[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 15.844708] random: sshd: uninitialized urandom read (32 bytes read, 33 bits of entropy available) [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 21.171900] random: sshd: uninitialized urandom read (32 bytes read, 38 bits of entropy available) [ 21.502972] random: sshd: uninitialized urandom read (32 bytes read, 38 bits of entropy available) [ 22.504678] random: sshd: uninitialized urandom read (32 bytes read, 114 bits of entropy available) Warning: Permanently added '10.128.0.6' (ECDSA) to the list of known hosts. [ 27.904069] random: sshd: uninitialized urandom read (32 bytes read, 122 bits of entropy available) 2018/01/07 00:09:27 fuzzer started 2018/01/07 00:09:27 dialing manager at 10.128.0.26:43889 [ 28.654160] random: nonblocking pool is initialized 2018/01/07 00:09:31 kcov=true, comps=false 2018/01/07 00:09:32 executing program 0: 2018/01/07 00:09:32 executing program 2: 2018/01/07 00:09:32 executing program 1: 2018/01/07 00:09:32 executing program 7: 2018/01/07 00:09:32 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr=0x7fffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) listen(r0, 0x100401000003) r1 = accept$inet(r0, &(0x7f0000da9000-0x10)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00002d3000)=0x10) write(r1, &(0x7f0000a96000-0xb6)="1f", 0x1) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000)=0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt(r1, 0x84, 0x7b, &(0x7f0000e0e000-0x8)="8022e2ed01000000", 0x8) close(r1) 2018/01/07 00:09:32 executing program 4: mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$urandom(&(0x7f0000007000-0xd)='/dev/urandom\x00', 0x0, 0x207e) write(r0, &(0x7f0000005000-0xa1)="748e80b4a00dcb543c50d5094c89147868c1c8ac9612d1f728bd96e7950754133bb91a51afba8b77ad3e1ed6cbe426e71eed3a8ead1f9284d6185331f4b26e5f53dbb2f3b440e3b26834680c9d6010ac2fe36c5c87e2c219f978308872feaa5ab068a83ffbc7587ef1a2b863271205c227622873f561bf148cdce5235261f3ff069fcf4a15f7db1c767759b251c7e9f4c8c69180a5f6e63a55d8de37a4dacb5d59", 0xa1) 2018/01/07 00:09:32 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000740000)={0x2, 0x78, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000)=0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000fdb000-0x1f)="1f0000000a0609df000080fdfffffffffffff8000900018006000006000000", 0x1f) 2018/01/07 00:09:32 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000490000)={0x2, 0x2, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) sendto$inet(r0, &(0x7f0000fd6000)="f1dd5084deb323c87334973eb18c2329bae5d773a77e44f548e07de994faad2cf4bf5c217f436c83d16b100de5e6e8bd286bb6850e0000100052da7c89171df92857824e7b834aee2f27887cd92c94c260899bd28a65f14b4174598a2b56134c4c1904fe5dcb7ff22e0005ab1d37cd3d5cf01b81002c6b65d4e37d0280713779ff02b28506ce911e76b719ae79e8657164f8302edebfd874ea7f267d27e693c5ab21f16a09ec00031defddc4d8f7fd08a7ede20f5e5bdea4647121d0adb1197edcd32a0d21932a65147c2463b2ed141cc791622b1135bc9a23cd2ff5dc06e7d040d6fb400cc307a2af2e1c86d7d5db0624b444e5b029d04781dfc8488bebd643fa12bb901d4fa3eece9b7ee2295381475235c6c5428164064e83c74dd84ebb6facd00ce94419b57f528d7b1b85d90d2bf94dd9e2a08b7cc92ddb1ce8f8ea0d26837d861765578c", 0x147, 0x800000020000000, &(0x7f0000303000)={0x2, 0x2, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000278000)=@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x10) close(r0) [ 33.271550] IPVS: Creating netns size=2552 id=1 [ 33.520767] IPVS: Creating netns size=2552 id=2 2018/01/07 00:09:33 executing program 1: 2018/01/07 00:09:33 executing program 1: 2018/01/07 00:09:33 executing program 1: 2018/01/07 00:09:33 executing program 1: 2018/01/07 00:09:33 executing program 1: mmap(&(0x7f0000000000/0xde6000)=nil, 0xde6000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x89f3, &(0x7f0000de3000)={@common="01000000000000000000eb00", @ifru_data=&(0x7f0000dc2000)="5b6dad444b7d467cdb0000ee000400000000000000ab00000000e70020722ad5"}) 2018/01/07 00:09:33 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) bind$inet(r0, &(0x7f0000105000-0x10)={0x2, 0x3, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x3, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) r2 = gettid() fcntl$setownex(r1, 0xf, &(0x7f0000d62000)={0x2, r2}) sendto$inet(r1, &(0x7f000093c000-0x1000)='\r', 0x1, 0x811, &(0x7f0000ee9000-0x10)={0x2, 0x0, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) 2018/01/07 00:09:33 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f00008e5000-0xd)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000512000-0x28)={@generic="30609402000000ff04fffb7d0106bc5c", @ifru_names=@generic="df45650b2b8f222d911f6f8a77d710ec"}) close(r0) 2018/01/07 00:09:33 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x11) mmap(&(0x7f0000000000/0xf50000)=nil, 0xf50000, 0x1, 0x32, 0xffffffffffffffff, 0x0) sendto$inet6(r0, &(0x7f00004fa000-0x1)="", 0x0, 0x0, &(0x7f000037c000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}, 0x0}, 0x1c) mmap(&(0x7f0000f50000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_int(r0, 0x29, 0x35, &(0x7f0000f51000-0x4)=0x69ac, 0x4) recvmsg(r0, &(0x7f0000273000-0x38)={&(0x7f000037a000-0x8)=@un=@abs={0x0, 0x0, 0x0}, 0x8, &(0x7f0000b28000-0x40)=[], 0x0, &(0x7f0000f52000)=""/0, 0x0, 0x0}, 0x0) [ 33.587414] IPVS: Creating netns size=2552 id=3 [ 33.649800] IPVS: Creating netns size=2552 id=4 [ 33.693971] IPVS: Creating netns size=2552 id=5 [ 33.722690] IPVS: Creating netns size=2552 id=6 [ 33.765601] IPVS: Creating netns size=2552 id=7 2018/01/07 00:09:33 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000109000-0xb)='projid_map\x00') sendfile(r0, r1, 0x0, 0x9) 2018/01/07 00:09:33 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000af2000-0xd)='/dev/net/tun\x00', 0x0, 0xf428b9b9e6009f61) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000928000-0x28)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_settings={0x6, 0x0, @fr_pvc_info=&(0x7f0000235000)={0x0, @syzn={0x73, 0x79, 0x7a, 0x0, 0x0}}}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000630000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_flags=0x20301}) write$tun(r2, &(0x7f0000ab3000-0x2733)=@hdr={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv6={0x0, 0x6, "d81f3e", 0x8, 0x0, 0x0, @loopback={0x0, 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, {[], @udp={0x0, 0x0, 0x8, 0x0, ""}}}}, 0xffffffb3) 2018/01/07 00:09:33 executing program 3: 2018/01/07 00:09:33 executing program 5: 2018/01/07 00:09:33 executing program 2: mmap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3, 0x32, 0xffffffffffffffff, 0x0) poll(&(0x7f0000003000-0x18)=[], 0x0, 0x5) 2018/01/07 00:09:33 executing program 6: 2018/01/07 00:09:33 executing program 1: 2018/01/07 00:09:33 executing program 7: 2018/01/07 00:09:33 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000005000)={{0x0, 0x4}, {0x101, 0x0}}, &(0x7f000000c000-0x20)={{0x0, 0x0}, {0x0, 0x0}}) read(r0, &(0x7f0000000000)=""/8, 0x8) 2018/01/07 00:09:33 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000)=0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000052b000-0x8)='./file0\x00', 0x0) mount(&(0x7f0000374000)='./file0\x00', &(0x7f00003b6000-0x8)='./file0\x00', &(0x7f0000ec2000)='ramfs\x00', 0x0, &(0x7f0000441000)="") mount(&(0x7f0000f15000)='./file0\x00', &(0x7f00003bd000-0x8)='./file0\x00', &(0x7f0000119000-0xb)='openpromfs\x00', 0x20, &(0x7f000028b000-0xc)="") [ 33.815109] IPVS: Creating netns size=2552 id=8 [ 33.831853] audit: type=1400 audit(1515283773.644:5): avc: denied { create } for pid=3623 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 2018/01/07 00:09:33 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe(&(0x7f00005db000)={0xffffffffffffffff, 0xffffffffffffffff}) getegid() 2018/01/07 00:09:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt(r0, 0x10e, 0x2, &(0x7f0000000000)="", 0x0) 2018/01/07 00:09:33 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000557000-0x10)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f0000583000)=0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000fba000)={0x0, 0x0}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f00001e1000)={{0x4000001ff, 0x0}, {0x0, 0x0}, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) 2018/01/07 00:09:33 executing program 2: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x0, &(0x7f0000fc8000)={@loopback=0x7f000001, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00006ea000-0xc)='/dev/autofs\x00', 0x80, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000789000-0xb)=""/11) r2 = socket$netlink(0x10, 0x3, 0x10000000005) writev(r2, &(0x7f0000e07000)=[], 0x0) 2018/01/07 00:09:33 executing program 3: clone(0x0, &(0x7f0000015000)="", &(0x7f0000006000)=0x0, &(0x7f0000016000-0x4)=0x0, &(0x7f000000f000)="") r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f000031f000)='/dev/rfkill\x00', 0x200, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000e3b000)=0x6, 0x4) madvise(&(0x7f0000d8b000/0x2000)=nil, 0x2000, 0xd) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000971000)={0x81, @time={0x0, 0x0}, 0x7fffffff, {0x6, 0x2}, 0x9, 0x0, 0x2f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) syslog(0x0, &(0x7f00008d2000)=""/89, 0x59) 2018/01/07 00:09:33 executing program 5: mmap(&(0x7f0000000000/0xfef000)=nil, 0xfef000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f00004b8000)={0x10, 0x0, 0x0, 0xffff}, 0xc) mmap(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tun(&(0x7f0000ff0000-0xd)='/dev/net/tun\x00', 0x0, 0xfffffffffffffffd) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000fea000+0x815)=0x6, 0x4) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000d03000-0x10)='/selinux/policy\x00', 0x0, 0x0) mmap(&(0x7f0000ff0000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000b6e000-0x8)=0x4) mmap(&(0x7f0000ff1000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff1000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000ff1000)={0x0, 0x3f}, &(0x7f0000ff1000)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000f10000)={r3, 0x76, "87f47926ae0f7822765b3cd249ef7278218afacecce6b5b7d7a738dadecb237306f64aa706dfc1dcf64c76241eaf0d7b3669bc69a1a01745e7392913db7c7e1b65d6261233df5da6c1669ea314bb2f0c2cf42d24c9c2ac7159b3b9898ecd1db99443d7843969e66322d56ece9551019cb17a9c57a4da"}, &(0x7f0000bf2000)=0x7e) getsockopt$inet_mreqsrc(r2, 0x0, 0x25, &(0x7f0000ff0000)={@local={0x0, 0x0, 0x0, 0x0}, @rand_addr=0x0, @broadcast=0x0}, &(0x7f0000914000)=0xc) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000b2a000)={@common='ip_vti0\x00', @ifru_names=@generic="4f54000cc0a1ed4f3a0a1fdc22207302"}) [ 33.926336] device syz0 entered promiscuous mode 2018/01/07 00:09:33 executing program 0: mmap(&(0x7f0000000000/0xf6d000)=nil, 0xf6d000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x400000000010, 0x2, 0xc) write(r0, &(0x7f0000f5c000)="1f0000000104ff00fd4345bb07000000000000000900010001160003000000", 0x1f) r1 = socket(0x100000000000d, 0x6, 0xe) write(r1, &(0x7f0000a69000)="1f0000000104ff00284345b4f6ff000000000000000006000104ffdd000700", 0x1f) 2018/01/07 00:09:33 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) creat(&(0x7f0000b0d000-0x8)='./file0\x00', 0x0) openat$pktcdvd(0xffffffffffffff9c, &(0x7f00006f8000-0x15)='/dev/pktcdvd/control\x00', 0x80000, 0x0) rmdir(&(0x7f0000898000-0x8)='./file0\x00') 2018/01/07 00:09:33 executing program 1: r0 = socket(0x11, 0x802, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) setsockopt$packet_int(r0, 0x107, 0x7, &(0x7f000086f000-0x4)=0x0, 0x4) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000a14000)={0x0, 0xff, 0x0, 0x81, 0x7, 0x400, 0x1, 0x8, {0x0, @in6={{0xa, 0x0, 0x81, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0xff, 0xff], @empty=0x0}, 0x8}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x8, 0x1, 0x8, 0x100, 0x530}}, &(0x7f0000b69000-0x4)=0xb8) mmap(&(0x7f0000d25000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000d25000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r2, 0x540e, 0x7) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000271000-0x14)={r1, 0x4, 0x8, 0xbf2, 0x7fffffff, 0x0}, &(0x7f00001da000-0x4)=0x14) 2018/01/07 00:09:33 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setlease(r0, 0x400, 0x3) ioctl$sock_ifreq(r0, 0x8983, &(0x7f0000006000)={@generic="1b520310b564c42354e2d0b8a14e1ad7", @ifru_settings={0x0, 0x0, @fr_pvc_info=&(0x7f0000006000)={0x0, @common='lo\x00'}}}) 2018/01/07 00:09:33 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x40000100000005, 0x0, &(0x7f0000517000)={0xffffffffffffffff, 0xffffffffffffffff}) lseek(r0, 0x0, 0x6) 2018/01/07 00:09:33 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000-0x18)={0xaa, 0x0, 0x0}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f000001a000-0x20)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1, 0x0}) r1 = memfd_create(&(0x7f0000002000)='proclo}\x00', 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000012000)="ca", 0x1}], 0x1, 0x0) fchown(r1, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000dd6000-0x10)='/selinux/policy\x00', 0x0, 0x0) close(r1) close(r0) 2018/01/07 00:09:33 executing program 5: mmap(&(0x7f0000000000/0x588000)=nil, 0x588000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00004ef000-0x4)=0x0, &(0x7f00000d4000-0x4)=0x4) mmap(&(0x7f0000588000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000588000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000588000)={0x0, @in6={{0xa, 0x1, 0x0, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1}, 0x4}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x1, 0xc1, 0x8, 0x10000, 0x1ff, 0x7, 0x2c, 0x6, 0x4, 0x7fff, 0x1, 0xf756, 0x2, 0x8000, 0xa]}, &(0x7f0000589000-0x4)=0x108) mmap(&(0x7f0000588000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00002a9000)={0x0, @in6={{0xa, 0x3, 0x573, @loopback={0x0, 0x1}, 0x1}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x7fff, 0x10000, 0x24, 0x409e, 0x80}, &(0x7f0000588000)=0xa0) r3 = getpgid(0xffffffffffffffff) getpgrp(r3) mmap(&(0x7f0000588000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f000029b000)={r1, 0x3, 0xed5, 0x9, 0x4, 0x1ff, 0x3f8c, 0x300000000, {r2, @in={{0x2, 0x2, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x101, 0x8, 0x8efc, 0x200, 0xffffffff}}, &(0x7f0000589000-0x4)=0xb8) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000578000-0x38)={&(0x7f000026d000-0xc)={0x10, 0x0, 0x0, 0x0}, 0xc, &(0x7f0000577000)={&(0x7f000057e000)=@newsa={0x1d8, 0x1a, 0x1, 0x0, 0x0, {{@in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0xff, 0xff], @local={0xac, 0x14, 0x0, 0xaa}}, @in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {@in=@empty=0x0, 0x0, 0x32}, @in=@rand_addr=0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0}, [@algo_aead={0xe8, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x99, 0x80, "baab54f233d4bfbe68dbb9a3567a994dcced29f1adf28ab25218ec04abef93f8009ecfc8d7f709a08ef070d7f48ac71406d5ca58fc21e2075811cf8aff58dcc3e57779dbfca9f0b2a2baf5e897756ad5c3cc235c3c0f265e17f313fb9b9a12a506369809146914dc0f6b2916231abf93faf72d4303954c9bdfc16f1e9af7de03857f0cc4bbdd47171e0b7c1b4a0d6d1be5cd51ea0000001f8c"}}]}, 0x1d8}, 0x1, 0x0, 0x0, 0x0}, 0x0) mmap(&(0x7f0000589000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000589000)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r5, 0x541b, &(0x7f0000185000)=0x0) 2018/01/07 00:09:33 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000)=0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000052b000-0x8)='./file0\x00', 0x0) mount(&(0x7f0000374000)='./file0\x00', &(0x7f00003b6000-0x8)='./file0\x00', &(0x7f0000ec2000)='ramfs\x00', 0x0, &(0x7f0000441000)="") mount(&(0x7f0000f15000)='./file0\x00', &(0x7f00003bd000-0x8)='./file0\x00', &(0x7f0000119000-0xb)='openpromfs\x00', 0x20, &(0x7f000028b000-0xc)="") 2018/01/07 00:09:33 executing program 7: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa, 0x0, 0x0}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x0}) pivot_root(&(0x7f0000012000)='./file0\x00', &(0x7f0000005000-0x8)='./file0\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000f39000)="", &(0x7f0000eaa000-0x4)=0x0, &(0x7f0000bf3000-0x4)=0x0, &(0x7f00003b9000-0xcd)="") ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f0000cec000)={&(0x7f0000722000/0x2000)=nil, 0x2000}) 2018/01/07 00:09:33 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e27000-0x12)='/dev/loop-control\x00', 0x163800, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00008ca000-0x8)={0x0, 0x0}) r2 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000f31000)='/selinux/member\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f00001d1000-0xe4)=[@in6={0xa, 0x3, 0x78, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1}, 0x2}, @in={0x2, 0x0, @local={0xac, 0x14, 0x0, 0xaa}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in={0x2, 0x3, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x2, 0x5, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0xff, 0xff], @rand_addr=0x4}, 0x7}, @in6={0xa, 0x3, 0x9, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1}, 0x1}, @in6={0xa, 0x3, 0x2, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x9}, @in6={0xa, 0x1, 0x7d0f, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0xff, 0xff], @multicast1=0xe0000001}, 0x1}, @in6={0xa, 0x2, 0x2, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x5}, @in6={0xa, 0x0, 0x1, @loopback={0x0, 0x1}, 0x1}], 0xe4) dup2(r0, r1) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000a1000-0xd)='/selinux/mls\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f00005a2000)='/dev/sg#\x00', 0xfffffffffffffffd, 0x80) ioctl(r0, 0x227e, &(0x7f0000464000)="ebfdf9a7fae633697fb20ea913e7b60430b72a6cda000000202edc41d6c34d9a3e05adfd3ecc64d994afc287c9c7b2a779c6ef0b8052e67d362a7b0900000000000000f587342d0cb246cbbe2ba62972cf3d81051ad3b53871c033925f90edd8eba137979b3c88dcb0916bb92f86db49b6db3a8943a2a2074f1aa39a09a8c272cbb14cb2602307a32d5757753d3177c040da852d9c30b4f371ab5111f28c728c") 2018/01/07 00:09:33 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f000000c000-0xd)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(&(0x7f0000010000-0xd)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000007000)={0x8, 0x0, &(0x7f0000006000-0x2c)=[@acquire={0x40046305, 0x0}], 0x0, 0x0, &(0x7f0000002000)=""}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000009000-0x30)={0x8, 0x0, &(0x7f0000008000)=[@release={0x400c630e, 0x0}], 0x0, 0x0, &(0x7f0000001000-0xb3)=""}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000215000-0x30)={0x8, 0x0, &(0x7f00002bd000)=[@release={0x40046306, 0x0}], 0x0, 0x0, &(0x7f0000012000)=""}) r2 = creat(&(0x7f000006e000-0x8)='./file0\x00', 0x20) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000124000-0x4)=0x8) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000b2b000)='/dev/rtc\x00', 0x1, 0x0) clock_gettime(0x0, &(0x7f0000979000-0x10)={0x0, 0x0}) futimesat(r3, &(0x7f00001d9000-0x8)='./file0\x00', &(0x7f0000f2f000-0x20)={{r4, r5/1000+30000}, {0x77359400, 0x0}}) [ 34.072973] audit: type=1400 audit(1515283773.884:6): avc: denied { write } for pid=3684 comm="syz-executor0" path="socket:[10465]" dev="sockfs" ino=10465 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 34.156280] audit: type=1400 audit(1515283773.964:7): avc: denied { set_context_mgr } for pid=3714 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 [ 34.199825] ------------[ cut here ]------------ [ 34.210166] binder: BINDER_SET_CONTEXT_MGR already set [ 34.210285] WARNING: CPU: 1 PID: 3683 at crypto/algapi.c:343 crypto_wait_for_test+0xbb/0xd0() [ 34.210493] Kernel panic - not syncing: panic_on_warn set ... [ 34.210493] [ 34.210503] CPU: 1 PID: 3683 Comm: syz-executor5 Not tainted 4.4.110-gd891a62 #19 [ 34.210507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 34.210519] 0000000000000000 44e5a2e1ed262741 ffff8800bbbaef00 ffffffff81d04e3d [ 34.210529] ffffffff83842f60 ffff8800bbbaefd8 ffffffff839dacc0 0000000000000009 [ 34.210538] 0000000000000157 ffff8800bbbaefc8 ffffffff814197fa 0000000041b58ab3 [ 34.210540] Call Trace: [ 34.210551] [] dump_stack+0xc1/0x124 [ 34.210561] [] panic+0x1aa/0x388 [ 34.210568] [] ? percpu_up_read.constprop.45+0xe1/0xe1 [ 34.210576] [] ? pm_qos_get_value.part.4+0xb/0xb [ 34.210585] [] ? warn_slowpath_common+0x10a/0x140 [ 34.210592] [] warn_slowpath_common+0x125/0x140 [ 34.210600] [] ? crypto_wait_for_test+0xbb/0xd0 [ 34.210606] [] warn_slowpath_null+0x29/0x30 [ 34.210613] [] crypto_wait_for_test+0xbb/0xd0 [ 34.210620] [] crypto_register_instance+0x1f7/0x2d0 [ 34.210627] [] crypto_givcipher_default+0x483/0x5d0 [ 34.210633] [] ? setkey+0x260/0x260 [ 34.210641] [] ? crypto_larval_lookup.part.8+0x89/0x230 [ 34.210647] [] crypto_lookup_skcipher+0x1a9/0x2a0 [ 34.210653] [] crypto_alloc_ablkcipher+0x5e/0x190 [ 34.210662] [] common_rfc4106_set_key+0x118/0x630 [ 34.210671] [] ? kasan_unpoison_shadow+0x35/0x50 [ 34.210678] [] crypto_aead_setkey+0xaa/0x1c0 [ 34.210686] [] cryptd_aead_setkey+0x41/0x50 [ 34.210694] [] crypto_aead_setkey+0x162/0x1c0 [ 34.210700] [] rfc4106_set_key+0x41/0x50 [ 34.210708] [] crypto_aead_setkey+0xaa/0x1c0 [ 34.210714] [] ? crypto_larval_lookup+0x50/0x50 [ 34.210722] [] aead_geniv_setkey+0x47/0x60 [ 34.210729] [] crypto_aead_setkey+0xaa/0x1c0 [ 34.210737] [] esp6_init_state+0x20a/0xf50 [ 34.210745] [] ? esp6_destroy+0x60/0x60 [ 34.210754] [] ? __xfrm_init_state+0x363/0xb30 [ 34.210761] [] __xfrm_init_state+0x3e7/0xb30 [ 34.210768] [] xfrm_add_sa+0x1916/0x2e40 [ 34.210775] [] ? xfrm_send_state_notify+0x17d0/0x17d0 [ 34.210784] [] ? nla_parse+0x213/0x260 [ 34.210791] [] ? xfrm_send_state_notify+0x17d0/0x17d0 [ 34.210797] [] xfrm_user_rcv_msg+0x41c/0x6b0 [ 34.210803] [] ? xfrm_dump_sa_done+0xa0/0xa0 [ 34.210811] [] ? __lock_acquire+0xb5f/0x4b50 [ 34.210821] [] ? avc_has_perm_noaudit+0x460/0x460 [ 34.210830] [] netlink_rcv_skb+0x13e/0x370 [ 34.210836] [] ? xfrm_dump_sa_done+0xa0/0xa0 [ 34.210842] [] xfrm_netlink_rcv+0x6f/0x90 [ 34.210849] [] netlink_unicast+0x522/0x760 [ 34.210856] [] ? netlink_unicast+0x44f/0x760 [ 34.210863] [] ? netlink_attachskb+0x6c0/0x6c0 [ 34.210869] [] netlink_sendmsg+0x8e8/0xc50 [ 34.210876] [] ? netlink_unicast+0x760/0x760 [ 34.210884] [] ? selinux_socket_sendmsg+0x3f/0x50 [ 34.210891] [] ? security_socket_sendmsg+0x89/0xb0 [ 34.210898] [] ? netlink_unicast+0x760/0x760 [ 34.210906] [] sock_sendmsg+0xca/0x110 [ 34.210912] [] ___sys_sendmsg+0x6c1/0x7c0 [ 34.210920] [] ? copy_msghdr_from_user+0x550/0x550 [ 34.210927] [] ? do_futex+0x3e3/0x1670 [ 34.210935] [] ? __fget+0x232/0x3b0 [ 34.210941] [] ? __fget+0x47/0x3b0 [ 34.210947] [] ? __fget_light+0xa1/0x1e0 [ 34.210953] [] ? __fdget+0x18/0x20 [ 34.210960] [] __sys_sendmsg+0xd3/0x190 [ 34.210967] [] ? SyS_shutdown+0x1b0/0x1b0 [ 34.210973] [] ? SyS_futex+0x210/0x2c0 [ 34.210978] [] ? fd_install+0x4d/0x60 [ 34.210985] [] ? move_addr_to_kernel+0x50/0x50 [ 34.210993] [] ? sys_getpgrp+0xd4/0x190 [ 34.211000] [] SyS_sendmsg+0x2d/0x50 [ 34.211009] [] entry_SYSCALL_64_fastpath+0x16/0x92 [ 34.215979] Dumping ftrace buffer: [ 34.216061] (ftrace buffer empty) [ 34.216063] Kernel Offset: disabled [ 34.668600] Rebooting in 86400 seconds..