[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [ 12.952875] audit: type=1400 audit(1513658385.426:6): avc: denied { map } for pid=3135 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added 'ci-upstream-mmots-kasan-gce-5,10.128.0.31' (ECDSA) to the list of known hosts. 2017/12/19 04:39:51 fuzzer started syzkaller login: [ 19.186074] audit: type=1400 audit(1513658391.659:7): avc: denied { map } for pid=3146 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2017/12/19 04:39:51 dialing manager at 10.128.0.26:32873 2017/12/19 04:39:54 kcov=true, comps=true [ 22.121238] audit: type=1400 audit(1513658394.594:8): avc: denied { map } for pid=3146 comm="syz-fuzzer" path="/sys/kernel/debug/kcov" dev="debugfs" ino=8857 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2017/12/19 04:39:55 executing program 7: mmap(&(0x7f0000000000/0xf6a000)=nil, 0xf6a000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000f6a000-0xc)={@multicast1=0xe0000001, @loopback=0x7f000001, @empty=0x0}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000c12000-0xc)={@multicast2=0xe0000002, @loopback=0x7f000001, @broadcast=0xffffffff}, 0xc) 2017/12/19 04:39:55 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001000-0x78)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x666, 0x0, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2017/12/19 04:39:55 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0x19980330, 0x0}, &(0x7f0000002000-0x18)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = syz_open_procfs(0x0, &(0x7f0000001000-0x7)='ns/pid\x00') setns(r0, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000ee2000-0x20)={0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0}, &(0x7f0000b4d000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_open_dev$mice(&(0x7f00004c5000-0x10)='/dev/input/mice\x00', 0x0, 0x0) 2017/12/19 04:39:55 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) capset(&(0x7f00000fc000)={0x19980330, 0x0}, &(0x7f0000244000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000012000-0x10)=[{&(0x7f0000011000)=[{0x10, 0x0, 0x0, 0x0, 0x0, ""}], 0x10}], 0x1, &(0x7f0000007000)=[], 0x0, 0x0}, 0x0) 2017/12/19 04:39:55 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000d8000-0x78)={0x2, 0x78, 0xc2d, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000a70000)={0x0, {{0x2, 0x0, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, []}, 0x98) 2017/12/19 04:39:55 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8983, &(0x7f0000438000-0x28)={@generic="000000060064c42361e29403a14e1af2", @ifru_settings={0x0, 0x0, @fr_pvc_info=&(0x7f0000006000)={0x0, @common='sit0\x00'}}}) 2017/12/19 04:39:55 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) poll(&(0x7f0000c16000-0x40)=[{r0, 0x0, 0x0}], 0x1, 0x0) 2017/12/19 04:39:55 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000522000)=0x0) r1 = syz_open_procfs(r0, &(0x7f000086e000)='maps\x00') r2 = memfd_create(&(0x7f0000002000+0x901)='dev ', 0x0) sendfile(r2, r1, &(0x7f00002fe000-0x8)=0x0, 0xfffffffffffffbff) [ 23.281909] audit: type=1400 audit(1513658395.755:9): avc: denied { map } for pid=3146 comm="syz-fuzzer" path="/root/syzkaller-shm853274522" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 24.468183] audit: type=1400 audit(1513658396.940:10): avc: denied { sys_admin } for pid=3190 comm="syz-executor4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 24.616076] audit: type=1400 audit(1513658397.089:11): avc: denied { sys_chroot } for pid=3371 comm="syz-executor4" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 24.651168] capability: warning: `syz-executor4' uses 32-bit capabilities (legacy support in use) 2017/12/19 04:39:57 executing program 4: mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x4d072, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000778000/0x1000)=nil, 0x1000, 0x4000, 0x0, &(0x7f0000898000/0x4000)=nil) [ 24.663722] audit: type=1400 audit(1513658397.118:12): avc: denied { create } for pid=3392 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 24.692312] audit: type=1400 audit(1513658397.125:13): avc: denied { write } for pid=3392 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 2017/12/19 04:39:57 executing program 4: 2017/12/19 04:39:57 executing program 5: 2017/12/19 04:39:57 executing program 7: 2017/12/19 04:39:57 executing program 4: [ 24.718400] audit: type=1400 audit(1513658397.125:14): avc: denied { net_admin } for pid=3392 comm="syz-executor4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2017/12/19 04:39:57 executing program 5: 2017/12/19 04:39:57 executing program 4: 2017/12/19 04:39:57 executing program 7: 2017/12/19 04:39:57 executing program 5: [ 24.813145] audit: type=1400 audit(1513658397.222:15): avc: denied { map } for pid=3401 comm="syz-executor4" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=11727 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 2017/12/19 04:39:57 executing program 3: 2017/12/19 04:39:57 executing program 7: 2017/12/19 04:39:57 executing program 4: 2017/12/19 04:39:57 executing program 6: 2017/12/19 04:39:57 executing program 2: 2017/12/19 04:39:57 executing program 5: 2017/12/19 04:39:57 executing program 3: 2017/12/19 04:39:57 executing program 0: 2017/12/19 04:39:57 executing program 1: 2017/12/19 04:39:57 executing program 4: [ 24.841697] audit: type=1400 audit(1513658397.252:16): avc: denied { dac_override } for pid=3412 comm="syz-executor6" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2017/12/19 04:39:57 executing program 0: 2017/12/19 04:39:57 executing program 1: 2017/12/19 04:39:57 executing program 2: 2017/12/19 04:39:57 executing program 5: 2017/12/19 04:39:57 executing program 6: 2017/12/19 04:39:57 executing program 4: 2017/12/19 04:39:57 executing program 0: 2017/12/19 04:39:57 executing program 7: 2017/12/19 04:39:57 executing program 6: 2017/12/19 04:39:57 executing program 5: 2017/12/19 04:39:57 executing program 2: 2017/12/19 04:39:57 executing program 3: 2017/12/19 04:39:57 executing program 4: 2017/12/19 04:39:57 executing program 0: 2017/12/19 04:39:57 executing program 7: 2017/12/19 04:39:57 executing program 3: 2017/12/19 04:39:57 executing program 6: 2017/12/19 04:39:57 executing program 1: 2017/12/19 04:39:57 executing program 5: 2017/12/19 04:39:57 executing program 4: 2017/12/19 04:39:57 executing program 0: 2017/12/19 04:39:57 executing program 6: 2017/12/19 04:39:57 executing program 5: 2017/12/19 04:39:57 executing program 2: 2017/12/19 04:39:57 executing program 4: 2017/12/19 04:39:57 executing program 6: 2017/12/19 04:39:57 executing program 7: 2017/12/19 04:39:57 executing program 3: 2017/12/19 04:39:57 executing program 5: 2017/12/19 04:39:57 executing program 1: 2017/12/19 04:39:57 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f00004c5000-0x10)='/dev/input/mice\x00', 0x0, 0x0) unshare(0x400) mq_timedreceive(r0, &(0x7f0000298000-0x1a)=""/26, 0x1a, 0x0, &(0x7f00003fc000+0x863)={0x0, 0x0}) 2017/12/19 04:39:57 executing program 4: 2017/12/19 04:39:57 executing program 3: 2017/12/19 04:39:57 executing program 5: 2017/12/19 04:39:57 executing program 7: 2017/12/19 04:39:57 executing program 6: 2017/12/19 04:39:57 executing program 2: 2017/12/19 04:39:57 executing program 1: 2017/12/19 04:39:57 executing program 4: 2017/12/19 04:39:57 executing program 7: 2017/12/19 04:39:57 executing program 5: 2017/12/19 04:39:57 executing program 4: 2017/12/19 04:39:57 executing program 5: 2017/12/19 04:39:57 executing program 7: 2017/12/19 04:39:57 executing program 4: 2017/12/19 04:39:57 executing program 6: 2017/12/19 04:39:57 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000371000-0x7)=0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f000070b000)={0x0, 0x7530}, 0x10) r1 = dup(r0) ioctl$TCGETA(r1, 0x5405, &(0x7f00004a2000-0x14)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f0000001000-0x4)=0x400000081, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x19, &(0x7f0000001000-0x4)=0x4, 0x4) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000f08000)=""/82) bind$inet6(r0, &(0x7f0000001000-0x1c)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}, 0x0}, 0x1c) sendto$inet6(r0, &(0x7f0000e78000-0x1)="", 0x0, 0x20000004, &(0x7f00008d5000-0x1c)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}, 0x0}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000b3d000)=0x8, 0x4) sendto$inet6(r0, &(0x7f0000001000)="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", 0x284, 0x100000000031, 0x0, 0x0) 2017/12/19 04:39:57 executing program 3: 2017/12/19 04:39:57 executing program 2: mmap(&(0x7f0000000000/0x9d7000)=nil, 0x9d7000, 0x0, 0x4d072, 0xffffffffffffffff, 0x0) madvise(&(0x7f000010b000/0x1000)=nil, 0x1000, 0xf) 2017/12/19 04:39:57 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f00001a6000-0xd)='/dev/net/tun\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000b78000)=0x2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000a5b000-0x28)={@generic="44e353c3c5b1422832b89ef9a9351d22", @ifru_names=@generic="4f54000cc0a1ed4f3a0a1fdc222073b5"}) 2017/12/19 04:39:57 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x2e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000c82000-0x8)={0x2, 0x0}) fcntl$getown(r0, 0x9) 2017/12/19 04:39:57 executing program 5: shmctl$SHM_INFO(0x0, 0xe, &(0x7f00004fd000)=""/90) 2017/12/19 04:39:57 executing program 7: mmap(&(0x7f0000000000/0xf08000)=nil, 0xf08000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) bind(r0, &(0x7f0000f01000-0x80)=@generic={0xa, "38af356a916dff0bf2594d76262c2881eb8245a4030000000000000000035c3aae3085c032a4113e98b9f2e35dc3c57d942eecfe0c9e4e8e7cd3c0bffe6316b17f00000003a3e226dfe8aaf2abc6d205000000000bd2a66642c9d6ada110172f02e7e3f125477afd1f9e9fd12fbb38b55676b7a9451970a973e6e3b65d10"}, 0x80) 2017/12/19 04:39:57 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f000011d000-0xa)='net/igmp6\x00') r1 = memfd_create(&(0x7f0000002000+0x901)='dev ', 0x0) sendfile(r1, r0, &(0x7f00002fe000-0x8)=0x0, 0xfec) 2017/12/19 04:39:57 executing program 3: mmap(&(0x7f0000000000/0xafa000)=nil, 0xafa000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000afa000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000afa000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000afa000)='/dev/kvm\x00', 0x4000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f00007c9000-0xc)={0x4, 0xffffffffffffffff, 0x1}) mmap(&(0x7f0000afb000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000afc000-0x10)={0xc0000000000000, 0x4f15c0aa, 0x401, 0x0}) [ 25.109590] [ 25.111256] ============================================ [ 25.116686] WARNING: possible recursive locking detected [ 25.122108] 4.15.0-rc2-mm1+ #39 Not tainted [ 25.126393] -------------------------------------------- [ 25.131810] syz-executor1/3496 is trying to acquire lock: [ 25.137310] (rtnl_mutex){+.+.}, at: [<00000000850be3dd>] rtnl_lock+0x17/0x20 [ 25.144560] [ 25.144560] but task is already holding lock: [ 25.150497] (rtnl_mutex){+.+.}, at: [<00000000850be3dd>] rtnl_lock+0x17/0x20 [ 25.157751] [ 25.157751] other info that might help us debug this: [ 25.164381] Possible unsafe locking scenario: [ 25.164381] [ 25.170403] CPU0 [ 25.172959] ---- [ 25.175507] lock(rtnl_mutex); [ 25.178751] lock(rtnl_mutex); [ 25.181997] [ 25.181997] *** DEADLOCK *** [ 25.181997] [ 25.188026] May be due to missing lock nesting notation [ 25.188026] [ 25.194920] 1 lock held by syz-executor1/3496: [ 25.199465] #0: (rtnl_mutex){+.+.}, at: [<00000000850be3dd>] rtnl_lock+0x17/0x20 [ 25.207151] [ 25.207151] stack backtrace: [ 25.211618] CPU: 0 PID: 3496 Comm: syz-executor1 Not tainted 4.15.0-rc2-mm1+ #39 [ 25.219118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 25.228437] Call Trace: [ 25.230998] dump_stack+0x194/0x257 [ 25.234597] ? arch_local_irq_restore+0x53/0x53 [ 25.239236] __lock_acquire+0x11cf/0x47f0 [ 25.243350] ? __unwind_start+0x169/0x330 [ 25.247473] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 25.252630] ? save_stack_trace+0x1a/0x20 [ 25.256748] ? perf_trace_run_bpf_submit+0x206/0x330 [ 25.261818] ? trace_event_raw_event_lock+0x340/0x340 [ 25.266977] ? perf_trace_run_bpf_submit+0x206/0x330 [ 25.272048] ? perf_trace_run_bpf_submit+0x20d/0x330 [ 25.277119] ? memset+0x31/0x40 [ 25.280371] ? perf_tp_event+0xae0/0xae0 [ 25.284402] ? perf_trace_lock_acquire+0xe3/0x980 [ 25.289215] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 25.294374] ? perf_trace_lock+0x4d6/0x900 [ 25.298577] ? check_noncircular+0x20/0x20 [ 25.302781] ? trace_event_raw_event_lock+0x340/0x340 [ 25.307940] ? check_noncircular+0x20/0x20 [ 25.312143] ? perf_trace_lock+0x900/0x900 [ 25.316349] lock_acquire+0x1d5/0x580 [ 25.320120] ? rtnl_lock+0x17/0x20 [ 25.323630] ? lock_release+0xda0/0xda0 [ 25.327576] ? rcu_note_context_switch+0x710/0x710 [ 25.332474] ? __might_sleep+0x95/0x190 [ 25.336416] ? rtnl_lock+0x17/0x20 [ 25.339927] __mutex_lock+0x16f/0x1a80 [ 25.343782] ? rtnl_lock+0x17/0x20 [ 25.347291] ? lock_release+0xda0/0xda0 [ 25.351232] ? rtnl_lock+0x17/0x20 [ 25.354765] ? mutex_lock_io_nested+0x1900/0x1900 [ 25.359578] ? unwind_get_return_address+0x61/0xa0 [ 25.364475] ? trace_hardirqs_off+0xd/0x10 [ 25.368680] ? _raw_spin_unlock_irqrestore+0xa6/0xba [ 25.374553] ? depot_save_stack+0x2ca/0x460 [ 25.378845] ? selinux_tun_dev_free_security+0x15/0x20 [ 25.384092] ? save_stack+0xa3/0xd0 [ 25.387684] ? save_stack+0x43/0xd0 [ 25.391277] ? kasan_slab_free+0x71/0xc0 [ 25.395306] ? kfree+0xca/0x250 [ 25.398556] ? selinux_tun_dev_free_security+0x15/0x20 [ 25.403799] ? security_tun_dev_free_security+0x48/0x80 [ 25.409133] ? tun_free_netdev+0x153/0x1f0 [ 25.413336] ? register_netdevice+0x97b/0x1010 [ 25.417885] ? __tun_chr_ioctl+0x1ca3/0x3f10 [ 25.422261] ? tun_chr_ioctl+0x2a/0x40 [ 25.426119] ? do_vfs_ioctl+0x1b1/0x1530 [ 25.430157] ? SyS_ioctl+0x8f/0xc0 [ 25.433670] ? entry_SYSCALL_64_fastpath+0x1f/0x96 [ 25.438567] ? find_held_lock+0x39/0x1d0 [ 25.442597] ? check_noncircular+0x20/0x20 [ 25.446799] ? print_usage_bug+0x3f0/0x3f0 [ 25.451006] ? lock_downgrade+0x980/0x980 [ 25.455137] ? tun_flow_flush+0x41/0xe0 [ 25.459084] ? mark_held_locks+0xb2/0x100 [ 25.463199] ? kfree+0xe4/0x250 [ 25.466446] ? selinux_tun_dev_free_security+0x15/0x20 [ 25.471691] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 25.476674] ? trace_hardirqs_on+0xd/0x10 [ 25.480789] mutex_lock_nested+0x16/0x20 [ 25.484817] ? security_tun_dev_free_security+0x67/0x80 [ 25.490147] ? mutex_lock_nested+0x16/0x20 [ 25.494349] rtnl_lock+0x17/0x20 [ 25.497682] tun_free_netdev+0x158/0x1f0 [ 25.501712] ? tun_xdp+0x410/0x410 [ 25.505221] ? tun_detach_all+0xb50/0xb50 [ 25.509339] ? tun_xdp+0x410/0x410 [ 25.512848] register_netdevice+0x97b/0x1010 [ 25.517227] ? netdev_change_features+0x100/0x100 [ 25.522050] ? round_jiffies_up+0xce/0x100 [ 25.526256] ? __round_jiffies_up_relative+0x150/0x150 [ 25.531500] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 25.536400] ? selinux_tun_dev_alloc_security+0x124/0x170 [ 25.541906] __tun_chr_ioctl+0x1ca3/0x3f10 [ 25.546116] ? tun_chr_read_iter+0x1e0/0x1e0 [ 25.550494] ? lock_downgrade+0x980/0x980 [ 25.554610] ? avc_ss_reset+0x110/0x110 [ 25.558553] ? lock_release+0xda0/0xda0 [ 25.562495] ? __lock_is_held+0xbc/0x140 [ 25.566531] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 25.572385] ? SyS_dup+0xb0/0xb0 [ 25.575731] ? tun_chr_compat_ioctl+0x30/0x30 [ 25.580194] tun_chr_ioctl+0x2a/0x40 [ 25.583875] ? tun_chr_ioctl+0x2a/0x40 [ 25.587731] do_vfs_ioctl+0x1b1/0x1530 [ 25.591586] ? _cond_resched+0x14/0x30 [ 25.595443] ? ioctl_preallocate+0x2b0/0x2b0 [ 25.599820] ? selinux_capable+0x40/0x40 [ 25.603853] ? SyS_futex+0x269/0x390 [ 25.607538] ? security_file_ioctl+0x89/0xb0 [ 25.611915] SyS_ioctl+0x8f/0xc0 [ 25.615253] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 25.619980] RIP: 0033:0x452a09 [ 25.623149] RSP: 002b:00007f78f3633c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 [ 25.630824] RAX: ffffffffffffffda RBX: 00007f78f3634700 RCX: 0000000000452a09 [ 25.638062] RDX: 0000000020a5afd8 RSI: 00000000400454ca RDI: 0000000000000013 [ 25.645312] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 25.652561] R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000000 2017/12/19 04:39:58 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe0, 0xffffffffffffffff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00003ed000)=0x0, 0x8000000200000085, 0x0, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000003000-0x4)=0x0, 0x3ffffffd) 2017/12/19 04:39:58 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x400) r0 = timerfd_create(0x8040, 0x80000) clock_gettime(0x0, &(0x7f00005c1000)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f00001ca000-0x20)={{0x0, r1+10000000}, {0x0, 0x989680}}, &(0x7f0000d7f000-0x20)={{0x0, 0x0}, {0x0, 0x0}}) timerfd_gettime(r0, &(0x7f0000fee000)={{0x0, 0x0}, {0x0, 0x0}}) r2 = syz_open_dev$usbmon(&(0x7f000073e000-0xd)='/dev/usbmon#\x00', 0x7, 0xa80) futimesat(r2, &(0x7f00000df000-0x8)='./file0\x00', &(0x7f00001ef000-0x20)={{0x0, 0x0}, {0x0, 0x0}}) 2017/12/19 04:39:58 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00002c2000-0x8)={0x0, 0x0}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000001000-0x9)='/dev/vcs\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000000)=0x0, &(0x7f0000001000-0x4)=0x4) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r2 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ea5000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) r3 = getpgrp(0x0) fcntl$lock(r0, 0x5, &(0x7f0000001000-0x20)={0x1, 0x4, 0x7, 0x7, r3}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000001000-0x50)=[{&(0x7f00005dd000)=""/185, 0xb9}, {&(0x7f0000afd000-0xfa)=""/250, 0xfa}, {&(0x7f0000036000)=""/208, 0xd0}, {&(0x7f0000001000-0x1000)=""/4096, 0x1000}, {&(0x7f0000000000)=""/164, 0xa4}], 0x5) r4 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r5 = epoll_create1(0x0) r6 = openat$cuse(0xffffffffffffff9c, &(0x7f0000b66000)='/dev/cuse\x00', 0xfffffffffffffff9, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f0000db4000-0xc)={0x0, 0x0}) pread64(r4, &(0x7f0000221000)=""/0, 0x0, 0x0) seccomp(0x0, 0x0, &(0x7f00000d1000-0x8)={0x0, &(0x7f00002a4000+0x1ea)=[]}) 2017/12/19 04:39:58 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000031000)='~', 0x1) syz_open_dev$random(&(0x7f0000aaa000-0xc)='/dev/random\x00', 0x0, 0x200000) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000091000-0x8)={0x0, 0x0}) connect(r0, &(0x7f000022c000)=@nl={0x0, 0x0, 0x9, 0x0}, 0xc) time(&(0x7f0000194000+0xf89)=0x0) 2017/12/19 04:39:58 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f000003a000-0x8)={0xfffffffffffffffa}, 0x0, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00002e9000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) pipe(&(0x7f0000033000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TCSETAF(r2, 0x5404, &(0x7f00000bf000)={0x3b, 0x737, 0x4, 0x100000001, 0x1, 0x8, 0x7, 0x7, 0x2, 0x2}) write(r4, &(0x7f0000029000)="90", 0x1) splice(r3, 0x0, r0, 0x0, 0x8526, 0x0) 2017/12/19 04:39:58 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000027000-0x8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)="") mount(&(0x7f00004c7000-0x8)='./file0\x00', &(0x7f0000acc000)='./file0\x00', &(0x7f0000d36000)='ramfs\x00', 0x104000, &(0x7f000000a000)='6') mount(&(0x7f0000c8c000)='./file0\x00', &(0x7f0000d7d000-0x8)='./file0\x00', &(0x7f0000fdb000)='ext4\x00', 0x1000, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000027000-0x8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)="") mount(&(0x7f000052f000)='./file0\x00', &(0x7f00008fd000-0x1)='.', &(0x7f00003a3000-0x6)="0700cc667300", 0x1000, 0x0) mount(&(0x7f0000c6c000-0x8)='./file0\x00', &(0x7f000092f000)='./file0\x00', &(0x7f0000dcd000)='ramfs\x00', 0x8ff8c, &(0x7f000002f000)="") umount2(&(0x7f0000d5c000-0x1)='.', 0x0) r1 = request_key(&(0x7f00006f7000)='user\x00', &(0x7f00002fe000-0x5)={0x73, 0x79, 0x7a, 0x1, 0x0}, &(0x7f0000bbf000-0x5)='ext4\x00', 0xfffffffffffffff9) r2 = add_key$keyring(&(0x7f00009b2000-0x8)='keyring\x00', &(0x7f0000a1c000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$search(0xa, r1, &(0x7f000000f000)='syzkaller\x00', &(0x7f0000ab7000)={0x73, 0x79, 0x7a, 0x3, 0x0}, r2) ioctl$KVM_CREATE_DEVICE(0xffffffffffffff9c, 0xc00caee0, &(0x7f0000a1d000-0xc)={0x3, r0, 0x1}) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f0000244000-0x1a)={0x53, 0xff, 0x5, {0x9, 0x5}, {0x3f, 0x568f}, @const={0x2, {0x3, 0x1, 0xfffffffffffffff9, 0x8}}}) 2017/12/19 04:39:58 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe0, 0xffffffffffffffff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(&(0x7f00003ed000)=0x0, 0x8000000200000085, 0x0, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000003000-0x4)=0x0, 0x3ffffffd) 2017/12/19 04:39:58 executing program 4: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x5, 0x4031, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000005000/0x4000)=nil, 0x4000) clone(0x0, &(0x7f0000b17000)="", &(0x7f0000273000-0x4)=0x0, &(0x7f0000004000)=0x0, &(0x7f0000008000-0x1000)="") mprotect(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x6) mmap(&(0x7f000000b000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f000000b000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mknodat(r0, &(0x7f000000a000)='./file0\x00', 0x1021, 0x9) 2017/12/19 04:39:58 executing program 3: mmap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100201, 0x0}) mmap(&(0x7f0000009000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f000000b000-0x8)={0x0, 0x0}) mmap(&(0x7f000000a000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f000000b000-0xc)={0x0, 0x0, 0x0}, &(0x7f0000007000-0x4)=0xc) ptrace(0x4208, r1) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000003000-0xc)='/dev/rfkill\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) mmap(&(0x7f000000b000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, &(0x7f000000b000)=[@in={0x2, 0x1, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in6={0xa, 0x3, 0xfff, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0x24000000000}], 0x2c) mmap(&(0x7f000000b000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sched_setscheduler(r1, 0x5, &(0x7f000000c000-0x4)=0x6) [ 25.659799] R13: 0000000000a2f7ff R14: 00007f78f36349c0 R15: 0000000000000000 2017/12/19 04:39:58 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x80a, 0x8) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00005c8000-0x9)='/dev/rtc\x00', 0x18000, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000651000)={@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0xea, 0x0, 0x1, 0x3, 0x3, 0x1f, 0x2}, 0x20) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f000060f000)={0x0, @multicast2=0x0, @loopback=0x0}, &(0x7f000013a000)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000869000)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, r2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f000015e000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000ab5000)='net/ptype\x00') getsockopt$inet_tcp_int(r0, 0x6, 0x11, &(0x7f00002df000)=0x0, &(0x7f0000497000)=0x4) sendfile(r0, r4, &(0x7f00003c9000-0x8)=0x1, 0x400000ff) ioctl$KIOCSOUND(r1, 0x4b2f, 0x5) ioctl$KVM_SMI(r3, 0xaeb7) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00004be000-0x8)={0x0, 0xffffffffffffffff}, &(0x7f0000e4b000)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000cc3000)=@sack_info={r5, 0x42ac, 0x9}, &(0x7f00004d2000-0x4)=0xc) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00001e4000-0x4)=0x5, 0x4) getuid() [ 25.725604] syz-executor6 uses obsolete (PF_INET,SOCK_PACKET) [ 25.732784] audit: type=1400 audit(1513658398.206:17): avc: denied { net_raw } for pid=3525 comm="syz-executor6" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1