[....] Starting enhanced syslogd: rsyslogd[ 12.401130] audit: type=1400 audit(1517503006.414:4): avc: denied { syslog } for pid=3907 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.218' (ECDSA) to the list of known hosts. 2018/02/01 16:37:01 fuzzer started 2018/02/01 16:37:01 dialing manager at 10.128.0.26:38139 syzkaller login: [ 28.415169] random: crng init done 2018/02/01 16:37:04 kcov=true, comps=false 2018/02/01 16:37:05 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000a74000-0x10)=[{&(0x7f000032b000)="390000001300194700bb61e1c3050300400002f80100000000000000800009001300010082dfffffffffff000000000000000207000d0001a2", 0x39}], 0x1) socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f000006b000)={0x0, @broadcast, @rand_addr}, &(0x7f0000077000-0x4)=0xc) accept$inet6(0xffffffffffffffff, &(0x7f0000671000)={0x0, 0xffffffffffffffff, 0x0, @ipv4={[], [], @rand_addr}}, &(0x7f00006b9000)=0x1c) accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000a06000-0x4)=0xfffffffffffffeeb, 0x0) 2018/02/01 16:37:05 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) gettid() perf_event_open(&(0x7f0000092000)={0x0, 0x78, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x2000000000000) r0 = memfd_create(&(0x7f0000acb000-0x23)="c417", 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000fdd000-0xe8)={0x0, 0x0, 0x0, 0x2, 0x401, 0x0, 0xd, 0x0, 0x8, "754e4e12d3097ac6bb40f07cdd999f836e5dd9817d7d9b17a880e0bc8b5b08ef63d72b04fc42d91b59c37f4f943e88b8816375b8121c44ea85e24b47eb511850", "05c006d396ec0098eda11926d8aef6eb06aa8f17b8278cfcbb8b5b3637f296a5e04ae73641669411cd469aab5102af232699dd461546de25d327eb9186e96e65", "63a5801fab8b5f44f7c05eb9d2188da30737faa060e673fc11dac756b1d90ada", [0x0, 0x1]}) write(r0, &(0x7f0000a18000)='[', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0x800000000fec) fchmod(r0, 0x0) getsockname$ipx(0xffffffffffffffff, &(0x7f000088d000-0x10), &(0x7f00005cc000)=0x10) 2018/02/01 16:37:05 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 2018/02/01 16:37:05 executing program 2: 2018/02/01 16:37:05 executing program 3: 2018/02/01 16:37:05 executing program 4: 2018/02/01 16:37:05 executing program 5: 2018/02/01 16:37:05 executing program 6: [ 31.766429] audit: type=1400 audit(1517503025.774:5): avc: denied { sys_admin } for pid=4123 comm="syz-executor7" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 31.796878] IPVS: Creating netns size=2536 id=1 [ 31.811587] audit: type=1400 audit(1517503025.824:6): avc: denied { net_admin } for pid=4125 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 31.860177] IPVS: Creating netns size=2536 id=2 [ 31.896362] IPVS: Creating netns size=2536 id=3 [ 31.938230] IPVS: Creating netns size=2536 id=4 [ 31.983742] IPVS: Creating netns size=2536 id=5 [ 32.034230] IPVS: Creating netns size=2536 id=6 [ 32.088371] IPVS: Creating netns size=2536 id=7 [ 32.147890] IPVS: Creating netns size=2536 id=8 [ 33.721877] audit: type=1400 audit(1517503027.734:7): avc: denied { sys_chroot } for pid=4125 comm="syz-executor0" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/02/01 16:37:07 executing program 1: 2018/02/01 16:37:07 executing program 1: 2018/02/01 16:37:07 executing program 1: [ 33.818010] netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. [ 33.857689] netlink: 5 bytes leftover after parsing attributes in process `syz-executor0'. 2018/02/01 16:37:07 executing program 7: 2018/02/01 16:37:07 executing program 1: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 2: 2018/02/01 16:37:08 executing program 3: 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 5: 2018/02/01 16:37:08 executing program 4: 2018/02/01 16:37:08 executing program 1: 2018/02/01 16:37:08 executing program 6: 2018/02/01 16:37:08 executing program 0: 2018/02/01 16:37:08 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) sendto$inet(r0, &(0x7f000038e000), 0x0, 0x800000120000001, &(0x7f0000995000-0x10)={0x2, 0xffffffffffffffff, @empty}, 0x10) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000d16000)=[{0x8, 0x8}, {}, {}, {}, {}, {}, {}, {}], 0x295) 2018/02/01 16:37:08 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000005000)={@random="cd3997030f00", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "e30600", 0x18, 0x40000000003a, 0x43ff, @local={0xfe, 0x80, [], 0xffffffffffffffff, 0xaa}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@mld={0x86, 0x0, 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}}}}, 0x0) 2018/02/01 16:37:08 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x7c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000308000-0x60)={0x0, 0x0, 0x1, @tid}, &(0x7f0000a77000)) timer_gettime(0x0, &(0x7f000092c000-0x20)) 2018/02/01 16:37:08 executing program 0: r0 = socket(0x2, 0x3, 0x1) getsockopt(r0, 0xff, 0x0, &(0x7f0000000000), &(0x7f00003b7000)) 2018/02/01 16:37:08 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000011a000-0x241)='net/rt6_stats\x00') r1 = syz_open_procfs(0x0, &(0x7f00003a0000)='projid_map\x00') sendfile(r1, r0, &(0x7f0000ed1000-0x8), 0xd) 2018/02/01 16:37:08 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x48, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000f64000-0x10), &(0x7f0000f64000-0x4)=0x10) 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000069b000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000010000), 0xfffffffffffff000, 0x0, 0x0, 0x0) 2018/02/01 16:37:08 executing program 7: 2018/02/01 16:37:08 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x80a, 0x80000003) r0 = syz_open_procfs(0x0, &(0x7f0000b23000)='net/ptype\x00') pread64(r0, &(0x7f0000e61000), 0x0, 0x1fffffc) 2018/02/01 16:37:08 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000fd0000-0x10)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) connect$inet(r0, &(0x7f0000607000-0x10)={0x2, 0x0, @loopback=0x7f000001}, 0x10) connect$unix(r0, &(0x7f00006da000)=@file={0x0, './file0\x00'}, 0xa) connect$inet(r0, &(0x7f0000484000)={0x2, 0x0, @empty}, 0x10) connect$unix(r0, &(0x7f0000d69000)=@abs, 0x8) 2018/02/01 16:37:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) unshare(0x400) bind(r0, &(0x7f0000000000)=@sco={0x1f}, 0x8) 2018/02/01 16:37:08 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000fb1000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = getpgid(0x0) write(r1, &(0x7f0000fd5000)="f0", 0x1) sched_setaffinity(r2, 0x8, &(0x7f000097e000)=0x8000000075) fcntl$setpipe(r1, 0x407, 0x0) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000565000-0x8)) vmsplice(r1, &(0x7f00007a4000)=[{&(0x7f000001c000)="b1", 0x1}], 0x1, 0x0) read(r0, &(0x7f00007b9000)=""/58, 0x3a) 2018/02/01 16:37:08 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000991000)='./file0\x00', 0x10442, 0x0) perf_event_open(&(0x7f0000001000-0x78)={0x2, 0x78, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$TIOCLINUX2(r0, 0x40305828, &(0x7f0000be2000-0xc)={0x2}) 2018/02/01 16:37:08 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80003, 0x0, &(0x7f0000b4f000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000e6d000-0x8)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000)=[], 0x80, 0xc0) setsockopt$sock_int(r1, 0x1, 0x7, &(0x7f0000b07000-0x4), 0x4) sendto$unix(r1, &(0x7f00004b9000), 0x0, 0x0, 0x0, 0x0) close(r0) 2018/02/01 16:37:08 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f000036b000-0x28)={@syzn={0x73, 0x79, 0x7a, 0x0}, &(0x7f000069c000-0x18)=@ethtool_sfeatures={0x3b, 0x2, [{0xff, 0xffff}, {}]}}) 2018/02/01 16:37:08 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000003b000-0x6)='posix_acl_access{Y\x00', 0x0) lseek(r0, 0x7ffffffffffffffb, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000827000-0x20)={0x0, 0x1, 0x3f}) [ 34.407603] audit: type=1400 audit(1517503028.414:8): avc: denied { dac_override } for pid=5365 comm="syz-executor6" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 34.444670] syz-executor5 uses obsolete (PF_INET,SOCK_PACKET) 2018/02/01 16:37:08 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000fce000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000f38000-0x4)=0xfffffffffffffc66, 0x0) sendmsg$nl_route(r0, &(0x7f000001c000-0x38)={&(0x7f00001f7000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000e8e000-0x48)=@ipv6_newroute={0x24, 0x18, 0x301, 0xffffffffffffffff, 0xffffffffffffffff, {0xa, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, [@RTA_IIF={0x8, 0x1, r1}]}, 0x24}, 0x1}, 0x0) 2018/02/01 16:37:08 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_pts(r1, 0x208000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000000b000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000001000-0x38)={&(0x7f0000239000-0x8)=@abs, 0x8, &(0x7f0000008000)=[], 0x0, &(0x7f0000001000-0x10)=[@rights={0x200, 0x1, 0x1, [r0]}], 0x1}, 0x0) recvmsg(r3, &(0x7f000000e000)={0x0, 0x0, &(0x7f000008b000)=[], 0x0, &(0x7f000000c000), 0xfc13}, 0x0) pselect6(0x40, &(0x7f0000cc9000-0x40), &(0x7f0000cc9000-0x40), &(0x7f00000de000-0x40)={0xffffffffffffffe1}, &(0x7f00008e6000-0x10)={0x0, 0x989680}, &(0x7f0000205000-0x10)={&(0x7f0000cc9000-0x8), 0x8}) 2018/02/01 16:37:08 executing program 6: mmap(&(0x7f0000000000/0xfe9000)=nil, 0xfe9000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fe9000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x541f, &(0x7f0000fe9000-0x8)) [ 34.455693] audit: type=1400 audit(1517503028.464:9): avc: denied { create } for pid=5384 comm="syz-executor6" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 2018/02/01 16:37:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x1000001, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000b6000)={0x0, {{0x2, 0xffffffffffffffff, @multicast2=0xe0000002}}, {{0x2, 0xffffffffffffffff, @dev={0xac, 0x14}}}}, 0x108) 2018/02/01 16:37:08 executing program 2: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0xffffffffffffffff, 0x0, @empty}, {0xa, 0xffffffffffffffff, 0x0, @dev={0xfe, 0x80}, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x5}, 0xfdec68a53590438c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000001000+0xfde), 0x4) 2018/02/01 16:37:08 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x48, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000d14000-0x9)='/dev/sg#\x00', 0x0, 0xa40cd904e3106aa7) 2018/02/01 16:37:08 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8b000-0x8)='./file0\x00', &(0x7f00000b0000-0x40)=[], &(0x7f0000b5b000-0x8)=[]) r0 = syz_open_procfs(0x0, &(0x7f00000e0000)='stack\x00') readv(r0, &(0x7f000066e000-0x10)=[{&(0x7f00008ad000)=""/178, 0xb2}], 0x1) execveat(0xffffffffffffffff, &(0x7f0000274000)='./file0\x00', &(0x7f000024e000)=[], &(0x7f0000525000-0x8)=[], 0x0) open$dir(&(0x7f00003e9000-0x8)='./file0\x00', 0x26102, 0x0) [ 34.457681] audit: type=1400 audit(1517503028.464:10): avc: denied { ioctl } for pid=5384 comm="syz-executor6" path="socket:[13666]" dev="sockfs" ino=13666 ioctlcmd=0x8946 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 34.491068] IPv6: Can't replace route, no match found 2018/02/01 16:37:08 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x1, 0x0) listen(r0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000014000)={0x77359400}, 0x10) accept4$inet6(r0, &(0x7f0000007000-0x1c)={0x0, 0xffffffffffffffff, 0x0, @loopback}, &(0x7f0000006000-0x4)=0x1c, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12, 0x0, @tid}, &(0x7f0000fd7000)) timer_settime(0x0, 0x0, &(0x7f0000d07000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) shutdown(r0, 0x1) tkill(r1, 0x1000000000016) [ 34.545920] audit: type=1400 audit(1517503028.554:11): avc: denied { net_raw } for pid=5381 comm="syz-executor5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/02/01 16:37:08 executing program 6: mmap(&(0x7f0000000000/0x100000)=nil, 0x100000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect(r0, &(0x7f00000ff000-0x1c)=@in6={0xa, 0xffffffffffffffff, 0x0, @loopback={0x0, 0x1}}, 0x1c) syz_emit_ethernet(0x6e, &(0x7f00000f8000)={@random="cd390b081bf2", @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff, 0xaa}, [], {@ipv6={0x86dd, {0x0, 0x6, "95fbe8", 0x38, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x3a, 0x0, @empty, @loopback={0x0, 0x1}, [], "fca967e17f791010"}}}}}}}, 0x0) 2018/02/01 16:37:08 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x48, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x2, 0x10) write(r0, &(0x7f0000de9000-0x56)="240000001700050039080000f4090103037fdd3f000002000c000300190f03f3ffe00400", 0x24) 2018/02/01 16:37:08 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f00000d5000)) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8b000-0x8)='./file0\x00', &(0x7f00000b0000-0x40)=[], &(0x7f0000b5b000-0x8)=[]) r0 = syz_open_procfs(0x0, &(0x7f00000e0000)='stack\x00') readv(r0, &(0x7f000066e000-0x10)=[{&(0x7f00008ad000)=""/178, 0xb2}], 0x1) execveat(0xffffffffffffffff, &(0x7f0000274000)='./file0\x00', &(0x7f000024e000)=[], &(0x7f0000525000-0x8)=[], 0x0) open$dir(&(0x7f00003e9000-0x8)='./file0\x00', 0x26102, 0x0) 2018/02/01 16:37:08 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000053c000-0x8)='./file0\x00', 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000db1000-0x8)='./file0\x00', &(0x7f0000014000)='proc\x00', 0x0, &(0x7f0000cde000)) chroot(&(0x7f0000db3000)='./file0\x00') mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000b31000-0x8)='./file0\x00', &(0x7f0000014000)='ramfs\x00', 0x0, &(0x7f000002d000)) clone(0x10000000, &(0x7f0000f7e000), &(0x7f0000744000), &(0x7f0000a23000), &(0x7f0000ee1000-0x1)) 2018/02/01 16:37:08 executing program 2: mmap(&(0x7f0000000000/0xf7a000)=nil, 0xf7a000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x1000000010, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000f73000-0x38)={&(0x7f00008d4000)={0x10}, 0xc, &(0x7f00002ca000-0x10)={&(0x7f00003ce000)=@ipv4_newroute={0x1c, 0x18, 0x305, 0xffffffffffffffff, 0xffffffffffffffff, {0x2}, []}, 0x1c}, 0x1}, 0x0) clock_gettime(0x0, &(0x7f0000a20000-0x10)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000f79000)=[{{&(0x7f0000f7a000-0x10)=@ipx, 0x10, &(0x7f0000f79000)=[{&(0x7f0000a09000)=""/152, 0x98}, {&(0x7f0000f79000)=""/113, 0x71}, {&(0x7f0000442000-0xe4)=""/228, 0xe4}, {&(0x7f00006fd000)=""/50, 0x32}, {&(0x7f0000ddc000-0x7c)=""/124, 0x7c}, {&(0x7f0000f79000)=""/176, 0xb0}], 0x6, &(0x7f0000f79000)=""/107, 0x6b}}, {{&(0x7f0000f7a000-0xc)=@nl=@kern, 0xc, &(0x7f0000d49000)=[], 0x0, &(0x7f0000640000)=""/224, 0xe0}}], 0x2, 0x0, &(0x7f0000a6d000-0x10)={0x0, r1+10000000}) 2018/02/01 16:37:08 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000ca1000)='bbr\x00', 0x4) bind$inet6(r1, &(0x7f00001ff000-0x1c)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000d42000-0xb8), 0x0, 0x20000000, &(0x7f0000cc8000-0x1c)={0xa, 0x2, 0x0, @empty}, 0x1c) 2018/02/01 16:37:08 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = syz_open_dev$tun(&(0x7f0000a9e000-0xd)='/dev/net/tun\x00', 0x0, 0x6) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000d89000)={@common='eql\x00', @ifru_names=@generic="c15c9a8b74308b1b2c5d0ce63d9d8226"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000630000-0x20)={@common='eql\x00', @ifru_flags=0x301}) write$tun(r1, &(0x7f0000955000)=@hdr={0x1, 0x0, 0x0, 0x0, 0x800, 0x0, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x802, 0xffffffffffffffff, 0x0, 0x0, 0x400000000000001, 0x0, @empty, @broadcast=0xffffffff, {[]}}, @tcp={{0xffffffffffffffff, 0xffffffffffffffff, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[]}}, {"8571dc48841a02d1d9d335faa1649dfbfdc89324cc1090ea0b77d8158b50074e261b0be93331d2a74b50c3734fc61b8a0eae79785170ced916a6cd18f61e365d4201932b195527653f8510bd7dd69eb2b4b9798f28f9b026c6bb84f1b3359ed9f3fd128217a6b2d31e9b2c058d597bad0861e6f586f051da944a19ae10450f9d9445152283621ebbe8d1da1129bac565b62e7a5bc65615dd7830ca84a5251a77e977e3f5279e0ca91a5d2c1b20b6efc94941cd8eed2b5365a160f93c6827c30fb7354d85c5b077f6af5dc0a68e84534c7d041c5894e557f9227e65b43d9207c6b287911e6faadfdde7071ffb7fb399f99c4482d5fcdca36839824acfc97ba366d548a841616b68fe78b20c0367faa82af1e230b7db9664bebd82ecc9162d121a052be5b95e4101d89562b2926d2db811cf03f27998f52ad9e8452bea0021cf976c09c2166e7949cd863e875aed198657eae956270f3a084545157c1a8e9fc3f7929e798c97ebac7a83420f4e1e254428152bd696c82959ae6d15d0a2a891c6c9c33ebe42084856276d59a0f95671b99e0ef3b6b3e6744f5ff3613153bc46fbc49c2868fb17b6da0913c8fb20e6eebedac5f154c56bda3a72f847969f01fee263c0ad201de4d3eb87aeb63ab870d9fa1e7f7ba529dfb6221545e4cedae7414d71a021dd9327180cb0ab13bbcf2690cb34e304d0e2cd2686cd003399e2cf2556fde2c69e39c05cb7666efede46326e7ae40819e7119c2cc94c37753bd1971ddc10c683298aacb75c550a2928e35503d437c237c593e06a515727afd71a46b94b2ab0a5d4d70cb16e63320aa714ca00e41d834a07ddefa0bfed71a3af9b34739a0cc8c732da41110ce2187a101d7f2c9ac1bf26c3469c27d5b8f15c579b9e25746b4420140ac89bd1a5fe30892069c31bd5773cb70fb3d7226dcd3b7296188ccffc9fa11fd0080dda8fe4041eae295af9af7d16b790f5c7dda1c597b9af5684c7b2d7d8746c6c1dae590e254d24f97cacebc5a7a3a60d36ae7fd2c7644afd7f778f64959d298bfd720ae620f5f894ada603a01b7da4e93cf685e1759860f44108b5acc7f9f881dad0a02b2c4fb998bfeea03faf548b6513c258c6673b476ef67e3219559eacc2132278a9f81cc956eb695a15e3dcbd6f03b07ed36fdd66755cca86bf5455343dbf47395e47aa57cddfb2e76f337bd1b4b019a8e67dda70906d66b9662b8c6948589e379f7da71795dc9d8beff97f0d71a6cfca640444274b9247a0eca4df21889e006b1aa4efc5c95737436e369aacfff374b9ea291b8a42395a88de39522589fda4a9ac55965fb09fe4bae6f5c82e0b11531fa5601fad4eed518b4ef7a24f7ba14261e4d4e6d7d49aacdcddad6f3c95c5cc1b6fdec8f5b5c0466f2984eaabef645d1cd872c1bbbcb71d85831b48849ddb5d656c1773b13f9071432c0817945bc446094ddc967e4fb31ccea6008d65d2bc4dc9e8c2cc50b77b22af4d60cd395e509b700f0120ab216914feadbf7e7d63e528685d78d2040ba35c0a7bf37603d67cb45b928e3f04f74190ad8a9037235bc48d486cf829797d24dd94ae0d6c3b2d6b1687a6c5c30ddf0a526ed24d3d289512a4d6addb4f3e3472ed640f18832bc4cdfbdaf38ce7992a20c909d7b238bf8bd9f5281af2bf357e1481e7e9430ea75e6e56a6c4923ee58a2656ded3e61742c648ea154d5bf0cad24aabac8218d00a3f18f36b9ab67e9edae8ae11b1113d3f77515934be3c6f85fd4806f0fdf2b738d7666aca4bf8ff31b9d195bdabe0949d8212d22b574a09da488cb3bd27a2eb5192786b416a8ac69d0c383fef59e3990c5c39660ba1078bec031666f3a61b6cf98381165bee35e6c5cd6366e856f006db700dcf6d38744c1e2b98f879934be80a7bd6f00f88527067b1b1a6fc26f9986040cc0195d12aef3446fff63c758488b9fe2b65b874bcb1c2396cc41d440299d24ff0c4dcefe10c31035e3d6cc470faff3bb88b4ecfc9a5a6299ecc0247ecd6f32e754cce49d1f35df5f5a6895e2de6757fd312546fc5498d1531fbf11a6414c25777163d239e03ce52f0dfbd095f4f609a657f8a93f47286a770d69aa5012542b00ee25870deddca3121899bb59132c5dd77bd73d9ad0138dc348c7427989eb72b4c2055f46783416a145a74f7fe061d9b27bb7e80edaaba792c479ab3f0d0f762e59710a28a37148a5ec48de6fc3315ae9f9a4ae087df6087b0f343a1165802be4f9c853ab62a9c8513d28f6d409cf640cd29a8e0fa2f08d6481e7b94dbcf85e6d83c5c26fc04aff723f5d2053d8ef32486d54e7167a93ee862cd9d3d02ea5b754bf44d7b400c683d5b1b117d123cf822ea60d4de108c2e9a185dea2b43ed5ee56420e8c6a2cdb04986a948f6bdefac70e3d1de5d89d6ea9e86a331199551423a0c1b7f4c993fc6b1f2c6a9ff879f422e6dffbc02e7abe3d9a45fb20b4687e5733f3c2c66e233a7f895d4e6b2292cea10abe8d6e5577708eafb2b604ded50be9fd29fd76698e27f4d5e1c75b7363ffd2582f2e4e7324c0d67c1f22d5a0f41cc66863c08da70b87c0424d9c9b284fa0f0f565132c6212811fd396f769f233baa6708d458864f0cdca98da0f135594e2f69291ae87e39e8e46e1bd17e7001de1f0813f881f3ead478958a06451d802d62fe511aa6e6ed9910e837124eb69e49eb2d8b917756fd54ac554e5674b8aafc6ddc8ca7e3826106d9cca344720284eeac05f25799482a2eb7c79391f036134d6934d573a93b37097f62f083cf418e1e30787178a2094dbe1cea94c218b6a24f4f6d9fc5903cfd5b7832750f0bac9859ef32f34aef9d0f"}}}}, 0x80c) 2018/02/01 16:37:08 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00007a0000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000617000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000bba000)={&(0x7f00003a2000)=@abs, 0x8, &(0x7f00006c7000-0x10)=[], 0x0, &(0x7f00009e0000-0x48)=[@rights={0x18, 0x1, 0x1, [r1]}], 0x18}, 0x0) sendmsg$unix(r2, &(0x7f0000e50000-0x38)={&(0x7f0000beb000)=@abs, 0x8, &(0x7f000000d000)=[], 0x0, &(0x7f000053c000)=[@rights={0x18, 0x1, 0x1, [r2]}], 0x18}, 0x0) close(r1) close(r2) close(r0) 2018/02/01 16:37:08 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = syz_open_dev$tun(&(0x7f00006f3000-0xd)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000316000)=0x101) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000533000)={@generic="02000000040000000004008000e9bc22", @ifru_settings={0x10001, 0x0, @raw_hdlc=&(0x7f00008a7000-0x4)}}) r2 = syz_open_dev$tun(&(0x7f0000ada000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r2, 0x400454da, &(0x7f0000744000-0x4)=0x8001) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000712000-0x28)={@generic="9438a7c080c5008f3852c862b540c308", @ifru_map={0x294e}}) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000058000)={0x1, {{0xa, 0xffffffffffffffff, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) [ 34.657932] audit: type=1400 audit(1517503028.664:12): avc: denied { create } for pid=5436 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 2018/02/01 16:37:08 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f000014c000-0xb)='/dev/loop#\x00', 0x0, 0x180) 2018/02/01 16:37:08 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000759000)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000809000-0xa)='oom_score\x00') sendfile(r0, r1, &(0x7f000017f000), 0x1) 2018/02/01 16:37:08 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000ca1000)='bbr\x00', 0x4) bind$inet6(r1, &(0x7f00001ff000-0x1c)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000d42000-0xb8), 0x0, 0x20000000, &(0x7f0000cc8000-0x1c)={0xa, 0x2, 0x0, @empty}, 0x1c) 2018/02/01 16:37:08 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000c14000-0x38)={&(0x7f0000d55000)={0x10}, 0x7f, &(0x7f0000171000-0x10)={&(0x7f000092f000)={0x14, 0x1, 0x3, 0x7ffffffff, 0xffffffffffffffff, 0xffffffffffffffff, {}, []}, 0x14}, 0x1}, 0x0) 2018/02/01 16:37:08 executing program 2: mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000005000-0x5)='task\x00') futimesat(r0, &(0x7f0000008000-0x8)='./file0\x00', &(0x7f0000008000-0x20)={{}, {0x0, 0x7530}}) [ 34.668937] device eql entered promiscuous mode [ 34.693068] TCP: request_sock_TCPv6: Possible SYN flooding on port 20018. Sending cookies. Check SNMP counters. 2018/02/01 16:37:08 executing program 4: mmap(&(0x7f0000000000/0x6000)=nil, 0x6000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000006000-0x4), &(0x7f0000001000)=0x4) 2018/02/01 16:37:08 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x48, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00008b5000)={@multicast2=0xe0000002, @empty, 0x0, 0x40000000000001ea, []}, 0x10) 2018/02/01 16:37:08 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000f1000-0x78)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00009ed000-0x88)={0x0, {{0xa, 0xffffffffffffffff, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x2ef) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000c70000-0x410)={0x2, {{0xa, 0xffffffffffffffff, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}}, {{0xa, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}}]}, 0x190) syz_emit_ethernet(0x3e, &(0x7f0000037000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x3a, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0xffffffffffffffff, 0xffffffffffffffff, 0x8}}}}}}, &(0x7f0000775000)={0x0, 0x1, [0x0]}) 2018/02/01 16:37:08 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000740000)={0x2, 0x78, 0x47, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f000039e000/0x2000)=nil, 0x2000) mmap(&(0x7f0000000000/0xfb0000)=nil, 0xfb0000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 34.747658] audit: type=1400 audit(1517503028.754:13): avc: denied { write } for pid=5468 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 34.762326] TCP: request_sock_TCPv6: Possible SYN flooding on port 20018. Sending cookies. Check SNMP counters. 2018/02/01 16:37:08 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00007d4000)={@common='bridge0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f000008c000)=0x8, 0x4) sendto$packet(r0, &(0x7f0000064000), 0x0, 0x0, &(0x7f0000420000-0x14)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff, 0xaa}}, 0x14) 2018/02/01 16:37:08 executing program 5: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x78, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb3c000)=nil, 0xb3c000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) mmap(&(0x7f0000b3c000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000a42000-0x18), &(0x7f0000b3c000)=0x18) 2018/02/01 16:37:08 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000425000-0x10)={0x1, &(0x7f000003c000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffc}]}) set_tid_address(&(0x7f0000b16000)) 2018/02/01 16:37:08 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f00008c2000-0x10)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) nanosleep(&(0x7f0000117000-0x10), &(0x7f0000f69000)) 2018/02/01 16:37:08 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f000034c000), 0x4) r1 = socket$inet6(0xa, 0x80003, 0xff) dup2(r0, r1) 2018/02/01 16:37:08 executing program 1: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f000060d000-0x10)={0x0, 0x0}) futimesat(0xffffffffffffffff, &(0x7f0000001000-0x8)='./file0\x00', &(0x7f0000000000)={{0x0, r0/1000+30000}}) 2018/02/01 16:37:08 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000003d000-0xc)={0x0}, &(0x7f0000e37000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000000000+0xca6)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) ptrace(0x4207, r2) 2018/02/01 16:37:08 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r0 = syz_fuseblk_mount(&(0x7f0000173000-0x8)='./file0\x00', &(0x7f0000530000-0x8)='./file0\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000002000)=r0) 2018/02/01 16:37:08 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000f1000-0x78)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000df5000-0x8)={0x0}) shutdown(r0, 0x1) 2018/02/01 16:37:08 executing program 7: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f0000b80000-0x4), 0x8000000000000087, 0x0, &(0x7f0000be9000-0x7), &(0x7f0000153000-0x4), 0x0) 2018/02/01 16:37:08 executing program 3: mmap(&(0x7f0000000000/0xf8b000)=nil, 0xf8b000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x1000000010, 0x802, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000e22000-0x28)={@common='ip6gretap0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000022b000)={&(0x7f0000e7c000-0xc)={0x10}, 0xc, &(0x7f0000f76000-0x10)={&(0x7f0000e4d000-0x55b8)=@newlink={0x28, 0x10, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, {0x0, 0x0, 0x0, r1}, [@IFLA_VFINFO_LIST={0x8, 0x16, [{0x4, 0x1, []}]}]}, 0x28}, 0x1}, 0x0) 2018/02/01 16:37:08 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000364000-0x4)=0xfffffffffffffffb, 0x4) bind$inet6(r0, &(0x7f000046e000-0x1c)={0xa, 0xffffffffffffffff, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000f29000)={0x0, 0x38, &(0x7f0000521000-0x38)=[@in6={0xa, 0xffffffffffffffff, 0x0, @loopback={0x0, 0x1}}, @in6={0xa, 0xffffffffffffffff, 0x0, @loopback={0x0, 0x1}}]}, &(0x7f0000df4000)=0x10) 2018/02/01 16:37:08 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000710000-0x1d)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f5a000-0x4)=0x5, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r1, &(0x7f0000f5e000-0x1c)={0xa, 0x0, 0x0, @empty}, 0x1c) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r2, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r2, &(0x7f0000f5e000-0x1c)={0xa, 0x0, 0x0, @empty}, 0x1c) 2018/02/01 16:37:08 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000012000-0x10)={0x77359400}, &(0x7f0000000000)={0x0}) timer_create(0x0, &(0x7f0000001000-0x60)={0x0, 0x0, 0x1, @thr={&(0x7f0000005000), &(0x7f0000011000)}}, &(0x7f0000001000-0x4)) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000003000)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000005000-0x20)={{r0}, {0x0, r1+30000000}}, &(0x7f0000004000-0x20)) 2018/02/01 16:37:08 executing program 7: mmap(&(0x7f0000000000/0x20000)=nil, 0x20000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000004000)='net/tcp\x00') read$eventfd(r0, &(0x7f0000009000-0x8), 0x57a) 2018/02/01 16:37:08 executing program 5: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f000000a000-0x4)=0x101, 0x4) sendto$inet6(r0, &(0x7f0000004000-0x27), 0x5f6, 0x0, &(0x7f0000001000-0x1c)={0xa, 0xffffffffffffffff, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/02/01 16:37:09 executing program 2: r0 = eventfd2(0x0, 0x0) read$eventfd(r0, &(0x7f0000607000), 0xffffffffffffffc8) 2018/02/01 16:37:09 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000271000)={0x2, 0x78, 0x48, 0x80000002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000002a000-0xa)='./control\x00', 0x0) r0 = inotify_init1(0x0) creat(&(0x7f000000b000-0x10)='./control/file0\x00', 0x0) inotify_add_watch(r0, &(0x7f0000110000-0xa)='./control\x00', 0x26000104) 2018/02/01 16:37:09 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000003d000-0xc)={0x0}, &(0x7f0000e37000)=0xc) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000000000+0xca6)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) ptrace(0x4207, r2) 2018/02/01 16:37:09 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x48, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, './file0\x00'}, 0xa) listen(r1, 0x0) connect$unix(r0, &(0x7f0000006000)=@file={0x1, './file0\x00'}, 0xa) r2 = socket$netlink(0x10, 0x3, 0x80000000004) write(r2, &(0x7f0000b1d000)="29000000140007b7ffffffffff0860eb0100100006a40e07fff00fd57f25ffffff0100002a00f3ff09", 0x29) 2018/02/01 16:37:09 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000f13000-0x28)={&(0x7f0000218000)=@in={0x2, 0xffffffffffffffff, @empty}, 0x10, &(0x7f0000f1e000-0x40)=[], 0x0, &(0x7f0000f13000)=[]}, 0x0) 2018/02/01 16:37:09 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x100000000a, &(0x7f0000c2a000-0x4)=0x80000001, 0x4) sendmsg$inet_sctp(r0, &(0x7f0000558000-0x38)={&(0x7f000051f000-0x1c)=@in6={0xa, 0x1, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000b03000)=[]}, 0x0) 2018/02/01 16:37:09 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x0) clock_gettime(0x0, &(0x7f0000556000)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000ac8000)={{0x0, r1}, {0x0, r1}}, &(0x7f0000ddb000)) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x0, 0x1c9c380}}, &(0x7f0000a1d000)) 2018/02/01 16:37:09 executing program 6: mmap(&(0x7f0000000000/0xdf3000)=nil, 0xdf3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f0000033000-0x8)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x20, &(0x7f00003f0000-0x10)={0x0, 0x0, 0x30005}) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000001000-0x8)={0xfffffffffffffdb0}, 0x8, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00006d5000)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, &(0x7f0000df2000)=0xa0) read(r2, &(0x7f00006c0000-0x80)=""/128, 0x80) 2018/02/01 16:37:09 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x20000000000000a, 0x2, 0x0) connect(r0, &(0x7f0000e54000)=@in6={0xa, 0xffffffffffffffff, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff, 0xaa}, 0xffffffff00000001}, 0x1c) getsockopt$sock_buf(r0, 0x1, 0x19, &(0x7f0000e53000+0xe9)=""/192, &(0x7f0000005000-0x4)=0xc0) 2018/02/01 16:37:09 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0xffffffffffffff6b) r0 = socket(0x11, 0x4000000000080003, 0x0) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0x47e) sendmsg$inet_sctp(r0, &(0x7f00002ef000-0x38)={&(0x7f00001cf000)=@in6={0xa, 0xffffffffffffffff, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000b74000)=[], 0x0, &(0x7f0000055000-0x60)=[@sndrcv={0x276, 0x84, 0x1}, @sndrcv={0x30, 0x84, 0x1}], 0x60}, 0x0) 2018/02/01 16:37:09 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00009ed000-0x88)={0x0, {{0xa, 0xffffffffffffffff, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x2ef) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000971000-0x88)={0x0, {{0xa, 0xffffffffffffffff, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x2, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000695000-0x2)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0xffffffffffffffff, 0x2, 0x8}}}}}}, &(0x7f0000775000)={0x0, 0x1, [0x0]}) 2018/02/01 16:37:09 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000b9f000-0xa)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000636000)) 2018/02/01 16:37:09 executing program 1: mmap(&(0x7f0000000000/0x24000)=nil, 0x24000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001c000-0x38)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f0000024000-0x24)=@ipv6_newroute={0x13, 0x48, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, {0xa}, [@RTA_IIF={0x8, 0x1}]}, 0x24}, 0x1}, 0x0) 2018/02/01 16:37:09 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000ff000-0xc), &(0x7f0000653000-0x4)=0xc) getresgid(&(0x7f0000fcd000-0x4), &(0x7f00005ca000), &(0x7f000083a000)) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000de3000-0xc)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) r1 = dup(0xffffffffffffffff) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000fb1000-0x88)={0x0, {{0xa, 0x1, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff, 0xaa}}}}, 0x88) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f000097c000)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x1, 0x0, []}, 0x10) 2018/02/01 16:37:09 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x48, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt(r0, 0x0, 0x41, &(0x7f0000e00000)=""/17, &(0x7f0000e00000+0x26c)=0x28) 2018/02/01 16:37:09 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000e30000)={&(0x7f000022e000-0xc)=@nl=@unspec, 0xc, &(0x7f0000e6d000)=[], 0x0, &(0x7f0000b54000)=[], 0x3c9, 0xfffffffffffffffc}, 0x0) 2018/02/01 16:37:09 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000f1000-0x78)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00009ed000-0x88)={0x0, {{0xa, 0xffffffffffffffff, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}}, 0x88) bind$inet6(r0, &(0x7f0000f13000)={0xa, 0x2, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000695000-0x2)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, {[], @udp={0xffffffffffffffff, 0x2, 0x8}}}}}}, &(0x7f0000775000)={0x0, 0x1, [0x0]}) 2018/02/01 16:37:09 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clock_adjtime(0x0, &(0x7f000043c000)={0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 2018/02/01 16:37:09 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000a8e000-0x8)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000019000-0x6)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000741000)='./file0\x00', &(0x7f00000e0000-0x8)='./file0\x00', &(0x7f00007d1000)='ramfs\x00', 0x1ffffd, &(0x7f000022b000-0x9e)) r0 = open(&(0x7f00006df000-0x8)='./file0\x00', 0x0, 0x0) renameat2(r0, &(0x7f00007c2000+0x1a)='./file0\x00', r0, &(0x7f000053b000-0x8)='./file1\x00', 0x0) 2018/02/01 16:37:09 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000724000-0x78)={0x2, 0x78, 0xc33, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000929000), 0x8) 2018/02/01 16:37:09 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000740000)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000ca5000-0x8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000b000-0x8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x1, &(0x7f000000a000)) creat(&(0x7f0000549000)='./file0/file0\x00', 0x0) 2018/02/01 16:37:09 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x48, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000c000-0x38)={&(0x7f0000000000)=@nl=@proc={0x10}, 0xc, &(0x7f0000002000)=[{&(0x7f0000001000)="5500000018007fafb72d1cb2a4a280930206000000a843096c26236925000800210010000000ca8a9848a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000004000)=[]}, 0x0) 2018/02/01 16:37:09 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000b2c000-0x1c)=[{&(0x7f0000cad000-0x10)=@in={0x2, 0x0, @local={0xac, 0x14, 0x0, 0xaa}}, 0x10, &(0x7f00003b5000-0x38)=[], 0x0, &(0x7f000008f000-0x2c)=[@sndrcv={0x2c, 0x84, 0x1}], 0x2c}], 0x1, 0x0) 2018/02/01 16:37:09 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f00008b5000-0x30)={0x0, 0x0, 0x0, 0xd5}, 0x0) 2018/02/01 16:37:09 executing program 7: mmap(&(0x7f0000000000/0xfb3000)=nil, 0xfb3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000001000-0x78)={0x1, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00009de000+0xf3c)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4460f63f}, 0x0, 0x0, r0, 0x0) read(r1, &(0x7f0000578000)=""/248, 0xf8) 2018/02/01 16:37:09 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000b9000-0x1c)={0xa, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}, 0x100000002}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x13, &(0x7f0000b43000), 0x4) sendmsg$inet_sctp(r0, &(0x7f00003e9000-0x38)={&(0x7f00003dd000)=@in={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f00006fe000)=[]}, 0x4008000) sendmsg$inet_sctp(r0, &(0x7f0000aa2000)={&(0x7f0000c81000)=@in6={0xa, 0xffffffffffffffff, 0x0, @loopback={0x0, 0x1}}, 0x1c, &(0x7f0000662000-0x20)=[]}, 0x0) 2018/02/01 16:37:09 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f00000bf000), &(0x7f0000744000), &(0x7f0000bcb000-0x4), &(0x7f0000a11000)) mknod(&(0x7f0000c2a000)='./file0\x00', 0x918, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000451000-0x8)) execve(&(0x7f0000ff1000-0x8)='./file0\x00', &(0x7f00009da000)=[], &(0x7f0000fda000)=[]) truncate(&(0x7f0000ccd000-0x8)='./file0\x00', 0x0) bind(0xffffffffffffffff, &(0x7f000046d000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @empty}, 0x14) perf_event_open(&(0x7f0000271000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) 2018/02/01 16:37:09 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000030000-0x60)={0x0, 0x0, 0x1, @thr={&(0x7f0000b42000), &(0x7f0000508000)}}, &(0x7f00001ea000)) timer_getoverrun(0x0) 2018/02/01 16:37:09 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000045000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f000055b000)=@file={0x1, './file0\x00'}, 0xa) connect$unix(r0, &(0x7f00000bc000)=@abs={0x0, 0x0, 0x0}, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000)=[], 0x80, 0x0) connect$unix(r0, &(0x7f00003de000)=@file={0x1, './file0\x00'}, 0xa) poll(&(0x7f0000085000-0x10)=[{r1, 0xc1a6}], 0x1, 0x58) recvmmsg(r1, &(0x7f0000551000)=[{{&(0x7f00009c5000-0x60)=@nfc_llcp, 0x60, &(0x7f0000a65000-0x5)=[], 0x0, &(0x7f00008da000)=""/32, 0x20}}], 0x1, 0x0, &(0x7f0000510000-0x10)={0x0, 0x1c9c380}) connect$unix(r0, &(0x7f0000681000)=@abs={0x0, 0x0, 0x0}, 0x8) 2018/02/01 16:37:09 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2000000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000687000)=0x5c802861, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000b1a000)=@hopopts={0x0, 0x0, [], []}, 0x8) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000ffc000)=0x1, 0x4) bind$inet6(r0, &(0x7f0000402000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f00007a9000-0x1), 0x0, 0xfffffefffffffffe, &(0x7f0000f63000-0x1c)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/02/01 16:37:09 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000f11000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r0, r1) rt_sigprocmask(0x0, &(0x7f00001b7000-0x8)={0xfffffffffffffffe}, 0x0, 0x8) write(r2, &(0x7f000027f000-0xf0), 0x0) 2018/02/01 16:37:09 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000081e000-0xb)='/dev/loop#\x00', 0x0, 0x0) ioctl(r0, 0x4400004000001276, &(0x7f00002cb000)) 2018/02/01 16:37:09 executing program 3: mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000005000-0x28)={@syzn={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000001000-0x88)=@ethtool_flash={0x33, 0x0, "8313dd05dbd410e772ad7971b18dfc56e4e466f04ec882f993e5cf4f7331331eeae81529839250dd6dea3e89548d4d0e63570a838585a37e76848c04d29ba9823155c2bbb37bad3645a100f02f3aaf3bb083fdf320710543d38b684a30cf9bfa942aa39aab05f5ab119d7e0079c44fea6f5767d98a594339d9a96721428a1041"}}) 2018/02/01 16:37:09 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000010, 0x3, 0x4) sendmsg$nl_xfrm(r0, &(0x7f00009d3000)={&(0x7f0000c15000)={0x10}, 0xc, &(0x7f00001e6000-0x10)={&(0x7f0000934000)=@delsa={0x4c, 0x12, 0x515485708c54ddb, 0xffffffffffffffff, 0xffffffffffffffff, {@in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, [@sec_ctx={0x24, 0x8, {0x1d, 0x8, 0x0, 0x0, 0x15, "69cc8910cf7a5164ef891111a0edabf3991fd93a0d"}}]}, 0x4c}, 0x1}, 0x0) 2018/02/01 16:37:09 executing program 5: mmap(&(0x7f0000000000/0xfed000)=nil, 0xfed000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0x400080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfd0000)=nil, 0xfd0000, 0x1, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fed000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000fee000-0xb)=']*selinux/\x00', 0x0) execveat(r0, &(0x7f0000fc9000-0x8)='./file0\x00', &(0x7f0000fee000-0x20)=[&(0x7f0000fee000-0x18)='procvboxnet0wlan0ppp1[.\x00'], &(0x7f0000fed000)=[], 0x1100) 2018/02/01 16:37:09 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f00000bf000), &(0x7f0000744000), &(0x7f0000bcb000-0x4), &(0x7f0000a11000)) mknod(&(0x7f0000c2a000)='./file0\x00', 0x918, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000451000-0x8)) execve(&(0x7f0000ff1000-0x8)='./file0\x00', &(0x7f00009da000)=[], &(0x7f0000fda000)=[]) truncate(&(0x7f0000ccd000-0x8)='./file0\x00', 0x0) bind(0xffffffffffffffff, &(0x7f000046d000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @empty}, 0x14) perf_event_open(&(0x7f0000271000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) 2018/02/01 16:37:09 executing program 0: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80005, 0x0) getsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000002000-0x4), &(0x7f0000001000)=0x4) 2018/02/01 16:37:09 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f00001a1000)={&(0x7f00004d3000-0xc)={0x10}, 0xc, &(0x7f00006b3000)={&(0x7f0000926000-0x1c)=@ipv6_delroute={0x1c, 0x19, 0x111, 0xffffffffffffffff, 0xffffffffffffffff, {0xa, 0x0, 0x0, 0x0, 0x2}, []}, 0x1c}, 0x1}, 0x0) 2018/02/01 16:37:09 executing program 4: mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x3, 0x32, 0xffffffffffffffff, 0x0) rt_sigqueueinfo(0x0, 0x0, &(0x7f0000004000)={0x0, 0x0, 0xfffffffffffffffb}) 2018/02/01 16:37:09 executing program 4: mmap(&(0x7f0000000000/0xb5a000)=nil, 0xb5a000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000824000-0x6), &(0x7f0000b54000-0x4)=0x6) 2018/02/01 16:37:09 executing program 5: futex(&(0x7f0000006000), 0xc, 0x0, &(0x7f0000006000)={0x0, 0x1c9c380}, &(0x7f0000006000), 0x0) 2018/02/01 16:37:09 executing program 3: 2018/02/01 16:37:09 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000804000)) mknod(&(0x7f00005e3000-0x8)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8b000-0x8)='./file0\x00', &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000009000-0x8)=0x3f) recvfrom$unix(r2, &(0x7f0000bf5000), 0x0, 0x0, &(0x7f0000d94000-0xa)=@abs, 0x8) process_vm_readv(r0, &(0x7f0000bff000-0x10)=[{&(0x7f000004d000)=""/252, 0xfc}], 0x1, &(0x7f0000c6f000-0xa0)=[{&(0x7f00002f1000-0x4f)=""/79, 0x4f}], 0x1, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) exit(0x0) open(&(0x7f00000ed000)='./file0\x00', 0x401, 0x0) 2018/02/01 16:37:09 executing program 3: mmap(&(0x7f0000000000/0x32000)=nil, 0x32000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f000002c000)='/dev/loop#\x00', 0x0, 0x2) ioctl(r0, 0x440000000000127f, &(0x7f000002d000-0x1)) 2018/02/01 16:37:09 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000553000-0x8)='./file0\x00', 0x0) capset(&(0x7f0000fc2000-0x8)={0x4000019980330}, &(0x7f0000002000-0x18)) chdir(&(0x7f0000617000-0x8)='./file0\x00') 2018/02/01 16:37:09 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000706000-0xd)='dns_resolver\x00', &(0x7f00002d0000-0x5)={0x73, 0x79, 0x7a}, &(0x7f0000efb000)="5c252e656d315bd600", 0x0) 2018/02/01 16:37:09 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000b9f000-0xa)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000436000-0x4)=0x82) ioctl$TCSETA(r0, 0x5402, &(0x7f00001f0000+0xe09)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000e06000)={0x0, 0x0, 0x0, 0xfffffffffffffff9}) 2018/02/01 16:37:09 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000068b000)='./file0\x00', 0x0) r0 = open(&(0x7f0000f15000-0x8)='./file0\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f000081e000-0x8)) accept4$packet(r0, &(0x7f000001e000-0x14)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty}, &(0x7f0000242000)=0x14, 0x80000) ioctl$int_out(r0, 0xc0189436, &(0x7f000000a000)) 2018/02/01 16:37:09 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0xffffffffffffffff, 0x800) r1 = epoll_create(0x10001) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000337000-0xc)={0x2019}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f000099d000-0x13)='/proc/self/net/pfkey\x00', 0x801, 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, &(0x7f00009b6000-0x4)=0x3, 0x4) epoll_wait(r1, &(0x7f0000753000-0x18)=[{}], 0x1, 0x0) 2018/02/01 16:37:09 executing program 7: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x3, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f000000d000-0x4), 0x0, 0x0, &(0x7f000000d000)={0x400000000}, &(0x7f0000048000), 0x0) mmap(&(0x7f0000fda000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000fdb000-0x11)='/dev/vga_arbiter\x00', 0x2000, 0x0) r1 = getpgrp(0xffffffffffffffff) mmap(&(0x7f0000fdb000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000fdb000)={0x80, 0x80}) mmap(&(0x7f0000fdb000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mq_notify(r0, &(0x7f0000fdc000-0x60)={0x0, 0xe, 0x2, @tid=r1}) mmap(&(0x7f0000fda000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000fda000), &(0x7f000048a000)=0x4) futex(&(0x7f000000d000-0x4), 0x800000000006, 0x0, &(0x7f0000fd7000-0x10), &(0x7f0000048000), 0x0) getpriority(0x0, r1) 2018/02/01 16:37:09 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbmon(&(0x7f000050d000)='/dev/usbmon#\x00', 0x3, 0x101000) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000e4b000-0x4)=0x401) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f00000d1000-0x18)={0x8001, 0x10001, 0x7, 0x0, 0x100000000, 0x8}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$netlink(r1, &(0x7f0000f40000)={&(0x7f00005ff000)=@kern={0x10}, 0xc, &(0x7f0000413000-0x10)=[{&(0x7f0000cfc000)={0x18, 0x12, 0x201, 0xffffffffffffffff, 0xffffffffffffffff, "", [@generic, @typed={0x8, 0x3}]}, 0x18}], 0x1}, 0x0) 2018/02/01 16:37:09 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) fadvise64(r1, 0x0, 0x3f, 0x1) r2 = add_key$user(&(0x7f00004a6000-0x5)='user\x00', &(0x7f0000773000-0x5)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000221000)="a37cea576aa60295b0a007df974755fe76f374c4761ecd6a049bd03b2f6aeb1d44390ec43137ea3fdd4c6b8ebf2c25a1a81313f8e5d2f4e91e4c455639a17cb37ad6aaf55d3633584a48c433bb64d5cb508bb95a072403009c11c68c06c475bc4421925e65608ef8a233143f52b62b8c0caf054df0", 0x75, 0xffffffffffffffff) r3 = add_key$user(&(0x7f0000e1e000-0x5)='user\x00', &(0x7f000095b000-0x5)={0x73, 0x79, 0x7a, 0x1}, &(0x7f000026b000-0x79)="fecff25711853e9f307bec30fdfa9b7daf2e8d6dfdbf45e6f03c64df93d0175c8178bcd0585301959db631f00f528d4e14141da675bce29607b24f1e3db51ed61e90991e064a4b137f95174b3404395174dad6536ad6f80e7171002eb1cec0012ea3eb71348f3dd4956a1d9c0c7ca4ecb345a27beb6c3fcf08", 0x79, 0xffffffffffffffff) r4 = add_key(&(0x7f00005f1000-0xd)='dns_resolver\x00', &(0x7f0000d5c000-0x5)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000ea7000)="4e7c06beaf743e7b4658dec82f78d3ad48426f26be2a27a7129f664a5a945fee25c3102426740ff67a147ecfed4e4bb829c7a3d8d0027fb906fe74eb184f609f691529bb78f778278cc567222de5a0d35a1f1f589016bad5c30a72f36b8d551900f7ecf6af6e549c6fd29da65581479a9d78871c9e977faa42141c435ca79852cfc6fe7948d356f301a56e8bd887ec478a804ae6a67d898955", 0x99, 0x0) keyctl$dh_compute(0x17, &(0x7f0000473000-0xc)={r2, r3, r4}, &(0x7f0000198000)=""/222, 0xde, &(0x7f0000024000-0x38)={&(0x7f0000b42000-0x40)={'md4-generic\x00'}}) writev(r0, &(0x7f0000e12000-0x10)=[{&(0x7f000027f000)="580000001400192340834b80040d8c560a067fffffff810000000d00000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) r5 = add_key$user(&(0x7f00001ac000)='user\x00', &(0x7f00003dd000-0x5)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000a4f000)="b86bcfa6890a087f4599cbf4f08e48e68f4d359beba4ebc9fb8f8c55062d27aaf3c143d80ad1e4be7bf39ce8dd8407d9cd399f03e0b9c373024934985716daa5e8865b", 0x43, 0xffffffffffffffff) keyctl$assume_authority(0x10, r5) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000d0000-0xe8)={{{@in=@dev, @in=@broadcast}}, {{@in6=@local}, 0x0, @in6=@empty}}, &(0x7f000046c000-0x4)=0xe8) 2018/02/01 16:37:09 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000047000-0x6)='./bus\x00', 0x0) mount(&(0x7f000003d000)='./bus\x00', &(0x7f0000044000-0x6)='./bus\x00', &(0x7f000002d000-0x6)='ramfs\x00', 0x0, &(0x7f0000043000)) chroot(&(0x7f00004ee000-0x6)='./bus\x00') umount2(&(0x7f00009fa000)='./bus\x00', 0x2) [ 35.624444] capability: warning: `syz-executor6' uses 32-bit capabilities (legacy support in use) 2018/02/01 16:37:09 executing program 2: mmap(&(0x7f0000000000/0x3e000)=nil, 0x3e000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000001f000)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000039000-0x8)='./file0\x00', &(0x7f0000019000-0x6)='ramfs\x00', 0x0, &(0x7f000000a000)) r0 = creat(&(0x7f000002d000-0xc)='./file0/bus\x00', 0x0) write(r0, &(0x7f000002d000)="e0", 0x1) getsockname$ax25(r0, &(0x7f000001f000), &(0x7f0000009000)=0x10) mmap(&(0x7f000003e000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f000003e000)=""/76) lseek(r0, 0x0, 0x3) 2018/02/01 16:37:09 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000251000+0xdca), &(0x7f0000744000), &(0x7f00008c8000), &(0x7f0000dad000-0x37)) mknod(&(0x7f0000a2e000-0x8)='./file0\x00', 0x1044, 0x0) execve(&(0x7f000007b000)='./file0\x00', &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = syz_open_procfs(0x0, &(0x7f000042d000-0xc)='io\x00') pread64(r0, &(0x7f00009c4000), 0x0, 0x0) lseek(r0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000be4000-0x8)='./file0\x00', 0x242480, 0x2) preadv(r0, &(0x7f0000be5000-0x40)=[{&(0x7f0000847000-0x2c)=""/7, 0x7}], 0x1, 0x0) open$dir(&(0x7f00003e9000-0x8)='./file0\x00', 0x26102, 0x0) 2018/02/01 16:37:10 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000108000-0x78)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000159000)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000beb000-0x98)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "000000000100000001001bf3ffff00000065000000010000007db0e6f10efbf9a219d8f6aa6bd58d1c43473100e85026e7ff40f9b55bd1b3335d5bffff0001f3", "cfa40005000000f7ffffffff00000000000000ffb833220182ab867d00"}) 2018/02/01 16:37:10 executing program 4: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000000)=0xc) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) get_robust_list(r0, &(0x7f0000000000), &(0x7f0000001000-0x8)=0x18) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000045000-0x10)={0x1, &(0x7f0000883000-0x8)=[{0x6, 0x0, 0x0, 0xffffffff}]}) remap_file_pages(&(0x7f0000949000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0) 2018/02/01 16:37:10 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, &(0x7f0000033000-0x8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f000001c000)='./file0\x00', &(0x7f0000019000-0x6)='ramfs\x00', 0xfffffffffffffffe, &(0x7f000000a000)) r0 = creat(&(0x7f0000016000-0xc)='./file0/bus\x00', 0x0) truncate(&(0x7f0000006000)='./file0/bus\x00', 0x9) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00005cc000)={{0xa, 0x1, 0x4a1, @mcast1={0xff, 0x1, [], 0x1}, 0xee7}, {0xa, 0x2, 0x8, @remote={0xfe, 0x80, [], 0x0, 0xbb}, 0x1}, 0x10000, [0x3f, 0x9, 0x5116, 0x5, 0x10001, 0x6, 0x7fffffff, 0x5]}, 0x5c) 2018/02/01 16:37:10 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00004c1000-0x10)='/selinux/policy\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000014000-0x10)={0x2, &(0x7f000000b000)=[{0x10004c}, {0x6}]}, 0x10) writev(r1, &(0x7f0000009000)=[{&(0x7f000000f000-0x1000)="8f", 0x1}], 0x1) 2018/02/01 16:37:10 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000804000)) mknod(&(0x7f00005e3000-0x8)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8b000-0x8)='./file0\x00', &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000009000-0x8)=0x3f) recvfrom$unix(r2, &(0x7f0000bf5000), 0x0, 0x0, &(0x7f0000d94000-0xa)=@abs, 0x8) process_vm_readv(r0, &(0x7f0000bff000-0x10)=[{&(0x7f000004d000)=""/252, 0xfc}], 0x1, &(0x7f0000c6f000-0xa0)=[{&(0x7f00002f1000-0x4f)=""/79, 0x4f}], 0x1, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) exit(0x0) open(&(0x7f00000ed000)='./file0\x00', 0x401, 0x0) 2018/02/01 16:37:10 executing program 2: mmap(&(0x7f0000000000/0x3e000)=nil, 0x3e000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000001f000)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000039000-0x8)='./file0\x00', &(0x7f0000019000-0x6)='ramfs\x00', 0x0, &(0x7f000000a000)) r0 = creat(&(0x7f000002d000-0xc)='./file0/bus\x00', 0x0) write(r0, &(0x7f000002d000)="e0", 0x1) getsockname$ax25(r0, &(0x7f000001f000), &(0x7f0000009000)=0x10) mmap(&(0x7f000003e000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f000003e000)=""/76) lseek(r0, 0x0, 0x3) 2018/02/01 16:37:10 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f00009e2000-0x78)={0x2, 0x78, 0x8124, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) 2018/02/01 16:37:10 executing program 1: r0 = syz_open_dev$mice(&(0x7f0000383000-0x10)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$ASHMEM_SET_PROT_MASK(r0, 0x40087705, &(0x7f0000f51000)={0x0, 0x9}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000f41000-0x8)={0x0, 0xa39b, 0x200}, &(0x7f0000764000-0x4)=0x8) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=r1, &(0x7f0000001000-0x4)=0x4) mmap(&(0x7f0000000000/0xffe000)=nil, 0xffe000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) epoll_wait(r0, &(0x7f0000fff000-0x18)=[{}, {}], 0x2, 0x6000000000) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x13, &(0x7f0000ffc000-0x4)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f00005e4000-0x4)=0x2, 0x4) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000343000)='/selinux/checkreqprot\x00', 0x622040, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x15, &(0x7f0000ffd000-0x4), 0x4) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00002d7000-0x4)=0x0) perf_event_open(&(0x7f0000eb9000)={0x4, 0x78, 0x2, 0xfffffffffffffff7, 0x44, 0x0, 0x0, 0x1, 0x8000, 0x7, 0x1, 0xe, 0xbea, 0x542e, 0x2, 0x3, 0x9, 0x0, 0x50, 0x7ff, 0x9, 0x5, 0xffff, 0x7, 0xb18, 0x7, 0x5, 0x1, 0x6, 0x1ff, 0x0, 0x3, 0xd2e, 0x80000001, 0x76f, 0x1ff, 0x3, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000a20000), 0xe}, 0x4, 0x1, 0x8000, 0x2, 0x857, 0x7, 0x10000}, r4, 0x9, r3, 0x0) ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f0000bd2000)="4dd0f5504eba5fb3a4b0f812b691884fe75dec352bc76679418eba9ae4eb1231434e7f4796e928f9ac34bd7ca34bb8809c6c70a005782c795ee87e93e207768f7e27fd70dcb419e7e1f18c2b098b29d6a51118ae2268c18fd2cff4bbf6b6f1fdbbba847c54f6c4162bb6d8b563bd35bad2e4b43a67d47b9db7d8479ca22d391568a0cb156873a5bbe19e7cc10ca243a2e2ba05b5d09f20e81478a9b0468fb57601d9cb90ce447501fa2cf399a3bafde278f6174862df3746c65af47065e8ced7fadf73d29dc5768f9607d2d0ab11e1") fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00009ad000)=0x1) 2018/02/01 16:37:10 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000804000)) mknod(&(0x7f00005e3000-0x8)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000f8b000-0x8)='./file0\x00', &(0x7f0000a7c000-0x38)=[], &(0x7f00006fd000-0x10)=[]) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f000000d000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000009000-0x8)=0x3f) recvfrom$unix(r2, &(0x7f0000bf5000), 0x0, 0x0, &(0x7f0000d94000-0xa)=@abs, 0x8) process_vm_readv(r0, &(0x7f0000bff000-0x10)=[{&(0x7f000004d000)=""/252, 0xfc}], 0x1, &(0x7f0000c6f000-0xa0)=[{&(0x7f00002f1000-0x4f)=""/79, 0x4f}], 0x1, 0x0) fcntl$setown(r1, 0x8, r0) fcntl$setsig(r1, 0xa, 0x12) dup2(r1, r2) tkill(r0, 0x16) exit(0x0) open(&(0x7f00000ed000)='./file0\x00', 0x401, 0x0) [ 36.248137] ================================================================== [ 36.255562] BUG: KASAN: double-free or invalid-free in relay_open+0x603/0x860 [ 36.262826] [ 36.264447] CPU: 0 PID: 5772 Comm: syz-executor3 Not tainted 4.9.79-g71f1469 #25 [ 36.271966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.278524] mmap: syz-executor4 (5779) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/02/01 16:37:10 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f00002e7000-0x8), 0x8, 0x0) r1 = gettid() readv(r0, &(0x7f0000939000)=[{&(0x7f0000ac8000-0x80)=""/128, 0x80}], 0x1) ppoll(&(0x7f0000cbc000)=[{0xffffffffffffffff}, {r0, 0x10}], 0x2, &(0x7f00000f6000-0x10)={0x77359400}, &(0x7f0000dbc000), 0x8) sched_setaffinity(r1, 0x8, &(0x7f000068c000)=0xb9) write(r0, &(0x7f0000627000), 0x0) signalfd(r0, &(0x7f00005f4000), 0x8) 2018/02/01 16:37:10 executing program 4: mmap(&(0x7f0000000000/0x17000)=nil, 0x17000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xef) read(r0, &(0x7f000000a000-0xbb)=""/187, 0x329) setsockopt$inet6_int(r0, 0x29, 0x3, &(0x7f0000015000)=0x3, 0xdd) sendto$inet6(r0, &(0x7f0000002000-0x2), 0x21f, 0x0, &(0x7f0000003000)={0xa, 0xffffffffffffffff, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/02/01 16:37:10 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000fda000)) 2018/02/01 16:37:10 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000503000-0x10)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) waitid(0x0, 0xffffffffffffffff, &(0x7f0000d2f000-0x10), 0x0, &(0x7f00000c4000)) [ 36.292743] ffff8801d74678b8 ffffffff81d94829 ffffea0007665b80 ffff8801d996ec80 [ 36.300781] ffff8801da001280 ffffffff8137d893 0000000000000282 ffff8801d74678f0 [ 36.308831] ffffffff8153e083 ffff8801d996ec80 ffffffff8137d893 ffff8801da001280 [ 36.316882] Call Trace: [ 36.319460] [] dump_stack+0xc1/0x128 [ 36.324817] [] ? relay_open+0x603/0x860 [ 36.330436] [] print_address_description+0x73/0x280 [ 36.337095] [] ? relay_open+0x603/0x860 [ 36.342711] [] ? relay_open+0x603/0x860 2018/02/01 16:37:10 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) r2 = syz_open_dev$tun(&(0x7f0000c71000-0xd)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f000014a000)={@common='gre0\x00', @ifru_map={0xfccd}}) readv(r2, &(0x7f0000292000)=[{&(0x7f00000b9000-0x85)=""/133, 0x85}], 0x1) mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000e35000-0x20)={@common='gre0\x00', @ifru_flags=0x301}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000971000-0x10)=@common='gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000589000-0x1), 0x0, 0x20000040, &(0x7f0000d17000)={0x2, 0xffffffffffffffff, @loopback=0x7f000001}, 0x10) 2018/02/01 16:37:10 executing program 0: clock_gettime(0x3054c1aa86432977, &(0x7f0000001000)) 2018/02/01 16:37:10 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$void(0x20) [ 36.348333] [] kasan_report_double_free+0x64/0xa0 [ 36.354826] [] kasan_slab_free+0xa4/0xc0 [ 36.360527] [] kfree+0x103/0x300 [ 36.365532] [] relay_open+0x603/0x860 [ 36.370975] [] do_blk_trace_setup+0x3e9/0x950 [ 36.377108] [] blk_trace_setup+0xe0/0x1a0 [ 36.382897] [] ? do_blk_trace_setup+0x950/0x950 [ 36.389196] [] ? disk_name+0x98/0x100 [ 36.394624] [] blk_trace_ioctl+0x1de/0x300 [ 36.400489] [] ? compat_blk_trace_setup+0x250/0x250 [ 36.407140] [] ? avc_has_extended_perms+0x3fc/0xf10 [ 36.413781] [] ? get_futex_key+0x1050/0x1050 [ 36.419823] [] ? putname+0xee/0x130 [ 36.425096] [] blkdev_ioctl+0xb00/0x1a60 [ 36.430786] [] ? blkpg_ioctl+0x930/0x930 [ 36.436471] [] ? __lock_acquire+0x629/0x3640 [ 36.442498] [] ? do_futex+0x3f8/0x15c0 [ 36.448009] [] ? debug_check_no_obj_freed+0x154/0xa10 [ 36.454825] [] block_ioctl+0xde/0x120 [ 36.460259] [] ? blkdev_fallocate+0x440/0x440 [ 36.466390] [] do_vfs_ioctl+0x1aa/0x1140 [ 36.472078] [] ? ioctl_preallocate+0x220/0x220 [ 36.478281] [] ? selinux_file_ioctl+0x355/0x530 [ 36.484569] [] ? selinux_capable+0x40/0x40 [ 36.490423] [] ? __fget+0x201/0x3a0 [ 36.495669] [] ? __fget+0x228/0x3a0 [ 36.500914] [] ? __fget+0x47/0x3a0 [ 36.506078] [] ? security_file_ioctl+0x89/0xb0 [ 36.512280] [] SyS_ioctl+0x8f/0xc0 [ 36.517444] [] entry_SYSCALL_64_fastpath+0x29/0xe8 [ 36.523988] [ 36.525586] Allocated by task 5772: [ 36.529185] save_stack_trace+0x16/0x20 [ 36.533134] save_stack+0x43/0xd0 [ 36.536559] kasan_kmalloc+0xad/0xe0 [ 36.540248] kmem_cache_alloc_trace+0xfb/0x2a0 [ 36.544800] relay_open+0x91/0x860 [ 36.548310] do_blk_trace_setup+0x3e9/0x950 [ 36.552610] blk_trace_setup+0xe0/0x1a0 [ 36.556553] blk_trace_ioctl+0x1de/0x300 [ 36.560584] blkdev_ioctl+0xb00/0x1a60 [ 36.564443] block_ioctl+0xde/0x120 [ 36.568037] do_vfs_ioctl+0x1aa/0x1140 [ 36.571892] SyS_ioctl+0x8f/0xc0 [ 36.575233] entry_SYSCALL_64_fastpath+0x29/0xe8 [ 36.579962] [ 36.581560] Freed by task 5772: [ 36.584811] save_stack_trace+0x16/0x20 [ 36.588753] save_stack+0x43/0xd0 [ 36.592174] kasan_slab_free+0x72/0xc0 [ 36.596031] kfree+0x103/0x300 [ 36.599200] relay_destroy_channel+0x16/0x20 [ 36.603581] relay_open+0x5ea/0x860 [ 36.607178] do_blk_trace_setup+0x3e9/0x950 [ 36.611470] blk_trace_setup+0xe0/0x1a0 [ 36.615412] blk_trace_ioctl+0x1de/0x300 [ 36.619443] blkdev_ioctl+0xb00/0x1a60 [ 36.623304] block_ioctl+0xde/0x120 [ 36.626914] do_vfs_ioctl+0x1aa/0x1140 [ 36.630772] SyS_ioctl+0x8f/0xc0 [ 36.634111] entry_SYSCALL_64_fastpath+0x29/0xe8 [ 36.638830] [ 36.640429] The buggy address belongs to the object at ffff8801d996ec80 [ 36.640429] which belongs to the cache kmalloc-512 of size 512 [ 36.653053] The buggy address is located 0 bytes inside of [ 36.653053] 512-byte region [ffff8801d996ec80, ffff8801d996ee80) [ 36.664719] The buggy address belongs to the page: [ 36.669625] page:ffffea0007665b80 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 36.679806] flags: 0x8000000000004080(slab|head) [ 36.684536] page dumped because: kasan: bad access detected [ 36.690213] [ 36.691813] Memory state around the buggy address: [ 36.696711] ffff8801d996eb80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.704037] ffff8801d996ec00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.711368] >ffff8801d996ec80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.718699] ^ [ 36.722035] ffff8801d996ed00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.729361] ffff8801d996ed80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 36.736687] ================================================================== [ 36.744013] Disabling lock debugging due to kernel taint [ 36.754490] Kernel panic - not syncing: panic_on_warn set ... [ 36.754490] [ 36.761880] CPU: 1 PID: 5772 Comm: syz-executor3 Tainted: G B 4.9.79-g71f1469 #25 [ 36.770595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.779918] ffff8801d7467810 ffffffff81d94829 ffffffff8419709f ffff8801d74678e8 [ 36.787890] ffff8801da001200 ffffffff8137d893 0000000000000282 ffff8801d74678d8 [ 36.795854] ffffffff8142f531 0000000041b58ab3 ffffffff8418ab10 ffffffff8142f375 [ 36.803824] Call Trace: [ 36.806384] [] dump_stack+0xc1/0x128 [ 36.811722] [] ? relay_open+0x603/0x860 [ 36.817315] [] panic+0x1bc/0x3a8 [ 36.822301] [] ? percpu_up_read_preempt_enable.constprop.53+0xd7/0xd7 [ 36.830502] [] ? preempt_schedule+0x25/0x30 [ 36.836441] [] ? ___preempt_schedule+0x16/0x18 [ 36.842644] [] ? relay_open+0x603/0x860 [ 36.848234] [] ? relay_open+0x603/0x860 [ 36.853830] [] kasan_end_report+0x50/0x50 [ 36.859597] [] kasan_report_double_free+0x81/0xa0 [ 36.866058] [] kasan_slab_free+0xa4/0xc0 [ 36.871738] [] kfree+0x103/0x300 [ 36.876724] [] relay_open+0x603/0x860 [ 36.882144] [] do_blk_trace_setup+0x3e9/0x950 [ 36.888256] [] blk_trace_setup+0xe0/0x1a0 [ 36.894030] [] ? do_blk_trace_setup+0x950/0x950 [ 36.900320] [] ? disk_name+0x98/0x100 [ 36.905738] [] blk_trace_ioctl+0x1de/0x300 [ 36.911591] [] ? compat_blk_trace_setup+0x250/0x250 [ 36.918226] [] ? avc_has_extended_perms+0x3fc/0xf10 [ 36.924871] [] ? get_futex_key+0x1050/0x1050 [ 36.930900] [] ? putname+0xee/0x130 [ 36.936147] [] blkdev_ioctl+0xb00/0x1a60 [ 36.941827] [] ? blkpg_ioctl+0x930/0x930 [ 36.947512] [] ? __lock_acquire+0x629/0x3640 [ 36.953538] [] ? do_futex+0x3f8/0x15c0 [ 36.959045] [] ? debug_check_no_obj_freed+0x154/0xa10 [ 36.965858] [] block_ioctl+0xde/0x120 [ 36.971278] [] ? blkdev_fallocate+0x440/0x440 [ 36.977392] [] do_vfs_ioctl+0x1aa/0x1140 [ 36.983071] [] ? ioctl_preallocate+0x220/0x220 [ 36.989273] [] ? selinux_file_ioctl+0x355/0x530 [ 36.995559] [] ? selinux_capable+0x40/0x40 [ 37.001412] [] ? __fget+0x201/0x3a0 [ 37.006655] [] ? __fget+0x228/0x3a0 [ 37.011900] [] ? __fget+0x47/0x3a0 [ 37.017059] [] ? security_file_ioctl+0x89/0xb0 [ 37.023258] [] SyS_ioctl+0x8f/0xc0 [ 37.028418] [] entry_SYSCALL_64_fastpath+0x29/0xe8 [ 37.035404] Dumping ftrace buffer: [ 37.038916] (ftrace buffer empty) [ 37.042594] Kernel Offset: disabled [ 37.046192] Rebooting in 86400 seconds..