f000002a000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f000002a000)="5f8ef75d42ef0d2e50", 0x9, 0x4000, 0x0, 0x0) socket$inet(0x2, 0x807, 0xc7ad) mmap(&(0x7f000002b000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f000002b000)='/selinux/status\x00', 0x0, 0x0) sendmsg(r0, &(0x7f000001b000-0x38)={&(0x7f0000006000)=@in={0x2, 0x3, @loopback=0x7f000001}, 0x10, &(0x7f0000008000-0x80)=[{&(0x7f000000b000-0x1000)='\f', 0x1}], 0x1}, 0x0) recvfrom$inet(r0, &(0x7f0000028000-0xb6)=""/182, 0xb6, 0x0, &(0x7f0000005000)={0x2, 0xffffffffffffffff, @multicast2=0xe0000002}, 0x10) 2018/02/11 19:48:49 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000834000-0x9)='/dev/sg#\x00', 0x7, 0x100) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f00005ac000)={&(0x7f00006c2000/0x2000)=nil, 0x2000}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000a44000)=[{&(0x7f0000939000-0x98)="0e", 0x1}], 0x1, 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) munlock(&(0x7f0000792000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/02/11 19:48:49 executing program 5: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000002000-0x8)={0x0, 0x0}) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000003000-0xb)={0x0, 0x2, 0x4, 0x2ffac04e}, &(0x7f0000001000)=0x10) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000002000)={r1, @in={{0x2, 0x2, @remote={0xac, 0x14, 0x0, 0xbb}}}, 0x1, 0x2, 0x6, 0x9, 0xd0}, &(0x7f0000002000-0x4)=0xa0) r2 = syz_open_dev$vcsa(&(0x7f0000001000-0xb)='/dev/vcsa#\x00', 0x6, 0x2) write$evdev(r2, &(0x7f00003f9000-0xa8)=[{{0x0, 0x2710}}], 0x18) 2018/02/11 19:48:49 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000dbf000)='/dev/kvm\x00', 0x400, 0x0) r1 = creat(&(0x7f0000d09000-0x8)='./file0\x00', 0xc13a5aab2cbfbd2) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000831000-0x2)=0xda80, &(0x7f0000781000-0x4)=0x2) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x75) socket$kcm(0x29, 0x5, 0x0) r2 = syz_open_dev$midi(&(0x7f0000841000-0xb)='/dev/midi#\x00', 0x7, 0x4000) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000944000)) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000fd9000-0x8)={0x3, &(0x7f0000372000-0xc)=[{0x2, 0xc7d8}, {0x2}, {0x61b, 0x2}]}) ioctl$KVM_CHECK_EXTENSION(r2, 0xae03, 0x1) 2018/02/11 19:48:49 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000fe8000-0x10)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000b02000-0x9)=""/9) connect$inet6(r0, &(0x7f0000a07000-0x1c)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x0, 0xbb}}}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x3d, &(0x7f0000d93000)=""/222, &(0x7f0000d0e000-0x4)=0xde) 2018/02/11 19:48:49 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x25, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffff9c, 0x84, 0x70, &(0x7f00005ec000)={0x0, @in6={{0xa, 0xffffffffffffffff, 0x0, @empty}}}, &(0x7f000011f000)=0x108) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00000e6000-0x8)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000316000-0xc)=@sack_info={r1}, &(0x7f00008da000)=0xc) syz_open_dev$admmidi(&(0x7f00008c5000)='/dev/admmidi#\x00', 0x7, 0x610080) sendto$inet(r0, &(0x7f0000a4b000)="c10137e30e527bb0a17b212f6272c20c8a1b0ba5f95184cd4a05e493a4566caeca8a37c31d95b3cef1c41f13ba97d4adcfc8e1181fe75c16bf562d20303fef0959aa4f20eb09816d2f5c7e21c624a7bad0ecdbdca7f65357918c4dec07be619df053ad8364a8332a880c2ddc075bda642a36f50d0eea6ce9654943132dd8925b97de545a92762d518261ed1c12b74d29cade2a904f15078f765c2cbf21a1c1991286fd6ae58d765d0905d9e869405650be33abe14e81288e4762872d60cb7b882b231114b8ad7214891f782158a9a01a76d2bab5cdaf6c2d", 0xd8, 0x4000, &(0x7f0000469000)={0x2, 0x0, @local={0xac, 0x14, 0x0, 0xaa}}, 0x10) [ 35.289142] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 35.313231] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. 2018/02/11 19:48:49 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000e000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f00007d4000)=0x6, &(0x7f0000a66000)=0x2) write$sndseq(r0, &(0x7f000082d000-0xc0)=[], 0x2082cf40) 2018/02/11 19:48:49 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00000b6000)={0xa, 0xffffffffffffffff, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000ed9000)={0x0, @in6={{0xa, 0x2, 0x9, @loopback={0x0, 0x1}, 0x7fffffff}}, [0x4, 0x2, 0x0, 0x200, 0x8e, 0xdcac, 0x3, 0x0, 0xff, 0x9, 0x5, 0x7, 0x7fff, 0x6]}, &(0x7f00002ce000)=0x108) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000b65000)={0x7f, 0x2, 0xca, 0x7fff, r1}, 0x10) 2018/02/11 19:48:49 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000ff7000)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f00004e3000-0xf)='/dev/snd/timer\x00', 0x0, 0x0) r1 = syz_open_dev$adsp(&(0x7f000043f000)='/dev/adsp#\x00', 0x7, 0x400) setsockopt$sock_timeval(r1, 0x1, 0x15, &(0x7f0000ec8000)={0x0, 0x7530}, 0x8) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x3fffffffff) 2018/02/11 19:48:49 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f00001ab000-0xd)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000b0c000-0x8c)={0x0, 0x0, 0x0, 'queue0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}) r1 = fcntl$getown(r0, 0x9) fcntl$setownex(r0, 0xf, &(0x7f00008d2000)={0x1, r1}) r2 = memfd_create(&(0x7f0000858000-0x1)='\t', 0x0) ioctl$TIOCSBRK(r2, 0x5427) r3 = syz_open_dev$sndseq(&(0x7f000011c000)='/dev/snd/seq\x00', 0x0, 0x8000000000102) dup2(r3, r2) write$sndseq(r2, &(0x7f0000d82000-0x30)=[{0x26, 0x0, 0x0, 0x3fd, @tick, {}, {}, @note}], 0x30) 2018/02/11 19:48:49 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x46, &(0x7f000003e000)={@local={[0xaa, 0xaa, 0xaa, 0xaa], 0x0, 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "a0035d", 0x10, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, {[], @dccp={{0xffffffffffffffff, 0xffffffffffffffff, 0x4, 0x1, 0x0, 0x0, 0xfffffff5, 0x0, 0x0, "f0810e", 0x0, "c6ff9f"}}}}}}}, &(0x7f0000008000)={0x0, 0x0, []}) socketpair$ax25(0x3, 0x0, 0xca, &(0x7f0000074000)={0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00002de000-0x4)) socket$rds(0x15, 0x5, 0x0) bind$rds(0xffffffffffffffff, &(0x7f0000acf000)={0x2, 0xffffffffffffffff, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) 2018/02/11 19:48:49 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000762000-0xc)='/dev/rfkill\x00', 0x400, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_DIRTY_LOG(r0, 0x4010ae42, &(0x7f0000002000-0xc)={0x127fd, 0x0, &(0x7f0000791000/0x3000)=nil}) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$nfc_llcp(r0, 0x118, 0x2, &(0x7f0000002000-0x28)=""/62, 0x3e) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001000-0xc)={0x0, 0xf4, &(0x7f0000002000)=[@in6={0xa, 0x1, 0x100000001, @local={0xfe, 0x80, [], 0x0, 0xaa}, 0x957}, @in={0x2, 0x3, @broadcast=0xffffffff}, @in={0x2, 0x2, @rand_addr=0xfffffffffffffffb}, @in={0x2, 0x0, @local={0xac, 0x14, 0x0, 0xaa}}, @in6={0xa, 0x0, 0xffffffff, @local={0xfe, 0x80, [], 0x0, 0xaa}, 0x6}, @in6={0xa, 0x0, 0x1, @local={0xfe, 0x80, [], 0x0, 0xaa}, 0x8}, @in6={0xa, 0x2, 0x9, @loopback={0x0, 0x1}, 0x3}, @in6={0xa, 0x3, 0x3, @remote={0xfe, 0x80, [], 0x0, 0xbb}}, @in6={0xa, 0x2, 0x105, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x0, 0xaa}}, 0x5743}, @in6={0xa, 0x3, 0x7, @remote={0xfe, 0x80, [], 0x0, 0xbb}, 0x1}]}, &(0x7f0000002000)=0xc) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000002000)=@assoc_id=r1, 0x4) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000000)) read$eventfd(r0, &(0x7f0000000000), 0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000000)={r1, 0xfffffffffffffff7}, 0x6) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pwritev(r0, &(0x7f0000002000)=[{&(0x7f0000003000-0x64)="c07b2200a203a977d8426157ff9ea309de6599e8283d96a7e996ca8edbc5944141d648cd537991357203b02e7b8977fc735062ee8f81ee7b92261c4fa9cdf0237f0d9c7f8322854921130608e40ca07dfaf6bb0bfb2da98e35e21b3d6f8a9afbf40f58f0", 0x64}, {&(0x7f0000004000-0xc0)="c844e7089da162fff9929ea85761e8af221be9063a61fede464ea58b386dec3063a640271dbb331128c5715169e647da61df43720b6d72a2472c41ac446d2db37c54f470103de89e3d7880c9065559ce1092fd1c815cdecfa8be62fa15d7bb853f3e48fae805652f502061f3893713998388b8754ef6c97f795ee4c942587f3adadc41d67cb7b5d0332ecd2ff6bfbaeca3e183381bff29cd195405bc0f458f4a58f529389abf9d0adabe5b1b18675c996f9aedff252d9b3cd52ac52872d502c6", 0xc0}, {&(0x7f0000004000-0x42)="8a38e92bdb74cd659dcb2bdf73cf6d52bb909cebc955a60b667d1c3d2783075ad853ec520a00111e957ffa7dedac75436f35a9f8337fbcddc5bdd8743876c12b391b", 0x42}, {&(0x7f0000002000)="cbdf1e9a4cd007ba17c0f085d832fd1a4ba35937146c684015f6d0f66dbb6566d833a20c53ffc5dd78b45032799224a97c71f93a83a05fd0bf8f30b1adf7a6a8cfc024bf8ecbbbc1fdea77290678961dfb08cf3cdd9ec54692b28fb5636734d1ed12689f0b66095ef0142c2045c64e0cfdb6184b72820ae54bf84abf8f7599f268fe78913f3dbe2dedce04a8a205d3dbb703", 0x92}], 0x4, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f000087d000)="260000001200470020000083140022e3041000ff01000000000000010009749d060010000500", 0x26) ioctl$sock_bt(r0, 0x5411, &(0x7f0000a3a000-0x4d)="f3d1d1a50d880d20ad15cc34a8514275de7542ca2eb87cbb78e2400c3ac9bbdeda42abf568dedb26d252168b92ff695199c0167d9b1f6fba5f2d6e04df769c6637e1caaa807f0c2742270cef8b") 2018/02/11 19:48:49 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f000074e000-0x5c)={{0xa, 0x3, 0x8, @mcast2={0xff, 0x2, [], 0x1}, 0xe81}, {0xa, 0x3, 0x0, @local={0xfe, 0x80, [], 0x0, 0xaa}, 0xbc000000000000}, 0x1, [0xffffffffffff8001, 0x0, 0x8, 0x100000001, 0xa3bc, 0xe24d, 0x6, 0x8]}, 0x5c) mmap(&(0x7f0000000000/0x950000)=nil, 0x950000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000ff000-0x2a)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @multicast1=0xe0000001, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, @multicast1=0xe0000001}}}}, 0x0) prctl$intptr(0x18, 0x7) 2018/02/11 19:48:49 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f00000ef000-0x9)='/dev/dsp\x00', 0x10000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000f8d000)='maps\x00') readv(r0, &(0x7f00009a6000-0x80)=[{&(0x7f0000215000-0x1000)=""/4096, 0x1000}], 0x1) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00007e7000-0xd)='/selinux/mls\x00', 0x0, 0x0) 2018/02/11 19:48:49 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00001ff000-0x1c)={0xa, 0x2, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00004cf000-0x7)='ns/ipc\x00') setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000e8e000-0x1)=0x401, 0x1) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000872000-0xc)={0x2, 0x6, 0x401, 0x9, 0x400, 0xfffffffffffffff8}) listen(r0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f000005e000)={0x0, 0x18, "6ef61ba6d7d1712b79462117b468df21e440ca23a3ef25e8"}, &(0x7f00008b3000)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00006c4000)={r2, 0x40, 0x30}, 0xc) syz_emit_ethernet(0x4a, &(0x7f00003c4000)={@local={[0xaa, 0xaa, 0xaa, 0xaa], 0x0, 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "01ff00", 0x14, 0x6, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, {[], @tcp={{0xffffffffffffffff, 0x2, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[]}}}}}}}}, 0x0) 2018/02/11 19:48:49 executing program 5: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) futimesat(0xffffffffffffffff, &(0x7f0000d26000-0x8)='./file0\x00', &(0x7f0000d1f000-0xc)) pkey_alloc(0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000086b000-0x8)='./file0\x00', 0x280002, 0x2) ioctl$VT_WAITACTIVE(r0, 0x5607) [ 35.502537] dccp_invalid_packet: P.Data Offset(4) too small [ 35.513372] audit: type=1400 audit(1518378530.012:24): avc: denied { setpcap } for pid=5399 comm="syz-executor4" capability=8 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 35.543488] netlink: 'syz-executor2': attribute type 16 has an invalid length. 2018/02/11 19:48:50 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, &(0x7f0000412000-0xa7)='{', 0xfffffdf9, 0x47ffd, &(0x7f0000e3f000-0x1c)={0xa, 0x2, 0x0, @loopback={0x0, 0x1}}, 0x1c) r1 = syz_open_dev$mouse(&(0x7f0000ee6000)='/dev/input/mouse#\x00', 0x5, 0x2000) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000a03000-0xc)={0x0, 0x80000, r1}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000ab8000)={r2, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f000021e000)) 2018/02/11 19:48:50 executing program 1: mmap(&(0x7f0000000000/0xaef000)=nil, 0xaef000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000ae5000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc008ae09, &(0x7f0000aef000-0xc)={0x1, [0x0]}) r1 = syz_open_dev$sndpcmp(&(0x7f00009ba000-0x12)='/dev/snd/pcmC#D#p\x00', 0x8, 0x12241) ioctl$TUNDETACHFILTER(r1, 0x400854d6, 0x0) mmap(&(0x7f0000aef000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000af0000-0x4)={0xc}, 0x4) 2018/02/11 19:48:50 executing program 0: mmap(&(0x7f0000000000/0x2a000)=nil, 0x2a000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000024000-0x1c)={0xa, 0xffffffffffffffff, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmsg(r0, &(0x7f0000013000-0x38)={&(0x7f0000015000)=@in={0x2, 0xffffffffffffffff, @multicast2=0xe0000002}, 0x10, &(0x7f0000002000-0x10)=[], 0x0, &(0x7f0000020000)=[]}, 0x0) mmap(&(0x7f000002a000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f000002a000)={@generic="1df59a71770c64033920668615a89a42", @ifru_addrs={0x2, 0x3, @loopback=0x7f000001}}) 2018/02/11 19:48:50 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000821000-0x28)={@syzn={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000593000)=@ethtool_wolinfo={0x6, 0x0, 0x0, "6d0000000380"}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00001a7000)='/dev/cuse\x00', 0x40202, 0x0) ioctl$KDGETMODE(r1, 0x4b3b, &(0x7f0000055000-0x4)) 2018/02/11 19:48:50 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000fa8000-0xb8)={0x0, 0xfffffffffffffc00, 0xffffffff, 0x5, 0x6, 0x80, 0x400, 0x8, {0x0, @in={{0x2, 0x1, @broadcast=0xffffffff}}, 0x0, 0x100, 0xffffffff, 0x3e, 0x3}}, &(0x7f000051b000-0x4)=0xb8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000765000)={0x0, 0xfff}, &(0x7f0000fb5000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000d28000-0xb8)={r1, 0x9, 0xffffffff80000001, 0x200, 0xfffffffffffffffc, 0x3, 0x7, 0x7f, {r2, @in={{0x2, 0x0, @empty}}, 0x6, 0x3, 0x3ff, 0xc93, 0xb4}}, &(0x7f0000d69000)=0xb8) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f000054a000)=0x7, 0x4) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000d11000)=0x3fb, 0x4) bind$inet6(r0, &(0x7f00001f3000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f00007a9000-0x1), 0x0, 0xfffffefffffffffe, &(0x7f0000f63000-0x1c)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) close(r0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000655000-0x1c)={0xa, 0x1, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x0, 0xaa}}}, 0x1c) connect$inet6(r3, &(0x7f0000c14000-0x1c)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [0xff, 0xff], @empty}}, 0x1c) 2018/02/11 19:48:50 executing program 3: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) fcntl$setownex(r1, 0xf, &(0x7f00006d2000-0x8)={0x2}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00001a5000-0x2c)=[@in={0x2, 0x0, @multicast2=0xe0000002}, @in6={0xa, 0x1, 0xb78a, @loopback={0x0, 0x1}, 0x7fffffff}], 0x2c) fcntl$getownex(r0, 0x10, &(0x7f0000f44000)) 2018/02/11 19:48:50 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000f81000-0x56)={@local={[0xaa, 0xaa, 0xaa, 0xaa], 0x0, 0xaa}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "dba39f", 0x18, 0x6, 0x0, @dev={0xfe, 0x80}, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}}}}}}, &(0x7f0000f80000)={0x0, 0x298, [0x0]}) getgroups(0x3, &(0x7f00005ec000-0xc)=[0x0, 0x0, 0xffffffffffffffff]) setgid(r0) r1 = syz_open_dev$adsp(&(0x7f00009a8000-0xb)='/dev/adsp#\x00', 0x9, 0x1000000101002) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000e9b000-0x10)={0x4, 0x4000}) lgetxattr(&(0x7f0000f08000)='./file0\x00', &(0x7f00002ba000)=@known='\x00\x00\x00\x00\x00\x00)\f.e\x00\x00=', &(0x7f00006f1000)=""/16, 0x10) [ 35.574638] dccp_invalid_packet: P.Data Offset(4) too small [ 35.609728] netlink: 'syz-executor2': attribute type 16 has an invalid length. 2018/02/11 19:48:50 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f000000d000-0x1c)={0xa, 0xffffffffffffffff, 0x807, @empty}, 0x1c) 2018/02/11 19:48:50 executing program 7: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000001000)='\x00', 0x1) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000000)={{0x1000, 0x2, 0x18, 0x0, 0x1, 0x2, 0x4, 0x7, 0xffffffffffffffff, 0xffffffffffff7fff, 0x0, 0x9}, {0x0, 0xf002, 0x9, 0x0, 0x2, 0xcc, 0xffffffff, 0x400, 0x29, 0x7e00000000, 0xd05, 0xc2f}, {0x0, 0x1, 0x0, 0x1ff, 0x0, 0x3, 0x3, 0x1, 0xfffffffffffffffe, 0x6, 0x3bb78000000000, 0x40}, {0x10000, 0x2, 0x1d, 0x9, 0xffffffffffff8001, 0x8, 0x0, 0x78ab, 0x17, 0x8, 0x7b4f, 0xfffffffffffffff7}, {0x4, 0x0, 0x9, 0x20, 0x8, 0x92, 0x81, 0x9047, 0x30, 0x1, 0x4, 0x1000}, {0x10000, 0xd000, 0xd, 0x0, 0x1, 0x2, 0x1, 0x7, 0x7c6, 0xfffffffffffffe01, 0x8}, {0x3000, 0x7000, 0xf, 0x1, 0x8, 0x7, 0x6, 0x5, 0x7, 0x2, 0xb5c, 0x9}, {0xf000, 0x4, 0x9, 0x2, 0x8, 0x5, 0xf8, 0x5, 0x400, 0x97c, 0xfff, 0x5}, {0x0, 0x1004}, {0x6000}, 0xc0000024, 0x0, 0x100000, 0x200, 0x8, 0x4000, 0x10004, [0x3, 0x80, 0x5, 0x6]}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000000)={r0, 0x28, &(0x7f0000001000-0x28)={0x0, 0x0}}, 0x10) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r1, 0x6}, 0xc) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000540000-0x8)=@assoc_value={0x0, 0x443}, &(0x7f0000852000-0x4)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000942000-0x8)={r2, 0x2}, &(0x7f0000035000-0x4)=0x8) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000211000-0xf)='/dev/sequencer\x00', 0x401, 0x0) fremovexattr(r3, &(0x7f0000ccc000)=@known='system.advise\x00') setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000790000-0x84)=[@in6={0xa, 0x3, 0x9, @dev={0xfe, 0x80, [], 0x0, 0x10}, 0x6}, @in={0x2, 0x1, @loopback=0x7f000001}, @in={0x2, 0x1, @rand_addr=0x80000000}, @in6={0xa, 0x2, 0xff, @empty}, @in={0x2, 0x1, @local={0xac, 0x14, 0x0, 0xaa}}, @in6={0xa, 0x1, 0xfffffffffffffff8, @loopback={0x0, 0x1}, 0x8001}], 0x84) 2018/02/11 19:48:50 executing program 3: mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000002000-0x12)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000007000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl(r0, 0x4146, &(0x7f0000007000)) mmap(&(0x7f0000008000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000009000-0x8)='./file0\x00', 0x101000, 0x1b0) mmap(&(0x7f0000009000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f000000a000-0x10)={0x2, 0x1, @broadcast=0xffffffff}, 0x10) 2018/02/11 19:48:50 executing program 4: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000+0x43d)='/dev/input/mouse#\x00', 0x87, 0x80000) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000001000-0x1c)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00001b9000-0x4)=0x1c) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000001000-0x98)={r1, @in={{0x2, 0x3, @dev={0xac, 0x14, 0x0, 0xe}}}, 0x80000001, 0x1}, &(0x7f0000000000)=0x98) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r2, &(0x7f0000f33000-0xc4)=[{&(0x7f0000988000-0x1c)=@in6={0xa, 0xffffffffffffffff, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f000098c000)=[], 0x0, &(0x7f000074d000-0x2c)=[@sndrcv={0x2c, 0x84, 0x1, {0x0, 0x0, 0x8001}}], 0x2c}], 0x1, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 35.676876] audit: type=1400 audit(1518378530.176:25): avc: denied { setgid } for pid=5438 comm="syz-executor6" capability=6 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/02/11 19:48:50 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000058000)={0x1, {{0xa, 0xffffffffffffffff, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000c6c000)={0x0, {{0xa, 0xffffffffffffffff, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0xffffffffffffffff, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0xffffffffffffffa8) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f000060a000)={0x1, {{0xa, 0xffffffffffffffff, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0xffffffffffffffff, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff, 0xaa}}}, {{0xa, 0xffffffffffffffff, 0x0, @empty}}]}, 0x190) accept4$inet6(r0, &(0x7f00008cf000)={0x0, 0xffffffffffffffff, 0x0, @mcast1}, &(0x7f000068f000-0x4)=0x1c, 0x800) 2018/02/11 19:48:50 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000dfe000-0xd)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = epoll_create(0x10003) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000f9e000-0xc)) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000ed6000-0x18)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000c88000-0x18)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000a5c000)={0xb0, 0x0, &(0x7f0000bc5000-0xb0)=[@enter_looper={0x630c}, @reply={0x40406301, {0x4, 0x0, 0x3, 0x0, 0x11, 0x0, 0x0, 0x20, 0x30, &(0x7f000036c000)=[@fda={0x66646185, 0x1, 0x1, 0x13}], &(0x7f0000345000-0x30)=[0x0, 0x38, 0x30, 0x0, 0x28, 0x30]}}, @request_death={0x400c630e}, @reply={0x40406301, {0x3, 0x0, 0x4, 0x0, 0x11, 0x0, 0x0, 0x18, 0x38, &(0x7f00005d1000-0x18)=[@flat={0x73682a85, 0xb, r2, 0x2}], &(0x7f00005d5000-0x38)=[0x20, 0x78, 0x0, 0x38, 0x0, 0x78, 0x40]}}, @free_buffer={0x40086303, r3}, @release={0x40046306, 0x1}], 0xc0, 0x0, &(0x7f0000e94000-0xc0)="9ee63c78591c4f992a9926386c0c10809fb5f1ac8ffa6eff712d745f3d7cb93253b3139dbaa0ee87908d1677c71209f03e0d0b938651a3bb87499695312ee2f4e90c24fa33e55a434ce2c3694afa4cc7520afa0aa363ab07ed83ece4e26399a36dc9b83b0bfbbec9120dadb4632d6f5fcd66a9ae63c165f4381d7e96515436a8b59d7c7eb6da559d7627fc4ea73430801fb34eb3920638ab393033cf79cde902841b90b1344632da0849663d265139ce18d290241b013d460bf6419384b012e6"}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r4 = dup3(r0, r1, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000b3000)={0x8000, {0x2, 0x1, @dev={0xac, 0x14, 0x0, 0x15}}, {0x2, 0x2, @dev={0xac, 0x14, 0x0, 0xd}}, {0x2, 0x1, @dev={0xac, 0x14, 0x0, 0x13}}, 0x1, 0x2, 0x6, 0x3, 0xfffffffffffffffb, &(0x7f0000cae000-0x10)=@syzn={0x73, 0x79, 0x7a, 0x0}, 0x80000001, 0xffffffff, 0x4}) 2018/02/11 19:48:50 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000a57000-0x2a)={@empty, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random="abb8e2fe73ba", @multicast1=0xe0000001, @random="4eaf90c0451e", @dev={0xac, 0x14, 0x0, 0xf}}}}}, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f000044c000-0x16)='/selinux/checkreqprot\x00', 0x40002, 0x0) writev(r0, &(0x7f0000ba6000)=[{&(0x7f0000f2c000)="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", 0xc3}], 0x1ffffffffffffe9b) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000634000)={0x0, 0x0}) ioctl$GIO_FONTX(r0, 0x4b6b, &(0x7f0000c63000)=""/131) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000722000)={r2, r1, 0x2000000000000}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000723000-0x10)={r2, r3, 0x200}) 2018/02/11 19:48:50 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000029000-0x4)=0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f000018a000-0x9)='/dev/ppp\x00', 0x30c40, 0x0) perf_event_open(&(0x7f0000b61000-0x78)={0x5, 0x78, 0x5, 0x800, 0xe9a, 0x5, 0x0, 0x3, 0x8, 0x6, 0x8, 0x3, 0x3f, 0x7, 0x1, 0x4, 0x10000, 0x52, 0x1, 0x8, 0xc472, 0x4, 0x2a46f372, 0x1, 0x2, 0xc1b, 0x0, 0x5a8, 0x4, 0x5, 0x200, 0x101, 0x1, 0x6000, 0x8, 0x3, 0x4, 0x3, 0x0, 0x800, 0x2, @perf_bp={&(0x7f0000930000), 0x4}, 0x40, 0x3f, 0x18, 0x7, 0xcba0, 0x80000001, 0xffffffffffffff1b}, r0, 0x8, r1, 0x9) syz_open_dev$sndctrl(&(0x7f0000d38000)='/dev/snd/controlC#\x00', 0x0, 0x200000000004603f) [ 35.783424] binder: 5460:5467 got reply transaction with no transaction stack [ 35.790838] binder: 5460:5467 transaction failed 29201/-71, size 32-48 line 2757 [ 35.824138] binder: 5460:5467 ioctl 890b 200b3000 returned -22 [ 35.844319] binder: 5460:5467 got reply transaction with no transaction stack [ 35.851672] binder: 5460:5467 transaction failed 29201/-71, size 32-48 line 2757 [ 35.863386] ================================================================== [ 35.870836] BUG: KASAN: use-after-free in do_raw_spin_lock+0x1e0/0x220 [ 35.877491] Read of size 4 at addr ffff8801c9c2fd24 by task syz-executor6/5473 [ 35.884828] [ 35.886447] CPU: 1 PID: 5473 Comm: syz-executor6 Not tainted 4.15.0+ #218 [ 35.893353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.902687] Call Trace: [ 35.905265] dump_stack+0x194/0x257 [ 35.908884] ? arch_local_irq_restore+0x53/0x53 [ 35.913543] ? show_regs_print_info+0x18/0x18 [ 35.918025] ? lock_acquire+0x1d5/0x580 [ 35.921996] ? do_raw_spin_lock+0x1e0/0x220 [ 35.926308] print_address_description+0x73/0x250 [ 35.931135] ? do_raw_spin_lock+0x1e0/0x220 [ 35.935444] kasan_report+0x23b/0x360 [ 35.939241] __asan_report_load4_noabort+0x14/0x20 [ 35.944153] do_raw_spin_lock+0x1e0/0x220 [ 35.948299] _raw_spin_lock_irqsave+0x9e/0xc0 [ 35.952780] ? remove_wait_queue+0x81/0x350 [ 35.957094] remove_wait_queue+0x81/0x350 [ 35.961226] ? find_held_lock+0x35/0x1d0 [ 35.965280] ? add_wait_queue+0x290/0x290 [ 35.969417] ? rcutorture_record_progress+0x10/0x10 [ 35.974436] ? check_noncircular+0x20/0x20 [ 35.978666] ep_unregister_pollwait.isra.7+0x18c/0x590 [ 35.983942] ? clear_tfile_check_list+0x370/0x370 [ 35.988794] ? locks_remove_file+0x3fa/0x5a0 [ 35.993205] ep_free+0x13f/0x320 [ 35.996557] ? ep_remove+0x800/0x800 [ 36.000256] ? fsnotify_first_mark+0x2b0/0x2b0 [ 36.004837] ? ep_free+0x320/0x320 [ 36.008364] ep_eventpoll_release+0x44/0x60 [ 36.012670] __fput+0x327/0x7e0 [ 36.015949] ? fput+0x140/0x140 [ 36.019222] ? _raw_spin_unlock_irq+0x27/0x70 [ 36.023713] ____fput+0x15/0x20 [ 36.026979] task_work_run+0x199/0x270 [ 36.030860] ? task_work_cancel+0x210/0x210 [ 36.035172] ? exit_to_usermode_loop+0x8c/0x2f0 [ 36.039841] exit_to_usermode_loop+0x275/0x2f0 [ 36.044417] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 36.049967] ? do_fast_syscall_32+0x156/0xfa1 [ 36.054480] do_fast_syscall_32+0xbe8/0xfa1 [ 36.058792] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 36.063798] ? do_int80_syscall_32+0x9d0/0x9d0 [ 36.068366] ? finish_task_switch+0x1e2/0x890 [ 36.072844] ? finish_task_switch+0x1b9/0x890 [ 36.077338] ? syscall_return_slowpath+0x2ac/0x550 [ 36.082257] ? prepare_exit_to_usermode+0x350/0x350 [ 36.087264] ? sysret32_from_system_call+0x5/0x3b [ 36.092102] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 36.096944] entry_SYSENTER_compat+0x54/0x63 [ 36.101335] RIP: 0023:0xf7f41c79 [ 36.104684] RSP: 002b:00000000f771c09c EFLAGS: 00000286 ORIG_RAX: 000000000000014a [ 36.112378] RAX: 0000000000000016 RBX: 0000000000000015 RCX: 0000000000000016 [ 36.119632] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 36.126884] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 36.134144] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 36.141402] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 36.148687] [ 36.150300] Allocated by task 5467: [ 36.153916] save_stack+0x43/0xd0 [ 36.157355] kasan_kmalloc+0xad/0xe0 [ 36.161054] kmem_cache_alloc_trace+0x136/0x740 [ 36.165711] binder_get_thread+0x1cf/0x870 [ 36.169927] binder_poll+0x8c/0x390 [ 36.173536] ep_item_poll.isra.10+0xf2/0x320 [ 36.177928] ep_insert+0x6a2/0x1ac0 [ 36.181538] SyS_epoll_ctl+0x12bf/0x1a80 [ 36.185585] do_fast_syscall_32+0x3ee/0xfa1 [ 36.189893] entry_SYSENTER_compat+0x54/0x63 [ 36.194278] [ 36.195891] Freed by task 5467: [ 36.199155] save_stack+0x43/0xd0 [ 36.202590] __kasan_slab_free+0x11a/0x170 [ 36.206809] kasan_slab_free+0xe/0x10 [ 36.210601] kfree+0xd9/0x260 [ 36.213694] binder_thread_dec_tmpref+0x27f/0x310 [ 36.218519] binder_thread_release+0x4a1/0x6b0 [ 36.223082] binder_ioctl+0xc02/0x1417 [ 36.226957] compat_SyS_ioctl+0x151/0x2a30 [ 36.231176] do_fast_syscall_32+0x3ee/0xfa1 [ 36.235484] entry_SYSENTER_compat+0x54/0x63 [ 36.239871] [ 36.241487] The buggy address belongs to the object at ffff8801c9c2fc80 [ 36.241487] which belongs to the cache kmalloc-512 of size 512 [ 36.254128] The buggy address is located 164 bytes inside of [ 36.254128] 512-byte region [ffff8801c9c2fc80, ffff8801c9c2fe80) [ 36.265986] The buggy address belongs to the page: [ 36.270902] page:ffffea0007270bc0 count:1 mapcount:0 mapping:ffff8801c9c2f000 index:0x0 [ 36.279028] flags: 0x2fffc0000000100(slab) [ 36.283250] raw: 02fffc0000000100 ffff8801c9c2f000 0000000000000000 0000000100000006 [ 36.291114] raw: ffffea0006c71d60 ffffea0006c72160 ffff8801db000940 0000000000000000 [ 36.298978] page dumped because: kasan: bad access detected [ 36.304666] [ 36.306277] Memory state around the buggy address: [ 36.311190] ffff8801c9c2fc00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.318532] ffff8801c9c2fc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.325874] >ffff8801c9c2fd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.333212] ^ [ 36.337603] ffff8801c9c2fd80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.344946] ffff8801c9c2fe00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.352290] ================================================================== [ 36.359629] Disabling lock debugging due to kernel taint [ 36.365057] Kernel panic - not syncing: panic_on_warn set ... [ 36.365057] [ 36.372407] CPU: 1 PID: 5473 Comm: syz-executor6 Tainted: G B 4.15.0+ #218 [ 36.380616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.389949] Call Trace: [ 36.392513] dump_stack+0x194/0x257 [ 36.396116] ? arch_local_irq_restore+0x53/0x53 [ 36.400755] ? kasan_end_report+0x32/0x50 [ 36.404873] ? lock_downgrade+0x980/0x980 [ 36.408994] ? vsnprintf+0x1ed/0x1900 [ 36.412768] ? do_raw_spin_lock+0x1c0/0x220 [ 36.417059] panic+0x1e4/0x41c [ 36.420225] ? refcount_error_report+0x214/0x214 [ 36.424958] ? add_taint+0x40/0x50 [ 36.428469] ? add_taint+0x1c/0x50 [ 36.431979] ? do_raw_spin_lock+0x1e0/0x220 [ 36.436271] kasan_end_report+0x50/0x50 [ 36.440215] kasan_report+0x148/0x360 [ 36.443988] __asan_report_load4_noabort+0x14/0x20 [ 36.448890] do_raw_spin_lock+0x1e0/0x220 [ 36.453018] _raw_spin_lock_irqsave+0x9e/0xc0 [ 36.457485] ? remove_wait_queue+0x81/0x350 [ 36.461784] remove_wait_queue+0x81/0x350 [ 36.465910] ? find_held_lock+0x35/0x1d0 [ 36.469941] ? add_wait_queue+0x290/0x290 [ 36.474059] ? rcutorture_record_progress+0x10/0x10 [ 36.479051] ? check_noncircular+0x20/0x20 [ 36.483263] ep_unregister_pollwait.isra.7+0x18c/0x590 [ 36.488516] ? clear_tfile_check_list+0x370/0x370 [ 36.493334] ? locks_remove_file+0x3fa/0x5a0 [ 36.497717] ep_free+0x13f/0x320 [ 36.501051] ? ep_remove+0x800/0x800 [ 36.504736] ? fsnotify_first_mark+0x2b0/0x2b0 [ 36.509291] ? ep_free+0x320/0x320 [ 36.512802] ep_eventpoll_release+0x44/0x60 [ 36.517092] __fput+0x327/0x7e0 [ 36.520344] ? fput+0x140/0x140 [ 36.523594] ? _raw_spin_unlock_irq+0x27/0x70 [ 36.528063] ____fput+0x15/0x20 [ 36.531318] task_work_run+0x199/0x270 [ 36.535181] ? task_work_cancel+0x210/0x210 [ 36.539475] ? exit_to_usermode_loop+0x8c/0x2f0 [ 36.544119] exit_to_usermode_loop+0x275/0x2f0 [ 36.548673] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 36.554180] ? do_fast_syscall_32+0x156/0xfa1 [ 36.558647] do_fast_syscall_32+0xbe8/0xfa1 [ 36.562942] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 36.567931] ? do_int80_syscall_32+0x9d0/0x9d0 [ 36.572484] ? finish_task_switch+0x1e2/0x890 [ 36.576972] ? finish_task_switch+0x1b9/0x890 [ 36.581439] ? syscall_return_slowpath+0x2ac/0x550 [ 36.586345] ? prepare_exit_to_usermode+0x350/0x350 [ 36.591332] ? sysret32_from_system_call+0x5/0x3b [ 36.596148] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 36.600966] entry_SYSENTER_compat+0x54/0x63 [ 36.605344] RIP: 0023:0xf7f41c79 [ 36.608679] RSP: 002b:00000000f771c09c EFLAGS: 00000286 ORIG_RAX: 000000000000014a [ 36.616355] RAX: 0000000000000016 RBX: 0000000000000015 RCX: 0000000000000016 [ 36.623595] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 36.630837] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 36.638076] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 36.645316] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 36.653012] Dumping ftrace buffer: [ 36.656529] (ftrace buffer empty) [ 36.660211] Kernel Offset: disabled [ 36.663811] Rebooting in 86400 seconds..