[....] Starting enhanced syslogd: rsyslogd[ 12.920417] audit: type=1400 audit(1513436190.710:5): avc: denied { syslog } for pid=2991 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 18.114014] audit: type=1400 audit(1513436195.903:6): avc: denied { map } for pid=3130 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added 'ci-upstream-mmots-kasan-gce-9,10.128.0.30' (ECDSA) to the list of known hosts. [ 24.336877] audit: type=1400 audit(1513436202.126:7): avc: denied { map } for pid=3141 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2017/12/16 14:56:42 fuzzer started 2017/12/16 14:56:42 dialing manager at 10.128.0.26:42473 2017/12/16 14:56:51 kcov=true, comps=true [ 33.363984] audit: type=1400 audit(1513436211.153:8): avc: denied { map } for pid=3141 comm="syz-fuzzer" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1038 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2017/12/16 14:56:51 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) creat(&(0x7f00006ac000-0x8)="2e2f66696c653000", 0x20) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000aa5000-0xa)="2f6465762f6375736500", 0x0, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x3, 0x4) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfa7000)=nil, 0xfa7000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000271000)={0x2, 0x78, 0x45, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000002f000-0x78)={0x2, 0x78, 0x46, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000254000)=0x2000080000004) r4 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(r2, 0x4, 0x3ffc) r5 = syz_open_dev$vcsn(&(0x7f000005a000)="2f6465762f7663732300", 0x800, 0x200040) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000000000)=0xb) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000001000-0x24)={0xcfbf, 0xad46, 0x2, 0x6, 0x2, 0x687, 0x8, 0x25b02de0, 0x40, 0xffffffffffffffff, 0x10001, 0xa2fa}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$KDSKBMETA(r5, 0x4b63, &(0x7f0000541000-0x4)=0x1f) r6 = syz_open_procfs(r1, &(0x7f0000144000)="706167656d617000") fadvise64(r6, 0x0, 0x1, 0x7) lseek(r6, 0x0, 0x4) pread64(r6, &(0x7f0000636000-0xfba)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x1000, 0x40000) pwritev(r4, &(0x7f0000b43000)=[{&(0x7f0000096000)="ca671ef8a48b", 0x6}, {&(0x7f0000de6000-0x28)="7766e54b8d05f735726bec9c21e061b68dc9a4fe73cc74d1700acb1f34170c897f3e45c0eb891df4", 0x28}, {&(0x7f0000b30000-0x33)="8b8947bd1384845c5d3b1c03f128892b8cf351b210244e18811c7c967e9ec3a6b591d87ef41c20d7a791d39828779a3362fb86", 0x33}], 0x3, 0x0) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000eb3000)={0x0, 0x0, 0x0, 0x0, 0x8, 0xf, 0x19, 0x4, "6f2aa14592ac70bb34a313d287a9063aa0b09259449274ae2f196cf23a356dc27dc56aa42ee353dbeff72a29837f4e0ce39e7d4c3e77045e13a2ad9a3dbb17f8", "d4aa1baa66448fe4aa15493f60eacdc13fa988014d0ba9a75fd23b35f961bb76", [0x5, 0x1], 0x0}) dup2(r3, r2) 2017/12/16 14:56:51 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x20000000000000) writev(r0, &(0x7f00006ae000)=[{&(0x7f00004d1000)="290000001c0055fcffff00000000ff000200e3f0010b00007400000009000100000e0100aa08000000", 0x29}], 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffff9c, 0xae01, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000ca3000)={0x3, 0xffffffff, 0x6, 0x2, 0x1}) r2 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000e7b000-0x10)="2f73656c696e75782f63726561746500", 0x2, 0x0) recvfrom$ipx(r2, &(0x7f00003db000)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xe0, 0x1, 0x0, 0x0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x41) 2017/12/16 14:56:51 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f000019e000-0xc)={0x0, 0xffffffffffffffff, 0x0}) perf_event_open(&(0x7f0000271000)={0x2, 0x78, 0x45, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000976000)=0x75) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000fb3000-0xc)={0x0, 0x0, 0x0}, &(0x7f0000fb3000-0x4)=0xc) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f000074e000-0x8)=@un=@abs={0x0, 0x0, 0x0}, &(0x7f0000e14000-0x4)=0x8, 0x80800) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000d16000-0x4)=0x0, &(0x7f0000a7b000)=0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000195000-0x10)={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00006d2000-0x4)=0x5, 0x4) pipe(&(0x7f0000be6000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000ffd000-0x80)=[{&(0x7f0000ffd000)="3a", 0x1}], 0x1, 0x0) setsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f00004fb000)=0x7, 0x4) splice(r2, 0x0, r1, 0x0, 0x800000004, 0x1) r4 = socket$inet(0x2, 0x5, 0x0) mmap(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x1, 0x10010, r4, 0x4) mmap(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r4, 0x8917, &(0x7f0000c0a000)={@generic="5d01110405000000000000006d48aa03", @ifru_addrs={0x2, 0x1, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(r4, 0x0, 0x2f, &(0x7f0000a2b000)={0x10000200, {{0x2, 0x3, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, {{0x2, 0x0, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x118) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000f7b000)={{{@in=@loopback=0x0, @in=@loopback=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@multicast1=0x0, 0x0, 0x0}, 0x0, @in=@broadcast=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f0000ffd000)=0xe8) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x7f, &(0x7f0000025000)=0x0, &(0x7f00002f1000-0x4)=0x4) accept4$inet(r4, &(0x7f00005a8000)={0x0, 0x0, @multicast2=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000ae3000-0x4)=0x10, 0x80001) 2017/12/16 14:56:51 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000f7000)="2f73656c696e75782f6d6c7300", 0x0, 0x0) perf_event_open(&(0x7f0000a9c000)={0x2, 0x78, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = syz_open_dev$mice(&(0x7f000013d000-0x10)="2f6465762f696e7075742f6d69636500", 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000579000-0x1c)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x800000000}, 0x1c) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f00004c6000-0xc)={@multicast1=0xe0000001, @loopback=0x7f000001, 0x0}, 0xc) syz_open_procfs(0x0, &(0x7f0000008000-0xd)="6e65742f6d6366696c74657200") readv(r1, &(0x7f00005f9000-0x10)=[{&(0x7f00008a3000)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xa8}, {&(0x7f00005bc000-0xf5)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", 0xf5}], 0x2) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000fdb000-0x4)=0x0) 2017/12/16 14:56:51 executing program 1: r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000ad000+0x107)="2f73656c696e75782f6d656d62657200", 0x2, 0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000445000-0x28)={0x5, 0x7, 0x2, 0xffffffffffffff57, 0x80}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000790000-0xa)="2f6465762f7663732300", 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f00007f0000)="2e2f66696c653000", 0x44c00, 0x41) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f000083a000)=0x0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000040fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00002b7000)="5c2b262d7d2d00") perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x8000000003e5, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xf72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x100, 0x4, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000adb000)={0x0, 0x0}) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$mouse(&(0x7f000049d000)="2f6465762f696e7075742f6d6f7573652300", 0x1fc, 0x202) mkdir(&(0x7f0000ccd000)="2e2f66696c653000", 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000e47000)="2f6465762f766373612300", 0x400, 0xaa94506ca78453d) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000001000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_flags=0x302}) creat(&(0x7f0000f2e000)="2e2f66696c653000", 0x90) r4 = syz_open_dev$tun(&(0x7f0000ef5000)="2f6465762f6e65742f74756e00", 0x0, 0x2) ioctl$TUNSETIFINDEX(r4, 0x400454da, &(0x7f00002ca000)=0x1) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000f58000)={@generic="431df1f38e6f0000112f640000000726", @ifru_addrs=@rc={0x1f, {0x0, 0x0, 0x0, 0xffffffffffffffed, 0xfffffffffffffffd, 0x0}, 0x3}}) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r5, 0x29, 0x16, &(0x7f0000d25000-0x1)="6f", 0x1) fcntl$getownex(r5, 0x10, &(0x7f0000548000-0x8)={0x0, 0x0}) perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x246c0dc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, r6, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tun(&(0x7f00005c9000-0xd)="2f6465762f6e65742f74756e00", 0x0, 0x0) mmap(&(0x7f0000000000/0x177000)=nil, 0x177000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000001000)={0x0, 0x0, &(0x7f0000004000-0x10)={&(0x7f0000002000-0x1b0)={0x2, 0xd, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, [@sadb_x_policy={0x4, 0x12, 0x0, 0x1, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, @sadb_address={0x3, 0x6, 0x80, 0x6, 0x0, @in={0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @sadb_sa={0x2, 0x1, 0x2, 0x8, 0x420, 0x89, 0x3, 0x0}, @sadb_spirange={0x2, 0x10, 0x7, 0x1, 0x0}, @sadb_address={0x3, 0x5, 0x5, 0x7, 0x0, @in={0x2, 0x1, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, @sadb_x_sec_ctx={0x18, 0x18, 0x5, 0x0, 0xb2, "df96770246254d3d89e5f133a6f479f3baf1ab24a37aec74ff26f035efc4f126230d9b219bede1547a1bbdd1e5b4b82d33721761fd71d224dc8d36bde366c1493901fe32fca2544743b6ba4f98f5e5a1dbd31583a7e400874abb893858b54124cd117e05b4b7bd3c4d1b958883b8a189908dd9663ba233fdc9bc32afd656eb865eac85204f6283bd1553fca4d0ccd8e3835e7bc694ec3f2b8892d752ae883f23bf734c4b8968c33373214e39abeda5eb987f"}]}, 0x140}, 0x1, 0x0, 0x0, 0x0}, 0x48000) mmap(&(0x7f0000177000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000383000)="2f73656c696e75782f72656c6162656c00", 0x2, 0x0) mmap(&(0x7f0000177000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) 2017/12/16 14:56:51 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f000028f000)="2f6465762f73657175656e63657200", 0x2, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000613000)=0x400, 0x4) r1 = open(&(0x7f0000784000)="2e2f66696c653000", 0x0, 0x4) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000b2a000-0x4)=0x0, 0x4) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000a8e000-0x8)=@assoc_value={0x0, 0x100000001}, &(0x7f0000dbe000-0x4)=0x8) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000001000-0x42)={0x0, @in6={{0xa, 0x1, 0x8, @loopback={0x0, 0x1}, 0x740c}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x2, 0x6, 0x2, 0xd3, 0x767, 0x40, 0x2, 0x8, 0x0, 0x2, 0xffffffffffff37b9, 0x0, 0x3f, 0xca58, 0x3ff]}, &(0x7f000040a000)=0x108) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sendmsg$inet_sctp(r1, &(0x7f00002a1000-0x38)={&(0x7f0000556000-0x1c)=@in6={0xa, 0x2, 0x9, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x3}, 0x1c, &(0x7f0000001000-0x10)=[{&(0x7f0000311000)="fd0e4abfc2e136ddf43a0a193a9bc7824356de136d34c4af97f98655cf6148c6a9888767256b7ac19de09a89f33d47e7c5547dc67eb861b57a", 0x39}], 0x1, &(0x7f0000001000-0xc0)=[@init={0x18, 0x84, 0x0, {0x5, 0x40004, 0x5, 0xfff}}, @sndinfo={0x20, 0x84, 0x2, {0x1, 0x4, 0x4, 0x100, r3}}, @init={0x18, 0x84, 0x0, {0x2f09, 0x4, 0xfff, 0xffff}}, @sndinfo={0x20, 0x84, 0x2, {0x80, 0x0, 0x8, 0x8, r3}}], 0xc0, 0x800}, 0x14) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0xa, 0xeffffffffffffffd) ioctl$DRM_IOCTL_SET_MASTER(r1, 0x641e) r5 = open(&(0x7f000087c000-0x8)="2e2f66696c653000", 0x400040000, 0x18) r6 = dup3(r5, r4, 0x80000) ioctl$sock_ifreq(r4, 0x8922, &(0x7f0000dc4000)={@common="6c6f0000000000000000000000000000", @ifru_settings={0x4d, 0x0, @sync=&(0x7f0000869000)={0x0, 0x0, 0x0}}}) mknod(&(0x7f0000001000-0x6)="2e2f62757300", 0x1000, 0x0) ioctl$EVIOCGABS3F(r6, 0x8018457f, &(0x7f0000460000)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000") pipe(&(0x7f0000036000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = creat(&(0x7f0000ccb000)="2e2f62757300", 0x0) r9 = open(&(0x7f0000043000)="2e2f62757300", 0x0, 0x10) ioctl$DRM_IOCTL_CONTROL(r5, 0x40086414, &(0x7f0000d0c000)={0x3, 0x402}) dup3(r4, r9, 0x80000) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00003bb000)={@remote={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0}, &(0x7f0000659000)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000125000)={0x8001, 0x1, 0x2, 0x7, r2}, &(0x7f0000fc9000-0x4)=0x10) r10 = dup3(r8, r7, 0x80000) r11 = epoll_create(0x2) epoll_ctl$EPOLL_CTL_ADD(r11, 0x1, r7, &(0x7f00003d7000-0xc)={0x0, 0x0}) open(&(0x7f0000793000)="2e2f62757300", 0x100, 0x1) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r10, 0x84, 0x1b, &(0x7f0000149000)={r3, 0x9c, "c7a9ea4714f3eb99ff3126f17a44f01fa1d9240385beb549661215d89f9109d7b3adbf328e0eff7b1e2d813cb98538acdceae959c1d3c02e0f138fb3fe275c6cb24baa99f73ac5a5ad9014dc0ce861d45c2d0fcae574154403681f437df901b5efeced0cd5736c4a7212d699b2709f7a648b1b4c3a00535c2c6d768fa13736556e4c6da9fbed169b5a286cb85118555baf81b4140894be6ac42ad4a6"}, &(0x7f0000951000-0x4)=0xa4) 2017/12/16 14:56:51 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000015d000-0x78)={0x2, 0x78, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x402, r0) bind$inet6(r1, &(0x7f0000291000)={0xa, 0x2, 0x40, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x3}, 0x1c) sendto$inet6(r1, &(0x7f0000f62000-0x68)="ea31e340db06dbe58e39f3377a30e3188a8d76f29b498200048fc92533ff0f000000000000acc917060eb9359493def0f6f6f1818069736d6114bc7f7df1a5a57d0848961fb11100c0cfc269c7ee32d94e670d980700fcc16afdcd7ddc61a9f5ec508234033c463e", 0x68, 0x4008805, &(0x7f00007ad000)={0xa, 0x2, 0x7ffd, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x6a}, 0x1c) connect$inet(r2, &(0x7f00008db000-0x10)={0x2, 0x3, @local={0xac, 0x14, 0x0, 0xaa}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) gettid() mmap(&(0x7f0000000000/0xff3000)=nil, 0xff3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff3000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfb0000)=nil, 0xfb0000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x11f, &(0x7f000030d000)={@random="1442be99873c", @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [], {{0x0, @ipv6={0x0, 0x6, "deceaf", 0xe9, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @dccp={{0x1, 0x3, 0x4, 0x1, 0x4, 0x0, 0x0, 0x1, 0x9d, "62b7fd", 0xffffffffffffff00, "9ca7d9"}, "519ae2bb583a63f94ad5502fc28db1c3f91b49c8aa05e8796a1bf8a81de12fcbb50feca5c7c25659371c7ce9e6c729729388af73d5becedf08ff222958074ac26f4460268e362cfbf273732d1f966009878468e59ddfec59f863033cbb059c1cf52c9a14b6f70195759984f373625a0bb25fe59fcc9d5c7320245dba330146db06c3d56bf7a8744b8f73ad8d0b12717b6cfd7419004985fe1bdd4ff12e6c9cbd5c1b840aeecb183bfd0328a4ceed4cc1da2626191ba77105612c19b432296ede3074a226bdcae1d8dad77b197823343861efeb6a617b1c5d75"}}}}}}, 0x0) socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000dc0000-0x8)={0x3, &(0x7f0000e3e000-0x18)=[{0x0, 0x4, 0xd40, 0x3d0000001}, {0x1, 0x0, 0x7, 0xfffffffffffff020}, {0x200000008000005, 0x10000, 0x3f, 0x80000000000002}]}, 0x8) bind$inet6(r1, &(0x7f0000c04000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}, 0x9}, 0x1c) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f00006a7000)={0xa, 0x2, 0x5, @loopback={0x0, 0x1}, 0x2}, 0x1c) connect$inet6(r1, &(0x7f0000243000)={0xa, 0x2, 0xfbfffffffffffffd, @loopback={0x0, 0x1}, 0x8000000000003}, 0x1c) syz_extract_tcp_res(&(0x7f0000e90000-0x8)={0x0, 0x0}, 0x0, 0x4a3c) syz_extract_tcp_res(&(0x7f0000a6f000-0x8)={0x0, 0x0}, 0x1ff, 0x2a) syz_emit_ethernet(0xa3, &(0x7f0000b03000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="9866fdfbd6c8", [{[], {0x8100, 0x8000200, 0x800000000000, 0x0}}], {{0x86dd, @ipv6={0x2, 0x6, "f1806c", 0x69, 0x11, 0x3, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, {[], @tcp={{0x0, 0x1, r4, r5, 0x4600274f, 0x0, 0xb, 0xc2, 0xad, 0x0, 0x0, {[@mss={0x2, 0x4, 0x0}, @nop={0x1}, @generic={0xfe, 0x10, "cc88188f249080ea36e74ff4ccbf"}]}}, {"82d60074f46d107f8fd6688a4ceff03c5f2099be954b0a9a8d6f94dccae4b394784a0cf793563fbfb6b54eabf0a3517c8d793b476c708b9e14c7d507e1"}}}}}}}, 0x0) mmap(&(0x7f0000ff4000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff4000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ff4000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000ff4000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_flags=0x6800}) r6 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r6, &(0x7f0000de4000)={0x2, 0x2, @local={0xac, 0x14, 0x0, 0xaa}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) syz_emit_ethernet(0x427, &(0x7f0000dd3000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, @random="7c02aa24bfdb", [], {{0x800, @ipv4={{0x6, 0x4, 0x0, 0x0, 0x419, 0x0, 0x10000, 0x0, 0x14, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, @multicast2=0xe0000002, {[@end={0x0}]}}, @dccp={{0x0, 0x2, 0x4, 0x1, 0x101, 0x0, 0x0, 0x0, 0x0, "d7cc2d", 0xbc, "140000"}, "0e07405a92885dab91772c391b212e2d725ec2118751679cb77e825e65ee61cfa974c80b5c597c18fd7a1f6ec0bc4854088ee403d4555c7568ffb5a44c9c2ec198f0e0e1bba8dc88eb726e18770ea5283c58aaec4b019cb319a5467cb19414f069907963028363eee8c2e554e8f98f06a4627ec0565d11054bf097efb382daaa61972fce775c5dea219931534d906260a5ec6ce641b19765a0e9cf9e38ae1d027eef945676eff181c9252b59f533bab72c375579abbfd3c2b6bded524f8ee9ecdb5b4b9ef2c807a0cdde048d318677107306d2df2127fb72b452f2012646a96cf868b65d60ec2d2c0993bbe47dec0d96598691fe5b834ba74a2723272be323cd0e08abc2125759d4b49cd46b4afae9745a98fcb99df39fb1445cd95d5ccafcade6ae10e366608bceb246bf76e7011336ec81468b4f272e25bd292c48afa66412aa4ee4bc02e7a2affdd78bcdd4bf595a0cabd82e19eeffbbd8dc9f8bbd0ce0622696f0fa442f009c44c26446e9b875090a8245269aaee66eca855550a503b5271b7d76f9267923474df2954ffda27780c02f732255f75782083ac127f175808932b17544696d0ad1151ea93ff8eb17a95c6236ac3f31cdfe5da5b83497fcc41c94ee68067106d07f0a34199c58d855ef6ed6e6a1969f04da31211b75f6e1f1c7915cebd5fa13753e58cb3251a262a88addd7429bf9b35bc2c1e6fd85b19cd9cae864cc080cd88c2da7eadf6513236ac269e79235af41586c782e498a2c4de70aee02a62ed3fa7d2ca8f32c6f86c240ff6b4250357b358e3e56ed3b029feefbb03bfeb1eb8ca11ee5d4eea76c1f7bd460363d8a2f01931ef47043eb8bbf33ab67624d066ab6779a91320515baacec3952c0e8a7784babccb81ac620c9344b871f7ed38da27f16c7e3e8e9f4160dee57bdb600804a4f83ee8b460396e1ec2c630f71a0112fca318043f576533836969ebce2dd9dc045062024775b9a5bd40cdb813ad6c6382fa21fb5c043f9a12d2602697e13afbe63820c1c70a124cd1f3383b7869da55efdf489257362746906584197b4fd432d869179152827696b00c0642779722db88bea3425e8ec40f2b96b5305023dde78c8df9a42eb953d2ef4fc10451db48585fdb6e1264a7dbc7a10a45d5a10c1e1c756cf6c317e9bf452b5302f3868219fb121a96298d212d2b8eead855537cdfd0d6ed748680cf816d34f4348e269e2009d875b68d39045ae3686a8a705ff5e06a45e5629deed0b637284a9992001d0cc0dd8d7797effda3d08ca488274a0c45eddc9ae3b840c1532a3bc7200020b9bbd8332f133ec63d1d06ba0458770bb49ce2a1dc9ec591f9402114516f8c452d2d7e2f046a265e6dba284134a15e6047ffc60e71611ea3b16939fa5e34e1ee6f50cd53887c9590e05f0226f97b343e6"}}}}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000878000)={{{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@multicast1=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in=@loopback=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f00007db000)=0xe8) r7 = open(&(0x7f0000e8c000-0x8)="2e2f66696c653000", 0x8200, 0x101) getpeername$packet(r2, &(0x7f0000f40000-0x14)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random="000000000000", [0x0, 0x0]}, &(0x7f0000469000-0x4)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000eb4000)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x1fa, r8}) 2017/12/16 14:56:51 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000a38000-0x28)="26000000100027109301c1ff0000000000e8ffff02001e0000017fff2013f9070600030019001008", 0x28) finit_module(r0, &(0x7f0000994000-0x2)="4000", 0x2) [ 33.873214] audit: type=1400 audit(1513436211.662:9): avc: denied { map } for pid=3141 comm="syz-fuzzer" path="/root/syzkaller-shm201707277" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 35.010623] audit: type=1400 audit(1513436212.800:10): avc: denied { sys_admin } for pid=3186 comm="syz-executor7" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 35.216725] audit: type=1400 audit(1513436213.006:11): avc: denied { sys_chroot } for pid=3355 comm="syz-executor7" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 35.272853] netlink: 1 bytes leftover after parsing attributes in process `syz-executor3'. [ 35.273557] audit: type=1400 audit(1513436213.062:12): avc: denied { net_admin } for pid=3393 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2017/12/16 14:56:53 executing program 7: 2017/12/16 14:56:53 executing program 7: 2017/12/16 14:56:53 executing program 7: 2017/12/16 14:56:53 executing program 7: 2017/12/16 14:56:53 executing program 7: 2017/12/16 14:56:53 executing program 7: 2017/12/16 14:56:53 executing program 7: 2017/12/16 14:56:53 executing program 7: [ 35.277550] audit: type=1400 audit(1513436213.062:13): avc: denied { dac_override } for pid=3389 comm="syz-executor7" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 35.336628] [ 35.338280] ============================================ [ 35.343714] WARNING: possible recursive locking detected [ 35.349154] 4.15.0-rc2-mm1+ #39 Not tainted [ 35.353457] -------------------------------------------- [ 35.358887] syz-executor1/3398 is trying to acquire lock: [ 35.364401] (rtnl_mutex){+.+.}, at: [<00000000459b3368>] rtnl_lock+0x17/0x20 [ 35.371683] 2017/12/16 14:56:53 executing program 7: [ 35.371683] but task is already holding lock: [ 35.377632] (rtnl_mutex){+.+.}, at: [<00000000459b3368>] rtnl_lock+0x17/0x20 [ 35.384886] [ 35.384886] other info that might help us debug this: [ 35.391520] Possible unsafe locking scenario: [ 35.391520] [ 35.397550] CPU0 [ 35.400098] ---- [ 35.402644] lock(rtnl_mutex); [ 35.405888] lock(rtnl_mutex); [ 35.409133] [ 35.409133] *** DEADLOCK *** [ 35.409133] [ 35.415157] May be due to missing lock nesting notation [ 35.415157] [ 35.422053] 1 lock held by syz-executor1/3398: [ 35.426602] #0: (rtnl_mutex){+.+.}, at: [<00000000459b3368>] rtnl_lock+0x17/0x20 [ 35.434286] [ 35.434286] stack backtrace: [ 35.438751] CPU: 1 PID: 3398 Comm: syz-executor1 Not tainted 4.15.0-rc2-mm1+ #39 [ 35.446248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.455566] Call Trace: [ 35.458128] dump_stack+0x194/0x257 [ 35.461731] ? arch_local_irq_restore+0x53/0x53 [ 35.466375] __lock_acquire+0x11cf/0x47f0 [ 35.470491] ? __unwind_start+0x169/0x330 [ 35.474610] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 35.479766] ? save_stack_trace+0x1a/0x20 [ 35.483879] ? __lock_acquire+0x324e/0x47f0 [ 35.488166] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 35.493321] ? trace_event_raw_event_lock+0x340/0x340 [ 35.498483] ? __kernel_text_address+0xd/0x40 [ 35.502954] ? do_vfs_ioctl+0x1b1/0x1530 [ 35.506987] ? debug_check_no_locks_freed+0x3d0/0x3d0 [ 35.512144] ? trace_event_raw_event_lock+0x340/0x340 [ 35.517298] ? save_trace+0xe0/0x2b0 [ 35.520980] ? check_noncircular+0x20/0x20 [ 35.525184] ? trace_event_raw_event_lock+0x340/0x340 [ 35.530341] ? check_noncircular+0x20/0x20 [ 35.534543] ? __free_insn_slot+0x5c0/0x5c0 [ 35.538832] lock_acquire+0x1d5/0x580 [ 35.542601] ? rtnl_lock+0x17/0x20 [ 35.546107] ? lock_release+0xda0/0xda0 [ 35.550050] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 35.555900] ? rcu_note_context_switch+0x710/0x710 [ 35.560802] ? __might_sleep+0x95/0x190 [ 35.564751] ? rtnl_lock+0x17/0x20 [ 35.568261] __mutex_lock+0x16f/0x1a80 [ 35.572115] ? rtnl_lock+0x17/0x20 [ 35.575621] ? lock_release+0xda0/0xda0 [ 35.579561] ? rtnl_lock+0x17/0x20 [ 35.583080] ? mutex_lock_io_nested+0x1900/0x1900 [ 35.587890] ? unwind_get_return_address+0x61/0xa0 [ 35.592791] ? trace_hardirqs_off+0xd/0x10 [ 35.597001] ? _raw_spin_unlock_irqrestore+0xa6/0xba [ 35.602079] ? depot_save_stack+0x2ca/0x460 [ 35.606372] ? selinux_tun_dev_free_security+0x15/0x20 [ 35.611615] ? save_stack+0xa3/0xd0 [ 35.615209] ? save_stack+0x43/0xd0 [ 35.618800] ? kasan_slab_free+0x71/0xc0 [ 35.622830] ? kfree+0xca/0x250 [ 35.626076] ? selinux_tun_dev_free_security+0x15/0x20 [ 35.631325] ? security_tun_dev_free_security+0x48/0x80 [ 35.636660] ? tun_free_netdev+0x153/0x1f0 [ 35.640870] ? register_netdevice+0x97b/0x1010 [ 35.645426] ? __tun_chr_ioctl+0x1ca3/0x3f10 [ 35.649800] ? tun_chr_ioctl+0x2a/0x40 [ 35.653656] ? do_vfs_ioctl+0x1b1/0x1530 [ 35.657685] ? SyS_ioctl+0x8f/0xc0 [ 35.661193] ? entry_SYSCALL_64_fastpath+0x1f/0x96 [ 35.666091] ? find_held_lock+0x39/0x1d0 [ 35.670117] ? check_noncircular+0x20/0x20 [ 35.674318] ? print_usage_bug+0x3f0/0x3f0 [ 35.678522] ? lock_downgrade+0x980/0x980 [ 35.682636] ? tun_flow_flush+0x41/0xe0 [ 35.686586] ? mark_held_locks+0xb2/0x100 [ 35.690705] ? mark_held_locks+0xb2/0x100 [ 35.694820] ? kfree+0xe4/0x250 [ 35.698070] ? selinux_tun_dev_free_security+0x15/0x20 [ 35.703312] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 35.708293] ? trace_hardirqs_on+0xd/0x10 [ 35.712411] mutex_lock_nested+0x16/0x20 [ 35.716444] ? security_tun_dev_free_security+0x67/0x80 [ 35.721774] ? mutex_lock_nested+0x16/0x20 [ 35.725977] rtnl_lock+0x17/0x20 [ 35.729313] tun_free_netdev+0x158/0x1f0 [ 35.733346] ? tun_xdp+0x410/0x410 [ 35.736853] ? __lockdep_init_map+0xe4/0x650 [ 35.741229] ? tun_detach_all+0xb50/0xb50 [ 35.745352] ? tun_xdp+0x410/0x410 [ 35.748867] register_netdevice+0x97b/0x1010 [ 35.753245] ? netdev_change_features+0x100/0x100 [ 35.758056] ? round_jiffies_up+0xce/0x100 [ 35.762266] ? __round_jiffies_up_relative+0x150/0x150 [ 35.767513] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 35.772413] ? selinux_tun_dev_alloc_security+0x124/0x170 [ 35.777920] __tun_chr_ioctl+0x1ca3/0x3f10 [ 35.782124] ? tun_chr_read_iter+0x1e0/0x1e0 [ 35.786499] ? lock_downgrade+0x980/0x980 [ 35.790615] ? avc_ss_reset+0x110/0x110 [ 35.794558] ? lock_release+0xda0/0xda0 [ 35.798503] ? __lock_is_held+0xbc/0x140 [ 35.802541] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 35.808402] ? tun_chr_compat_ioctl+0x30/0x30 [ 35.812864] tun_chr_ioctl+0x2a/0x40 [ 35.816547] ? tun_chr_ioctl+0x2a/0x40 [ 35.820407] do_vfs_ioctl+0x1b1/0x1530 [ 35.824262] ? _cond_resched+0x14/0x30 [ 35.828120] ? ioctl_preallocate+0x2b0/0x2b0 [ 35.832502] ? selinux_capable+0x40/0x40 [ 35.836530] ? register_lock_class+0x12aa/0x2cd0 [ 35.841253] ? lockdep_sys_exit+0x47/0xf0 [ 35.845370] ? syscall_return_slowpath+0x2ad/0x550 [ 35.850269] ? security_file_ioctl+0x89/0xb0 [ 35.854651] SyS_ioctl+0x8f/0xc0 [ 35.857988] entry_SYSCALL_64_fastpath+0x1f/0x96 [ 35.862709] RIP: 0033:0x452a39 [ 35.865863] RSP: 002b:00007f3d3851ac58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 [ 35.873536] RAX: ffffffffffffffda RBX: 00007f3d3851b700 RCX: 0000000000452a39 [ 35.880772] RDX: 0000000020f58000 RSI: 00000000400454ca RDI: 0000000000000017 [ 35.888010] RBP: 0000000000a6f880 R08: 0000000000000000 R09: 0000000000000000 [ 35.895251] R10: 0000000000000000 R11: 0000000000000212 R12: 0000000000000000 [ 35.902487] R13: 0000000000a6f7ff R14: 00007f3d3851b9c0 R15: 0000000000000012