[....] Starting enhanced syslogd: rsyslogd[ 15.839471] audit: type=1400 audit(1519087761.084:5): avc: denied { syslog } for pid=4002 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 18.289752] audit: type=1400 audit(1519087763.534:6): avc: denied { map } for pid=4139 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.10' (ECDSA) to the list of known hosts. 2018/02/20 00:49:29 fuzzer started [ 24.612449] audit: type=1400 audit(1519087769.857:7): avc: denied { map } for pid=4150 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/02/20 00:49:30 dialing manager at 10.128.0.26:39723 [ 28.012197] can: request_module (can-proto-0) failed. [ 28.021507] can: request_module (can-proto-0) failed. 2018/02/20 00:49:33 kcov=true, comps=true [ 28.610619] audit: type=1400 audit(1519087773.855:8): avc: denied { map } for pid=4150 comm="syz-fuzzer" path="/sys/kernel/debug/kcov" dev="debugfs" ino=9081 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2018/02/20 00:49:35 executing program 7: 2018/02/20 00:49:35 executing program 3: 2018/02/20 00:49:35 executing program 0: 2018/02/20 00:49:35 executing program 1: 2018/02/20 00:49:35 executing program 2: 2018/02/20 00:49:35 executing program 4: 2018/02/20 00:49:35 executing program 5: 2018/02/20 00:49:35 executing program 6: [ 30.519358] audit: type=1400 audit(1519087775.764:9): avc: denied { map } for pid=4150 comm="syz-fuzzer" path="/root/syzkaller-shm759631831" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 30.570646] audit: type=1400 audit(1519087775.815:10): avc: denied { sys_admin } for pid=4192 comm="syz-executor7" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 30.593709] IPVS: ftp: loaded support on port[0] = 21 [ 30.661800] audit: type=1400 audit(1519087775.906:11): avc: denied { net_admin } for pid=4196 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 30.663816] IPVS: ftp: loaded support on port[0] = 21 [ 30.725510] IPVS: ftp: loaded support on port[0] = 21 [ 30.767462] IPVS: ftp: loaded support on port[0] = 21 [ 30.847587] IPVS: ftp: loaded support on port[0] = 21 [ 30.924856] IPVS: ftp: loaded support on port[0] = 21 [ 31.016711] IPVS: ftp: loaded support on port[0] = 21 [ 31.120204] IPVS: ftp: loaded support on port[0] = 21 [ 31.928653] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 32.003237] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 32.128518] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 32.235086] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 32.386457] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 32.397287] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 32.651256] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 32.740216] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.526995] audit: type=1400 audit(1519087779.771:12): avc: denied { sys_chroot } for pid=4199 comm="syz-executor7" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/02/20 00:49:40 executing program 7: linkat(0xffffffffffffffff, &(0x7f0000c01000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000a70000)='./file0\x00', 0x1000) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f000057eff5)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000326ffc)=0x200040000001) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00007e5fcc)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f000001cfb0)={0xfefffffffffffffc, 0xb}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000040)={{0x4934, 0x2}, 'port0\x00', 0x44, 0x1000, 0xce6c, 0x4, 0x7, 0x7fff, 0x6, 0x0, 0x6, 0x9}) 2018/02/20 00:49:40 executing program 3: bind$netrom(0xffffffffffffffff, &(0x7f0000049000)=@ax25={0x3, {"9d5aef87f23260"}, 0x7000000000000000}, 0xfffffffffffffefc) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x12000, 0x0) r1 = accept4$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @any=0xffffffff}, 0x10, 0x800) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000000)={0x6, 0xffffffffffffffff, 0x1}) ioctl$VT_ACTIVATE(r1, 0x5606, 0x7) setsockopt$netrom_NETROM_N2(r2, 0x103, 0x3, &(0x7f0000000040)=0x5, 0x4) 2018/02/20 00:49:40 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x1) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000024000)=@mpls_getroute={0x28, 0x1a, 0x9, 0xffffffffffffffff, 0xffffffffffffffff, {0x1c}, [@RTA_DST={0xc, 0x1, [{}, {}]}]}, 0x28}, 0x1}, 0x0) 2018/02/20 00:49:40 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000588000)='oom_score_adj\x00') mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3000003, 0x32, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000b97000)=[], 0x1000000000000259) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0xee, "8236b3346eb6eb1be597624ffd1fa90716ad1863ad94cd32ae9f3de5e3bbd8917c4b3980d6b0016311c2998258f85b248d456ebca5b24a726961bb5986597017a7b970fc1ce3145909eab6e832a8a4a476f8fe00c9535dd02ac8705cc90e2b369f5164cf787bbf91604143230a146493f4bb84714187f6dc407edc8493e5f28454b899606ce93f9d7671ee1d52c1310452a87a1f3b87d6a9975243f188ced5c9a8d77ca6b4f5e1eb13bf5593687ba18ed492088cac9b210bd5de4e1737e375af763fb9adb03a75fd2385552e0d4cd98bf0dfabaddd5925c081e6d1206e990ef3572a9fa3f2528e1f961ae26177c8"}, &(0x7f0000000100)=0xf6) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000140)=0x1, 0x4) sendmmsg(r0, &(0x7f0000000180)=[], 0x0, 0x4011) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000180)=0x400, &(0x7f00000001c0)=0x2) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r1, 0x4}, &(0x7f0000000180)=0x8) 2018/02/20 00:49:40 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000134000)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) connect$inet(r0, &(0x7f00000e5000)={0x2, 0x3, @loopback=0x7f000001}, 0x10) connect$inet(r0, &(0x7f00009322c4)={0x2, 0xffffffffffffffff, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x3, @loopback=0x7f000001}, 0x10) poll(&(0x7f00006daff8)=[{r0}], 0x1, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xca, "fc4358df360e72bdae4cd8779378f6ee8a9722bc1d56df682b6989145e2cf67a2f8e6c0ce9667c372706f1d154996f271ee46936ef103063de168fbf92612537dd900efdabac22e5c7ca3ee07c488ecaa397b40222b39bbf53c0237e83d8a513f8b917fc4b17eeb893a68a36b7dd4b0d2ce8b65192b7f4b4beee24856110adbf4ecf8ec7b10ec1550ce52d7909ab8c52492617939e66f4af06cb1232965cd6f61c8c5d50c0401f74c5884b210c9f8e62cc95b9e2bc8170545135b034effe6382498b59d4053e8c5216db"}, &(0x7f0000000140)=0xd2) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000180)={0x1000, 0x200, 0xffff, 0xfff, r1}, &(0x7f00000001c0)=0x10) 2018/02/20 00:49:40 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x5, 0x40) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)=""/36) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00002ceb98)=@filter={'filter\x00', 0xe, 0x4, 0x408, 0xffffffff, 0xd0, 0x220, 0xd0, 0xffffffff, 0xffffffff, 0x338, 0x338, 0x338, 0xffffffff, 0x4, &(0x7f00001a5fc0), {[{{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, []}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0x108, 0x150, 0x0, {}, [@common=@srh={0x30, 'srh\x00'}, @common=@unspec=@mark={0x30, 'mark\x00', 0x1}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@hl={0x28, 'hl\x00'}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x468) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f000097d000)=@filter={'filter\x00', 0xe, 0x4, 0x4f0, 0xffffffff, 0x118, 0x228, 0x118, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f00000dafc0), {[{{@ipv6={@mcast2={0xff, 0x2, [], 0x1}, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}, [], [], @generic="44692c5e0459873c3df54dccd06c7a2d", @syzn={0x73, 0x79, 0x7a}}, 0x0, 0xa8, 0xf0, 0x0, {}, []}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0x0, 0x3}}}, {{@uncond, 0x0, 0xd8, 0x110, 0x0, {}, [@common=@srh={0x30, 'srh\x00'}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0x0, 0xaf0}, {0x800}}}}, {{@uncond, 0x0, 0x1e0, 0x220, 0x0, {}, [@common=@rt={0x138, 'rt\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [@dev={0xfe, 0x80, [], 0x0}, @mcast2={0xff, 0x2, [], 0x1}, @loopback={0x0, 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, @mcast2={0xff, 0x2, [], 0x1}, @loopback={0x0, 0x1}, @dev={0xfe, 0x80}, @mcast2={0xff, 0x2, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, @empty]}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "6664079dd6ffef3fa2dbcd2d05d2021e7c9b9bb3380bf664d3f11d3ed70f"}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x550) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7fffffff, 0x408001) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f00000000c0)=0xfc22) recvmsg$kcm(r2, &(0x7f00000001c0)={&(0x7f0000000000)=@can, 0x10, &(0x7f0000000180)=[{&(0x7f0000000100)=""/108, 0x6c}], 0x1, 0x0, 0x0, 0x80000000}, 0x2040) 2018/02/20 00:49:40 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) setitimer(0x4000000000000002, &(0x7f0000000040)={{}, {0x77359400}}, &(0x7f0000000140)) getitimer(0x2, &(0x7f0000bf2fe0)) 2018/02/20 00:49:40 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$link(0x8, r1, r2) connect$inet6(r0, &(0x7f0000e91fe4)={0xa, 0xffffffffffffffff, 0x7, @empty, 0x7}, 0x1c) 2018/02/20 00:49:40 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5a0, 0xf0, 0xf0, 0x400, 0x1c0, 0x400, 0x4d0, 0x4d0, 0x4d0, 0x4d0, 0x4d0, 0x6, &(0x7f0000003fa0), {[{{@uncond, 0x0, 0xa8, 0xf0, 0x0, {}, []}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00', 0x1, 0x5, 0x1ff}}}, {{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, []}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@ipv6={@empty, @loopback={0x0, 0x1}, [], [], @syzn={0x73, 0x79, 0x7a}, @syzn={0x73, 0x79, 0x7a}}, 0x0, 0xa8, 0xd0, 0x0, {}, []}, @HL={0x28, 'HL\x00'}}, {{@ipv6={@remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}, @local={0xfe, 0x80, [], 0xffffffffffffffff, 0xaa}, [], [], @syzn={0x73, 0x79, 0x7a}, @syzn={0x73, 0x79, 0x7a}}, 0x0, 0x128, 0x170, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00'}, @common=@inet=@hashlimit1={0x58, 'hashlimit\x00', 0x1, {@generic="1d9b72d14491bd19a9849b7c758f5bca"}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@multicast1=0xe0000001, @ipv6=@empty}}}, {{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, []}, @inet=@DSCP={0x28, 'DSCP\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x600) r1 = dup3(r0, r0, 0x80000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000006c0)={r1, &(0x7f0000000600)="dc960292c513bda51b54827516d6f764a24ea1409736a3552b39a1b9439c5f71eb02cf798a98c731e070925f063673bbbe9896d7630a1bae3e10388c0229c3b53bd0a2fa085259c9b68ed2f4a800d246771918bab0b386d3ad7ea316969f6a8ad7bb51303552dc61b7e253ba743398be36dc318856129f1c35cf6963e71ae7e592117bf6abe3ddcdf8c6c24aa4c4af596203bae71d9e4f92"}, 0x10) pivot_root(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='./file0\x00') 2018/02/20 00:49:40 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000400)=@filter={'filter\x00', 0x40e, 0x4, 0x3a8, 0xffffffff, 0x208, 0x208, 0x0, 0xffffffff, 0xffffffff, 0x2d8, 0x2d8, 0x2d8, 0xffffffff, 0x2, &(0x7f00000003c0), {[{{@uncond, 0x0, 0x110, 0x138, 0x0, {}, [@common=@unspec=@rateest={0x68, 'rateest\x00', 0x0, {@common='erspan0\x00', @common='vcan0\x00', 0x0, 0x1, 0xa, 0x81, 0x0, 0x4, 0x8, 0x80000001}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, []}, @common=@unspec=@STANDARD={0x28}}, {{@ipv6={@dev={0xfe, 0x80}, @empty, [], [], @generic="bba94527114eb2aa1e15552fc510a1ba", @common='ip6gre0\x00'}, 0x0, 0xa8, 0xd0, 0x0, {}, []}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x408) 2018/02/20 00:49:40 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f96, 0xfffffffffffffffe, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt(r1, 0x2000000000010d, 0x100000001, &(0x7f00007e0000)=""/4, &(0x7f0000000000)=0x4) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 2018/02/20 00:49:40 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000b48000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x1ff) sendfile(r1, r2, &(0x7f0000000000), 0x400000057) [ 34.992123] audit: type=1400 audit(1519087780.234:13): avc: denied { dac_read_search } for pid=5235 comm="syz-executor6" capability=2 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/02/20 00:49:40 executing program 6: clock_nanosleep(0x4, 0x0, &(0x7f000005eff0)={0x77359400}, &(0x7f0000af9000)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x80040, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000040)="55a5011ef9ab145e918f7d73c0b6e3b114e2ae40273605fbba03f32c779711dd72f09f3e29033f1f2567ca937b0b5a9c8b86f7b5ed2b5150e753c2c2f4103c08ea41726a884c941e8fc0552f886ffdabf2bdff0ccfccdcaeae2d08ac7ad964fca68897a64f79fef77280b17647d88d7fad3952e8e7edab996bbf2525e140f5148a90a7c93d23f03b0c73607541d174b28d8670baed06081e713586bad9c74a6ea253c4ecd9b4644f98d46c439a331a607d64b6adfc07c799d1ed16c80862cb5eec4c20b403e1babf8f838d00b90711141dc32ee62427689bf33cde4bb3e14f1bd02b4f87f3010f5194462e76728be08d484479c8cb64eeae", &(0x7f0000000140)="825c356c100fa77a821fe1524f68a8a8e20e35b1788649052b370614648292ec632dfa08b20f97b1889d537d97233689ac4bf1a65284ae9d7af02edace46"}, 0x20) 2018/02/20 00:49:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0x5, 0x4, 0x1ff, 0x0, r0}, 0x2c) r1 = semget(0x1, 0x6, 0x10) semctl$SEM_STAT(r1, 0x5, 0x12, &(0x7f0000000000)=""/104) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r2, 0x0, 0x80, 0xad, &(0x7f00000000c0)="dfd5b94279bd3d2866ad17878529da193331e3b18e79c5d5b8d01d47abe322bb984038c8b7af0e62a9df2e1d39c2cad7f67e3a476d8c24b5e0282437b5af4e138dd804ed26103e607b4ab60757a12d6d7515ba83a9a2900fb9d963b5db3507e2e37400cd00c84d6c21f5bf6ae9b7368dff98b725bd684c1d5bb33016909d1056", &(0x7f0000000140)=""/173, 0x1ff}, 0x28) semctl$GETVAL(r1, 0x3, 0xc, &(0x7f00000000c0)=""/36) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xee91, 0x101, 0x0, 0x6, 0x6, 0x8, "886205baa16dbf1e14efb62dbbb3867637bd6ddf07f8e69cbeaecfe40b4937be104a589e31beb2702302d42d0f44ea499c57d2a08d8ab4fb2021cfdb8180faf5", "a300e5914b652f3ced7102a4f2ce37c132797386db35a7062172ce06dccdfd4567f55c4da1762df1e8d1cb2e4c146197ce452f046cef33c2803976825f658676", "73fd3e401e2a0ae0951d587ceb666bf2dbd6a1c099639c4806f877781a17249f", [0x4]}) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000240)={r2}) [ 35.053281] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 35.072810] INFO: trying to register non-static key. [ 35.077952] the code is fine but needs lockdep annotation. [ 35.083566] turning off the locking correctness validator. [ 35.089182] CPU: 1 PID: 5252 Comm: syz-executor0 Not tainted 4.16.0-rc2+ #320 [ 35.096440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.105769] Call Trace: [ 35.108338] dump_stack+0x194/0x257 [ 35.111941] ? arch_local_irq_restore+0x53/0x53 [ 35.116586] register_lock_class+0x1b6c/0x2820 [ 35.121139] ? lock_downgrade+0x980/0x980 [ 35.125261] ? __lock_acquire+0x664/0x3e00 [ 35.129470] ? lock_pin_lock+0x360/0x360 [ 35.133505] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 35.138671] ? __free_pages+0xd8/0x150 [ 35.142530] ? free_unref_page+0x9e0/0x9e0 [ 35.146735] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 35.151724] ? account_kernel_stack+0x194/0x270 [ 35.156363] ? put_task_stack+0x116/0x270 [ 35.160481] ? finish_task_switch+0x58d/0x860 [ 35.164947] ? copy_overflow+0x20/0x20 [ 35.168813] ? __schedule+0x90d/0x2070 [ 35.172676] ? __sched_text_start+0x8/0x8 [ 35.176794] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 35.181801] ? lock_acquire+0x1d5/0x580 [ 35.185748] __lock_acquire+0x1de/0x3e00 [ 35.189782] ? wake_up_klogd+0x100/0x100 [ 35.193818] ? lock_release+0xa40/0xa40 [ 35.197762] ? trace_event_raw_event_sched_switch+0x810/0x810 [ 35.203704] ? del_timer_sync+0x84/0x240 [ 35.207737] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 35.212899] ? led_tg_destroy+0xb0/0x3f0 [ 35.216933] ? __mutex_lock+0x16f/0x1a80 [ 35.220963] ? led_tg_destroy+0xb0/0x3f0 [ 35.224998] ? vprintk_emit+0x4b5/0xb90 [ 35.228946] ? led_tg_destroy+0xb0/0x3f0 [ 35.232980] ? mutex_lock_io_nested+0x1900/0x1900 [ 35.237795] ? vsnprintf+0x1ed/0x1900 [ 35.241569] ? pointer+0x9e0/0x9e0 [ 35.245093] ? vprintk_default+0x28/0x30 [ 35.249126] ? vprintk_func+0x5e/0xc0 [ 35.252898] ? printk+0xaa/0xca [ 35.256147] ? show_regs_print_info+0x18/0x18 [ 35.260615] ? textify_hooks.constprop.11+0x12b/0x140 [ 35.265777] lock_acquire+0x1d5/0x580 [ 35.269550] ? lock_acquire+0x1d5/0x580 [ 35.273495] ? del_timer_sync+0x84/0x240 [ 35.277529] ? lock_release+0xa40/0xa40 [ 35.281475] ? mutex_unlock+0xd/0x10 [ 35.285166] del_timer_sync+0xba/0x240 [ 35.289024] ? del_timer_sync+0x84/0x240 [ 35.293057] led_tg_destroy+0x2dd/0x3f0 [ 35.297001] ? hmark_tg_v4+0xfa0/0xfa0 [ 35.300876] ? do_add_counters+0x560/0x560 [ 35.305084] ? hmark_tg_v4+0xfa0/0xfa0 [ 35.308942] cleanup_entry+0x242/0x380 [ 35.312800] ? cleanup_match+0x220/0x220 [ 35.316833] ? trace_hardirqs_on_caller+0x51a/0x5c0 [ 35.321822] translate_table+0x1009/0x1690 [ 35.326035] ? alloc_counters.isra.10+0x7e0/0x7e0 [ 35.330850] ? kasan_check_write+0x14/0x20 [ 35.335061] ? _copy_from_user+0x99/0x110 [ 35.339181] do_ip6t_set_ctl+0x370/0x5f0 [ 35.343214] ? translate_compat_table+0x1c50/0x1c50 [ 35.348205] ? mutex_unlock+0xd/0x10 [ 35.351890] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 35.357137] nf_setsockopt+0x67/0xc0 [ 35.360824] ipv6_setsockopt+0x10b/0x130 [ 35.364857] tcp_setsockopt+0x82/0xd0 [ 35.368632] sock_common_setsockopt+0x95/0xd0 [ 35.373104] SyS_setsockopt+0x189/0x360 [ 35.377051] ? SyS_recv+0x40/0x40 [ 35.380479] ? move_addr_to_kernel+0x60/0x60 [ 35.384863] ? do_syscall_64+0xb6/0x940 [ 35.388812] ? SyS_recv+0x40/0x40 [ 35.392238] do_syscall_64+0x280/0x940 [ 35.396099] ? __do_page_fault+0xc90/0xc90 [ 35.400307] ? finish_task_switch+0x1c0/0x860 [ 35.404774] ? finish_task_switch+0x181/0x860 [ 35.409242] ? syscall_return_slowpath+0x550/0x550 [ 35.414142] ? syscall_return_slowpath+0x2ac/0x550 [ 35.419046] ? prepare_exit_to_usermode+0x350/0x350 [ 35.424035] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 35.429372] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 35.434190] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 35.439350] RIP: 0033:0x453da9 [ 35.442514] RSP: 002b:00007f27c5041c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 35.450193] RAX: ffffffffffffffda RBX: 00007f27c50426d4 RCX: 0000000000453da9 [ 35.457437] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000014 [ 35.464681] RBP: 000000000072bea0 R08: 0000000000000600 R09: 0000000000000000 [ 35.471922] R10: 0000000020000000 R11: 0000000000000246 R12: 00000000ffffffff [ 35.479164] R13: 00000000000004d5 R14: 00000000006f7498 R15: 0000000000000000 [ 35.486872] ------------[ cut here ]------------ [ 35.491653] ODEBUG: assert_init not available (active state 0) object type: timer_list hint: (null) [ 35.501822] WARNING: CPU: 1 PID: 5252 at lib/debugobjects.c:291 debug_print_object+0x166/0x220 [ 35.505059] audit: type=1400 audit(1519087780.732:14): avc: denied { net_raw } for pid=5270 comm="syz-executor3" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 35.510555] Kernel panic - not syncing: panic_on_warn set ... [ 35.510555] [ 35.510564] CPU: 1 PID: 5252 Comm: syz-executor0 Not tainted 4.16.0-rc2+ #320 [ 35.510568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.510571] Call Trace: [ 35.510585] dump_stack+0x194/0x257 [ 35.510600] ? arch_local_irq_restore+0x53/0x53 [ 35.534739] audit: type=1400 audit(1519087780.732:15): avc: denied { dac_override } for pid=5262 comm="syz-executor2" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 35.542035] ? vsnprintf+0x1ed/0x1900 [ 35.542048] panic+0x1e4/0x41c [ 35.568760] audit: type=1400 audit(1519087780.747:16): avc: denied { map_create } for pid=5267 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 35.569435] ? refcount_error_report+0x214/0x214 [ 35.569443] ? show_regs_print_info+0x18/0x18 [ 35.569456] ? __warn+0x1c1/0x200 [ 35.593954] audit: type=1400 audit(1519087780.747:17): avc: denied { map_read map_write } for pid=5267 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 35.597674] ? debug_print_object+0x166/0x220 [ 35.597682] __warn+0x1dc/0x200 [ 35.666722] ? debug_print_object+0x166/0x220 [ 35.671192] report_bug+0x211/0x2d0 [ 35.674798] fixup_bug.part.11+0x37/0x80 [ 35.678829] do_error_trap+0x2d7/0x3e0 [ 35.682690] ? vprintk_default+0x28/0x30 [ 35.686723] ? math_error+0x400/0x400 [ 35.690495] ? printk+0xaa/0xca [ 35.693747] ? show_regs_print_info+0x18/0x18 [ 35.698220] ? __internal_add_timer+0x2d0/0x2d0 [ 35.702863] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 35.707680] do_invalid_op+0x1b/0x20 [ 35.711366] invalid_op+0x58/0x80 [ 35.714794] RIP: 0010:debug_print_object+0x166/0x220 [ 35.719868] RSP: 0018:ffff8801d02f7650 EFLAGS: 00010286 [ 35.725215] RAX: dffffc0000000008 RBX: 0000000000000005 RCX: ffffffff815abdbe [ 35.732457] RDX: 0000000000010000 RSI: ffffc90002bae000 RDI: 1ffff1003a05ee4f [ 35.739701] RBP: ffff8801d02f7690 R08: 0000000000000000 R09: 1ffff1003a05ee21 [ 35.746943] R10: ffff8801d02f7550 R11: ffffffff86b394b8 R12: 0000000000000001 [ 35.754193] R13: ffffffff86b4ad20 R14: ffffffff86007e20 R15: ffffffff815fe820 [ 35.761439] ? __internal_add_timer+0x2d0/0x2d0 [ 35.766083] ? vprintk_func+0x5e/0xc0 [ 35.769864] debug_object_assert_init+0x303/0x570 [ 35.774681] ? debug_object_free+0x5a0/0x5a0 [ 35.779067] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 35.783802] try_to_del_timer_sync+0x74/0x130 [ 35.788268] ? try_to_del_timer_sync+0x74/0x130 [ 35.792911] ? del_timer+0x140/0x140 [ 35.796600] ? del_timer_sync+0x120/0x240 [ 35.800722] del_timer_sync+0x18a/0x240 [ 35.804673] led_tg_destroy+0x2dd/0x3f0 [ 35.808619] ? hmark_tg_v4+0xfa0/0xfa0 [ 35.812484] ? do_add_counters+0x560/0x560 [ 35.816693] ? hmark_tg_v4+0xfa0/0xfa0 [ 35.820551] cleanup_entry+0x242/0x380 [ 35.824411] ? cleanup_match+0x220/0x220 [ 35.828445] ? trace_hardirqs_on_caller+0x51a/0x5c0 [ 35.833436] translate_table+0x1009/0x1690 [ 35.837658] ? alloc_counters.isra.10+0x7e0/0x7e0 [ 35.842478] ? kasan_check_write+0x14/0x20 [ 35.846686] ? _copy_from_user+0x99/0x110 [ 35.850809] do_ip6t_set_ctl+0x370/0x5f0 [ 35.854847] ? translate_compat_table+0x1c50/0x1c50 [ 35.859845] ? mutex_unlock+0xd/0x10 [ 35.863533] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 35.868784] nf_setsockopt+0x67/0xc0 [ 35.872473] ipv6_setsockopt+0x10b/0x130 [ 35.876512] tcp_setsockopt+0x82/0xd0 [ 35.880291] sock_common_setsockopt+0x95/0xd0 [ 35.884763] SyS_setsockopt+0x189/0x360 [ 35.888716] ? SyS_recv+0x40/0x40 [ 35.892149] ? move_addr_to_kernel+0x60/0x60 [ 35.896531] ? do_syscall_64+0xb6/0x940 [ 35.900478] ? SyS_recv+0x40/0x40 [ 35.903903] do_syscall_64+0x280/0x940 [ 35.907764] ? __do_page_fault+0xc90/0xc90 [ 35.911970] ? finish_task_switch+0x1c0/0x860 [ 35.916439] ? finish_task_switch+0x181/0x860 [ 35.920911] ? syscall_return_slowpath+0x550/0x550 [ 35.925816] ? syscall_return_slowpath+0x2ac/0x550 [ 35.930718] ? prepare_exit_to_usermode+0x350/0x350 [ 35.935708] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 35.941050] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 35.945868] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 35.951031] RIP: 0033:0x453da9 [ 35.954195] RSP: 002b:00007f27c5041c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 35.961877] RAX: ffffffffffffffda RBX: 00007f27c50426d4 RCX: 0000000000453da9 [ 35.969120] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000014 [ 35.976365] RBP: 000000000072bea0 R08: 0000000000000600 R09: 0000000000000000 [ 35.983608] R10: 0000000020000000 R11: 0000000000000246 R12: 00000000ffffffff [ 35.990854] R13: 00000000000004d5 R14: 00000000006f7498 R15: 0000000000000000 [ 35.998567] Dumping ftrace buffer: [ 36.002085] (ftrace buffer empty) [ 36.005764] Kernel Offset: disabled [ 36.009358] Rebooting in 86400 seconds..