[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [ 16.173588] random: sshd: uninitialized urandom read (32 bytes read, 32 bits of entropy available) [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 20.984234] random: sshd: uninitialized urandom read (32 bytes read, 38 bits of entropy available) [ 21.275647] random: sshd: uninitialized urandom read (32 bytes read, 38 bits of entropy available) [ 22.271491] random: sshd: uninitialized urandom read (32 bytes read, 116 bits of entropy available) Warning: Permanently added 'ci-android-44-kasan-gce-1,10.128.15.221' (ECDSA) to the list of known hosts. [ 27.660064] random: sshd: uninitialized urandom read (32 bytes read, 126 bits of entropy available) 2017/12/25 06:27:56 fuzzer started 2017/12/25 06:27:56 dialing manager at 10.128.0.26:38599 [ 28.360688] random: nonblocking pool is initialized 2017/12/25 06:28:00 kcov=true, comps=false 2017/12/25 06:28:00 executing program 0: 2017/12/25 06:28:00 executing program 1: 2017/12/25 06:28:00 executing program 2: 2017/12/25 06:28:00 executing program 5: 2017/12/25 06:28:00 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = syz_open_dev$sg(&(0x7f000092c000-0x9)='/dev/sg#\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000f0a000-0xc)={0x0, 0x0}) 2017/12/25 06:28:00 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, &(0x7f0000aae000-0x80)=[{&(0x7f0000007000)="85f56da21924bbcbf47f964fa3142d488500000007b277cf8fd3ad8c7edff3a34c050c9c774411696c832361e4", 0x2d}], 0x1) r0 = syz_open_dev$sg(&(0x7f0000746000-0x9)='/dev/sg#\x00', 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000228000)={0x0, 0x0, &(0x7f00005f5000-0x10)=[{&(0x7f0000007000)=[{0x10, 0x0, 0x0, 0x0, 0x0, ""}], 0x10}], 0x1, &(0x7f00007ee000-0x28)=[], 0x0, 0x0}, 0x0) ioctl(r0, 0x2285, &(0x7f0000007000)='S') 2017/12/25 06:28:00 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00006d1000)={0x2, 0x78, 0x31, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f00008d1000-0x4)=0x10000000000001, 0x4) close(r0) 2017/12/25 06:28:00 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f00007d9000-0x1)=""/1, &(0x7f0000c95000-0x4)=0x1) [ 32.885795] IPVS: Creating netns size=2552 id=1 [ 33.061623] IPVS: Creating netns size=2552 id=2 [ 33.097933] IPVS: Creating netns size=2552 id=3 [ 33.124281] IPVS: Creating netns size=2552 id=4 [ 33.153683] IPVS: Creating netns size=2552 id=5 [ 33.196815] IPVS: Creating netns size=2552 id=6 [ 33.226608] IPVS: Creating netns size=2552 id=7 [ 33.257229] IPVS: Creating netns size=2552 id=8 2017/12/25 06:28:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00003c2000-0x8)='./file0\x00', 0x0) mount(&(0x7f00006d3000)='./file0\x00', &(0x7f0000236000-0x8)='./file0\x00', &(0x7f0000319000)='ramfs\x00', 0xd, &(0x7f00000e5000-0x2)="") chmod(&(0x7f0000fbd000-0x8)='./file0\x00', 0x10) 2017/12/25 06:28:02 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000fcb000-0x10)={0x2, 0x0, @rand_addr=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) r2 = syz_open_dev$tun(&(0x7f00007b1000-0xd)='/dev/net/tun\x00', 0x0, 0xa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000a5b000-0x28)={@common='gre0\x00', @ifru_names=@generic="4f54000cc0a1ed4f3a0a1fdc222073b5"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000630000-0x20)={@common='gre0\x00', @ifru_flags=0x301}) write$tun(r2, &(0x7f0000d0b000-0x41f)=@hdr={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x11, 0x0, @local={0xac, 0x14, 0x0, 0xaa}, @broadcast=0xffffffff, {[]}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b31d90", 0x0, "b99878"}, "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"}}}, 0x41f) poll(&(0x7f0000a61000)=[{r1, 0x0, 0x0}], 0x1, 0x0) 2017/12/25 06:28:02 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000109000+0x282)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000216000)='./file0\x00', &(0x7f0000019000-0x6)='ramfs\x00', 0x50, &(0x7f0000ffb000)="") r0 = creat(&(0x7f0000139000)='./file0/bus\x00', 0xbc9dc8fbd81cb4b1) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1, 0x0, 0x0, 0x0, 0x0}) accept$packet(r0, &(0x7f000028e000-0x14)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, [0x0, 0x0]}, &(0x7f00004c3000-0x4)=0x14) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000523000)=@int=0x7ff, 0x4) unshare(0x40600) pwritev(r0, &(0x7f00001df000-0x8)=[{&(0x7f0000cff000-0xc8)="81", 0x1}], 0x1, 0x0) clone(0x0, &(0x7f0000445000)="", &(0x7f0000f1d000-0x4)=0x0, &(0x7f0000d5a000)=0x0, &(0x7f00002a7000)="") r1 = creat(&(0x7f00001d4000-0xc)='./file0/bus\x00', 0x0) dup2(r1, r0) 2017/12/25 06:28:02 executing program 1: mmap(&(0x7f0000001000/0xffe000)=nil, 0xffe000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000014000)='./file0\x00', 0xffffffffffffffff) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) execve(&(0x7f0000001000-0x8)='./file0\x00', &(0x7f000081d000)=[&(0x7f0000000000)='emd5sumeth0vmnet1,\x00', &(0x7f0000000000)='em0em0proc\\lo)\x00', &(0x7f0000bfc000-0x8)=',md5sum\x00', &(0x7f0000001000-0xc)="5e65746831282f2ddc257b00", &(0x7f0000033000-0x5)='eth1\x00', &(0x7f0000f37000)='trusted\x00', &(0x7f0000001000-0xf)='^bdevnodev\\(\'/\x00', &(0x7f0000001000-0x6)='user%\x00'], &(0x7f0000001000-0x8)=[&(0x7f0000001000-0x6)='wlan0\x00']) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000015000-0x8)='./file0\x00', &(0x7f0000014000)='ramfs\x00', 0x0, &(0x7f000000a000)="") r0 = openat(0xffffffffffffff9c, &(0x7f0000013000-0x8)='./file0\x00', 0x0, 0x0) socketpair$inet6(0xa, 0x6, 0x50, &(0x7f000022f000)={0x0, 0x0}) linkat(0xffffffffffffffff, &(0x7f00006f2000-0x1)='/', r0, &(0x7f0000f73000)='./file1\x00', 0x0) clone(0x2080000, &(0x7f0000929000)="a9aaba1981aabebd126e87464a0b4f2e3a18a263039ca87b3369f30091c8dc16a36ed0f5dc97913f4668e0b4731deacbabb0423da68002594134f829b46e72f5f551fd2465cf5355ee8e30e67c849fea76acd50bd9fd7ea02092da52d7d82017c901c2e127b69444f3032be67a276cb4dab77ea269275c26994df5e315", &(0x7f00000a0000-0x4)=0x0, &(0x7f00005bc000-0x4)=0x0, &(0x7f000024c000-0x78)="257c741246d07fd21fbe43ffba534253aaedab6e497a0ea5c62140b953d91b13eca6a9cbe93a4977515054905a489780535eed0dc3064a809356a15d08946770cdb75752ea5a68cfc46024d1fac456a4d113f2b2eb55361cb8e9e5dae66ffc89cd6caae03b6826f4956252cf91d19ce67dccc3ede489e44a") epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f000045a000-0xc)={0x20000001, 0x0}) 2017/12/25 06:28:02 executing program 5: r0 = syz_open_dev$tun(&(0x7f0000362000)='/dev/net/tun\x00', 0x0, 0xa) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00008fd000+0xe03)={@common='gre0\x00', @ifru_addrs=@sco={0x1f, {0xa6c2, 0x6, 0x1ff, 0x1, 0x77f72173, 0x5}}}) write$tun(r1, &(0x7f000095f000-0xfea)=@hdr={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x0, 0xaa}, @local={0xac, 0x14, 0x0, 0xaa}, {[]}}, @udp={0x0, 0x0, 0x8, 0x0, ""}}}, 0x26) 2017/12/25 06:28:02 executing program 4: getpriority(0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000765000-0x8)='./file0\x00', 0x101081, 0x14) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sync() getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000ff3000)={0x0, 0x2e}, &(0x7f0000000000)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f000090e000-0x8c)={r1, @in={{0x2, 0x1, @local={0xac, 0x14, 0x0, 0xaa}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x8c) 2017/12/25 06:28:02 executing program 6: sync() mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f0000000000)={0x0, 0x0}) readahead(r0, 0x0, 0x7) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000000)={0xf4, {{0x2, 0x0, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x90) openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000001000-0x15)='/dev/pktcdvd/control\x00', 0x8000, 0x0) 2017/12/25 06:28:02 executing program 3: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000cc2000-0x8)={0x0, 0x0}) flock(r0, 0x8) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f60000-0x20)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1, 0x0, 0x0, 0x0}, 0x20) 2017/12/25 06:28:02 executing program 5: exit(0xfffffffffffffbff) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001000-0xc)='/dev/autofs\x00', 0x10000, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000001000)={0x810000004, 0x0}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000002000)={0xaa, 0x0, 0x0}) epoll_create(0x9) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1, 0x0}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000012000-0x2e)=[{0x0, 0x0, 0x0, 0x0, @tick=0x0, {0x0, 0x0}, {0x0, 0x0}, @connect={{0x0, 0x0}, {0x0, 0x0}}}], 0x30) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) chmod(&(0x7f00008e0000)='./file0\x00', 0x10000000000008) r3 = open(&(0x7f0000c72000-0x8)='./file0\x00', 0x1c1000, 0x2) getsockopt$sock_int(r3, 0x1, 0x23, &(0x7f0000667000)=0x0, &(0x7f00009bb000)=0x4) socket(0x10, 0x5, 0x7) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f0000002000-0x10)={&(0x7f0000011000/0x3000)=nil, 0x3000}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r2, 0xc0605345, &(0x7f0000532000)={0x8000, 0x0, {0x2, 0x1000000000003, 0x41, 0x3, 0x1000000002}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 33.376761] device gre0 entered promiscuous mode 2017/12/25 06:28:02 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x9, 0x0) clock_gettime(0x0, &(0x7f0000f6d000)={0x0, 0x0}) r2 = eventfd(0xe2) timerfd_settime(r0, 0x0, &(0x7f0000005000)={{0x0, r1+10000000}, {0x0, r1}}, &(0x7f0000001000-0x20)={{0x0, 0x0}, {0x0, 0x0}}) readv(r0, &(0x7f000018c000)=[{&(0x7f000022d000-0x96)=""/8, 0x8}], 0x1) tee(r2, r0, 0x1, 0x4) r3 = openat$selinux_access(0xffffffffffffff9c, &(0x7f000066b000-0x10)='/selinux/access\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000333000-0x4)=0x3b, 0x4) r4 = accept4(0xffffffffffffff9c, &(0x7f00004e8000+0xd90)=@ethernet={0x0, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000843000)=0x10, 0x0) getpeername$netlink(r4, &(0x7f00007b5000)={0x0, 0x0, 0x0, 0x0}, &(0x7f0000ac4000-0x4)=0xc) 2017/12/25 06:28:02 executing program 0: mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000da6000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000da7000-0x9)='/dev/ppp\x00', 0x40, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000693000-0x8)=0x8) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000031000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) fdatasync(r0) mmap(&(0x7f00001b3000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfb4000)=nil, 0xfb4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2017/12/25 06:28:02 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000b11000)={0x13, 0xd4, &(0x7f00001e3000-0xd4)="5e2b89af0ba0e7b13afe4c0755c235c20115ef02910e86c7d4f730627d3e736d1475319e125c7fc28b52a55ae51dd78413ab3ea5163b73b2cd1d518cac1c2f63979d2f040b05d5315d89f178913feedddaedf91340a24f65c5c86bcf7401af818ec62a5932d2e3aa7fcf7ef5007754eaa12321731646a30294eb01d60058077deb0249a928e19d197cd9a54e1096d5fe3cf566e1c7eff9d1567e1cea9868beff839bb1a8c73f14ca76e0798c574fe0b151a3a6c777796e9264c5145abe21c4715b8639b6388e02171192fd1d93bdd3d4ba6f14bb"}) r1 = request_key(&(0x7f000018c000-0xc)='cifs.spnego\x00', &(0x7f0000c96000)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00002ae000)='vboxnet1*+nodevvboxnet0\'\x00', 0xfffffffffffffffd) r2 = request_key(&(0x7f0000477000-0xc)='id_resolver\x00', &(0x7f0000a59000)={0x73, 0x79, 0x7a, 0x2, 0x0}, &(0x7f0000866000)='\x00', r1) rmdir(&(0x7f0000802000-0x8)='./file0\x00') syz_open_dev$sg(&(0x7f00000d7000)='/dev/sg#\x00', 0x6, 0x8800) keyctl$reject(0x13, r1, 0x9, 0x7, r2) r3 = syz_open_dev$evdev(&(0x7f0000073000-0x12)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f000095a000)={0x0, 0x1, &(0x7f0000686000-0xe2)="c7"}) 2017/12/25 06:28:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x80002, 0x0) vmsplice(r0, &(0x7f0000cb5000)=[], 0x0, 0x5) ioctl$sock_ifreq(r0, 0x8927, &(0x7f0000dc1000-0x28)={@common='lo\x00', @ifru_ivalue=0x0}) 2017/12/25 06:28:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x1, 0xffffffffffffffff) ioctl$LOOP_SET_FD(r1, 0x4030582a, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000a86000-0x20)={0x1, 0x9, 0x0, 0x200, 0x7, 0x0, 0x7f, 0x10001, 0x0}, &(0x7f0000465000-0x4)=0x20) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000001000-0x8)={r2, 0x5}, &(0x7f0000000000)=0x8) fdatasync(r0) 2017/12/25 06:28:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x802, 0x0) sendmsg(r0, &(0x7f0000f04000-0x38)={&(0x7f0000917000)=@in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0x6}, 0x1c, &(0x7f0000c03000-0x60)=[], 0x0, &(0x7f000056d000-0x260)=[{0x28, 0x29, 0x2, "1d1a2d4b9e98516e9605010e3332518578"}], 0x28, 0x0}, 0x0) getsockopt$sock_buf(r0, 0x1, 0x3f, &(0x7f0000b91000)=""/37, &(0x7f000034f000)=0x25) getsockname$packet(r0, &(0x7f00001b0000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, &(0x7f0000a5f000)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000acc000)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0x4, 0x4, 0x6, 0x400, 0xbfb1, 0x200000, r1}) 2017/12/25 06:28:02 executing program 3: mmap(&(0x7f0000000000/0xf58000)=nil, 0xf58000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000d76000)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_flags=0x200}) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000f57000)=""/4096, &(0x7f0000aef000-0x4)=0x1000) 2017/12/25 06:28:02 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000fcb000-0x10)={0x2, 0x0, @rand_addr=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) r2 = syz_open_dev$tun(&(0x7f00007b1000-0xd)='/dev/net/tun\x00', 0x0, 0xa) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000a5b000-0x28)={@common='gre0\x00', @ifru_names=@generic="4f54000cc0a1ed4f3a0a1fdc222073b5"}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000630000-0x20)={@common='gre0\x00', @ifru_flags=0x301}) write$tun(r2, &(0x7f0000d0b000-0x41f)=@hdr={0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={{0x5, 0x4, 0x0, 0x0, 0x415, 0x0, 0x0, 0x0, 0x11, 0x0, @local={0xac, 0x14, 0x0, 0xaa}, @broadcast=0xffffffff, {[]}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "b31d90", 0x0, "b99878"}, "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"}}}, 0x41f) poll(&(0x7f0000a61000)=[{r1, 0x0, 0x0}], 0x1, 0x0) 2017/12/25 06:28:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x540f, &(0x7f000094c000)=0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f000090f000-0x8)={0x0, 0x0}) setsockopt(r1, 0x8, 0x8, &(0x7f0000f3e000-0xa3)="8bad94827eb7293627ebcc5638e710d46371c9362ed134d007c926b97b69e4c17c2a52cde6b6b25bf0d3629d6f7f3c3b7b3c4878ef42cb0f3e64344f810920008572bbd9d42b768e074c5d47b4b22ff03e82cd2b5020591b68cdcf7e92cf4c79e0e89551fc9a416039d3f9bf36a4cd1f08990d98085203d5c279a1e2724683ac27f7c3129891ae8dc0bdb80dd8b4b8d32b912f19616dcab50fdd073d6d65ac0ad994dc", 0xa3) r2 = getpid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000b79000-0x8)={0x0, 0x0}) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000d28000-0xd)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000c1f000)={0x0, 0x7fff}, &(0x7f0000372000)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xa, &(0x7f000053e000-0x20)={0x8, 0x8, 0x2, 0x1, 0x7fffffff, 0x1, 0x12, 0x96, r5}, &(0x7f0000af9000)=0x20) r6 = syz_open_procfs(r3, &(0x7f0000fde000-0x9)='net/unix\x00') lstat(&(0x7f00007db000-0x8)='./file0\x00', &(0x7f0000f7a000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x12, &(0x7f000028b000-0x4)=0x0, &(0x7f0000031000-0x4)=0x4) getresgid(&(0x7f00007e0000-0x4)=0x0, &(0x7f0000073000)=0x0, &(0x7f0000c98000-0x4)=0x0) lstat(&(0x7f00009ce000)='./file0\x00', &(0x7f00003d3000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000f69000)='./file0\x00', &(0x7f00003b8000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00008af000-0x8)='./file0\x00', &(0x7f0000a1b000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000e67000+0xaf5)='./file1\x00', &(0x7f0000a51000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000c4b000-0x4)=0x0, &(0x7f00001aa000-0x4)=0x0, &(0x7f0000b6a000)=0x0) sendmsg$netlink(r6, &(0x7f0000caf000)={&(0x7f0000b99000-0xc)={0x0, 0x0, 0x358c, 0x100000001}, 0xc, &(0x7f0000694000-0x30)=[{&(0x7f000057f000-0x54)=[{0x25, 0x100, 0x200, 0x344, 0x0, "0eb6cb790170c131dbb93a22f3947c30087ef8174e"}, {0x2f, 0x7, 0x300, 0x4, 0xb11, "bcf7fdc617cab6dc94405d0b0075cd110688ccb4aa05fc0306661aff2a5d4f"}], 0x54}, {&(0x7f0000f00000)=[{0x26, 0x8, 0x600, 0x1, 0xbc, "bb8468e93afe37ecf762a4003652180ce6ee35fb79da"}, {0x32, 0x100, 0xf1c, 0x1be, 0x7, "2b7ec6827737d7446a90bfdaeae969052ddd5097cfe025333a7bf80866bc2fed42b4"}, {0x93, 0x1, 0x400, 0x389, 0x5, "5c0a80de236f7acd05c1a401bef40c61498645e810e315078129f97b8fe7186e79b213cd5debaff8b22132e7095cf0decdc8d4a30593b28a5a054bb58937af800d22987f9dc738e3a449c21b28d2b6bc2a8a42118ec973a6e401423dfc5149c37395462051f5d2853817c612409fc7e12fbc8f5fbecfcc750ca7eb397f595be0c16bee"}, {0xef, 0x1ff, 0x210, 0xf26d, 0x2, "737964a71c4e3bb72306024201a2aa282199548fd7ab363097f437e86b2170a48ec1f0d8667e69ed69078e13eb8760a036cda89d3aa056a3ad664cb6ee078f9c185a43afaa7ce7ef3a409c074b769b3609a9ce2b492326420818edf4854793c342fd410196f91391b2f846d5ab625069f326f5fc84b6994fa39a22073f53c0c59ce832135813dcfcb2ce7e56b9513bc298bad247fe7c9fa87b7d6c4be74d74281419a8930eafed30f5ff8e758752b9eeb572de336b9dfd1c2d15c5d6cdeb1f2da65210e36e1161c67cce31002dc47e8ed95692af64b896940fb922528b66e0"}, {0x6d, 0x1, 0x400, 0x0, 0x4, "9cecca79d0dd295a2df2f9f612cf700c1a6b602552d7191734cd5c072291a5ee95500da405284eb085340c8b0fb54caf2524a0baa9d6d59480285a6ab18a74a5389d16a7b361b47f693c900192c9349ebbddf5fbb4f525bf8de86483a2"}], 0x247}, {&(0x7f00002c5000)=[{0x98, 0xd54d, 0x800, 0x2de, 0x3, "1d2171f5aa991837dd1c477c40970ae261ae7eb442781d8c1ea5bb7efced71940d2ae2e2293c2acac9c683aa28f30230ec49765e200d6bb0da6ea371a643575d9d0af5a805c252617ba2099d4d5e10b351090f53aac233bcba33823529920a7e769b0abfdece3435287c0a5efdf97a34f58044cd8bb02e868c78c5966e148773dd82f6f690fa92e4"}, {0xef, 0xfff, 0x102, 0x8000, 0x2, "16577c3c07a199e4b2fe6da2624f2863dba762a22873877773ce67d4b745c71592b4f19bebce85192431cb8cf4293031744193488092f658f1b955a5b3f60f6c9c46cc28ec1e5468816230b1cf4a68d35e9e0d2f11c7c5ddad01f6c9aaf6498e23eef51d26e033d40d62fe0556b2f4a0b4c0058d92664e27d927b683c5e52e01117175990514e2afea34bcdf5bd5a09bd7e0c319e971c655840d7871ff91182d42ccf494edf95617147e05b8c697e84c6f4a928f3c3cc80450a27d3803b0df1108fa27b571a414b65ab1b7b839cf7935a4a07eda5e7fa36b1d673cd51d3bf9"}, {0xef, 0x7, 0x1, 0x1, 0x2, "2869446ab90eac8dd3ef267ada1959510ee185341a5e541e74a1299315dcf5db2e492726cf3f36c3e2dbb4c415a5310ca79066a70260ce067dcc8c4dd9d7cfb4077c02cb286bf45009ec789f6abc690e3d212a2aef9245bb332682dc513c5e963ddff85d2b6ed4e1878389e9619ca1baa630c0b7b65b2dbba5fbf1f9a7cfc32f7904d3738f58f9ae1da7dc2c4674c80e2ab717070c87c4f0cf6ae47a65973ea272086339b39e8ce02f71d581942e843b6466ff53a563a4316934026aae03e15e502a9fa06d6486422a817ccf56716990bc8739d55500e26ceaf9789bbbc273"}, {0x70, 0x0, 0x0, 0x0, 0x7, "049baa6e34e3eae7fd113d29989229aa5aa474fe2357fb441d858d742d0fd4d06f06bd1a8a4e96713d858b8e6b6360628c4768d61988a1a9cbbc9d935391e6ed27f65b0468b2cd41d8ad3e4a9bb251751c17d688ec46cc143aa0d44cb451abfd"}], 0x2e6}], 0x3, &(0x7f000063b000-0xa8)=[@rights={0x20, 0x1, 0x1, [r0, r1, r6]}, @cred={0x20, 0x1, 0x2, r3, r7, r8}, @cred={0x20, 0x1, 0x2, r3, r9, r10}, @rights={0x28, 0x1, 0x1, [r0, r1, r0, r1, r1, r6]}, @cred={0x20, 0x1, 0x2, r2, r11, r12}], 0xa8, 0x4}, 0x404c010) ioctl$int_out(r6, 0x5460, &(0x7f0000340000)=0x0) ioctl$EVIOCGSND(r6, 0x8040451a, &(0x7f00000c7000-0x9)=""/9) 2017/12/25 06:28:02 executing program 0: seccomp(0x1, 0x0, &(0x7f0000a0f000-0x10)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xfffffffffffffffb}]}) 2017/12/25 06:28:02 executing program 6: r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000cb4000-0xe)='/selinux/user\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000001000-0x6)={0x0, 0x3ff}, &(0x7f000033c000)=0x6) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000001000-0x8)=@assoc_value={r1, 0x2}, 0x8) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000001000)=0x3) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000000)=0x9, 0x4) mmap(&(0x7f0000000000/0xfdb000)=nil, 0xfdb000, 0x3, 0x32, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00007e6000)={0x2, 0x3, @rand_addr=0x15e, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) mmap(&(0x7f0000fdb000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f000000d000-0x4)=0x0, 0x8000800000000005, 0x0, &(0x7f0000920000)={0x0, 0xfffffffffffffffc}, &(0x7f0000fdb000)=0x0, 0x3fffffd) 2017/12/25 06:28:02 executing program 4: openat$selinux_policy(0xffffffffffffff9c, &(0x7f000023e000)='/selinux/policy\x00', 0x0, 0x0) linkat(0xffffffffffffffff, &(0x7f00005cd000-0x8)='./file0\x00', 0xffffffffffffffff, &(0x7f0000174000-0x1)='./file0\x00', 0x400) 2017/12/25 06:28:02 executing program 0: mmap(&(0x7f0000000000/0xf6e000)=nil, 0xf6e000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0}, 0xc) r1 = creat(&(0x7f0000845000-0x8)='./file0\x00', 0x0) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000c17000-0x4)=0x0) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000a7d000-0x14)={0x7fff, 0xb1fb, 0x9, 0x7, 0x3}, 0x14) mmap(&(0x7f0000f6e000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f6e000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f6e000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f6f000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$TIOCSCTTY(r1, 0x540e, 0x8) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000f6f000)=""/26) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f000028b000-0x40)={&(0x7f0000f6e000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f000066d000)=[0x0, 0x0], &(0x7f0000f6f000-0x18)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000f6f000-0x16)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x9, 0x2, 0x6, 0x7, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f000067d000-0x18)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x1, [@empty=0x0]}, 0x14) [ 33.609368] device gre0 entered promiscuous mode 2017/12/25 06:28:02 executing program 2: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000850000)=@generic={0x0, ""/126}, &(0x7f0000001000-0x4)=0x80) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000)=0x0, &(0x7f0000001000-0x4)=0x4) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000571000)='/dev/loop#\x00', 0x0, 0x0) ioctl(r1, 0x4000000000001276, &(0x7f000013a000-0x1)="") 2017/12/25 06:28:02 executing program 1: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00009fd000-0x10)='/selinux/create\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000001000-0x4)=0x9, 0x4) get_thread_area(&(0x7f0000fc7000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000)={0x81, 0x8}, 0x8) 2017/12/25 06:28:02 executing program 3: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000000)=0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x10) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000001000)=""/152) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) process_vm_readv(r0, &(0x7f0000000000)=[{&(0x7f0000000000)=""/198, 0xc6}, {&(0x7f0000000000)=""/218, 0xda}, {&(0x7f0000001000-0x1000)=""/4096, 0x1000}, {&(0x7f0000000000)=""/34, 0x22}], 0x4, &(0x7f000098e000-0x60)=[{&(0x7f0000000000)=""/109, 0x6d}, {&(0x7f0000001000-0x74)=""/116, 0x74}, {&(0x7f0000b99000)=""/208, 0xd0}, {&(0x7f0000749000-0xb5)=""/181, 0xb5}, {&(0x7f0000000000)=""/13, 0xd}, {&(0x7f00003f4000-0x58)=""/88, 0x58}], 0x6, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(r0, &(0x7f0000002000-0x9)='net/tcp6\x00') mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000002000-0x8)=[0x8000, 0x400]) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00009f2000-0xb)='/dev/loop#\x00', 0x1200000000000008, 0x101083) 2017/12/25 06:28:02 executing program 6: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = accept$netrom(0xffffffffffffffff, &(0x7f0000000000+0x376)=@ax25={0x0, {""/7}, 0x0}, &(0x7f00006cd000-0x4)=0x10) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000002000-0xd)='/selinux/mls\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000002000-0x4)=0xb2) accept$inet6(r1, 0x0, &(0x7f0000001000-0x4)=0x0) r2 = syz_open_dev$usbmon(&(0x7f0000001000-0xd)='/dev/usbmon#\x00', 0x2, 0x40200) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) bind$inet6(r2, &(0x7f0000002000)={0xa, 0x3, 0x7, @loopback={0x0, 0x1}, 0x11}, 0x1c) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f0000000000)={0x4960}, 0x8, 0x80800) 2017/12/25 06:28:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0xc, 0x2, 0x406a) pipe(&(0x7f00006dc000)={0x0, 0x0}) getsockname$packet(r0, &(0x7f0000f42000-0x14)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, &(0x7f00000df000-0x4)=0x14) r3 = geteuid() setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000e1c000)={{{@in=@remote={0xac, 0x14, 0x0, 0xbb}, @in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x2, 0x589, 0x0, 0x0, 0x5, 0x80, 0x20, 0x1, r2, r3}, {0x7ff, 0x0, 0x7fffffff, 0x6, 0x7ff, 0x2, 0xffffffffffffffff, 0x10000}, {0x1, 0x40, 0x7, 0x4}, 0x1d7d, 0xdcf, 0x1, 0x0, 0x0, 0x3}, {{@in=@local={0xac, 0x14, 0x0, 0xaa}, 0x455, 0x3f}, 0x2, @in=@multicast1=0xe0000001, 0x76d873ac, 0x4, 0x2, 0xf5da, 0x80, 0x7, 0xa45a}}, 0xe8) sendto(r0, &(0x7f0000da8000-0x15)="140000000a0ae7c8ff130000fc0c0100000008e5", 0x14, 0x0, 0x0, 0x0) 2017/12/25 06:28:02 executing program 5: mmap(&(0x7f0000000000/0xdf7000)=nil, 0xdf7000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000df7000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000df7000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00001a4000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7}, &(0x7f00006d8000-0x40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f000011d000)={0xfffffffffffffffd, 0x2, 0x4, 0x8, 0x8000, 0x7, 0x0, 0x0}, &(0x7f0000df8000-0x10)={0x77359400, 0x0}, &(0x7f0000df6000-0x8)={&(0x7f0000df5000)={0xfffffffffffff001}, 0x8}) 2017/12/25 06:28:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00003f9000)='cmdline\x00') openat$hwrng(0xffffffffffffff9c, &(0x7f0000270000)='/dev/hwrng\x00', 0x7ffff, 0x0) readv(r0, &(0x7f00000e9000)=[{&(0x7f0000751000-0xf2)=""/242, 0xf2}], 0x1) 2017/12/25 06:28:02 executing program 7: mmap(&(0x7f0000000000/0x28000)=nil, 0x28000, 0x3, 0x32, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f0000001000-0x10)={0x3, &(0x7f0000022000)=[{0x0, 0x0, 0x0, 0xffffffffffffffe0}, {0x25, 0x0, 0xf1, 0xffffffffffff8005}, {0x16, 0x0, 0x0, 0x0}]}) mmap(&(0x7f0000028000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f000000c000-0xe8)={{{@in=@multicast2=0x0, @in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in6=@remote={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0, 0x0}, 0x0, @in=@remote={0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f0000028000)=0xe8) syz_fuse_mount(&(0x7f0000028000-0x6)='./bus\x00', 0x0, r0, 0x0, 0x0, 0x0) mmap(&(0x7f0000029000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000029000)='/selinux/load\x00', 0x2, 0x0) mmap(&(0x7f0000029000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000029000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000029000)={0x0, @in={{0x2, 0x2, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x5, 0x8, 0x2, 0x9, 0x7f, 0x0, 0x2, 0x200, 0x3, 0x101, 0x9, 0x3, 0x2, 0xdae2, 0x8]}, &(0x7f0000029000)=0x108) mmap(&(0x7f0000029000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000029000)=@assoc_value={r2, 0x7}, 0x8) mmap(&(0x7f000002a000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f000002a000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$sock_int(r1, 0x1, 0x2f, &(0x7f000002a000+0x570)=0x0, &(0x7f000002b000-0x4)=0x4) 2017/12/25 06:28:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000ed3000-0x18)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000aa2000-0x6)={0x1, 0x81, 0x66a}) socket$packet(0x11, 0x3, 0x300) seccomp(0x1, 0x0, &(0x7f0000a63000)={0x1, &(0x7f000003f000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) pipe2(&(0x7f000055c000)={0x0, 0x0}, 0x80000) mq_unlink(&(0x7f00004a8000)='[\x00') 2017/12/25 06:28:02 executing program 7: mmap(&(0x7f0000000000/0x5000)=nil, 0x5000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$random(&(0x7f0000002000-0xc)='/dev/random\x00', 0x0, 0x40000) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x20000000000, 0x0) ioctl$EVIOCSKEYCODE(0xffffffffffffffff, 0x40084504, &(0x7f0000000000)=[0x2000000000005, 0x0]) clone(0x0, &(0x7f0000004000-0xf)="", &(0x7f0000004000)=0x0, &(0x7f0000004000)=0x0, &(0x7f0000002000)="") mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sendto$llc(r0, &(0x7f0000005000)="f588e15201c7c190c64449567a4e0fa166c93fc09c22188192dc9ee2f6b7698c10adbc169ce8908792df7b", 0x2b, 0x800, &(0x7f0000005000)={0x1a, 0x0, 0x1, 0x400, 0x6, 0x800, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x0}, [0x0, 0x0]}, 0x10) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000005000)=""/87) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000000)=""/147) 2017/12/25 06:28:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000aaa000-0x11)='/selinux/enforce\x00', 0x40, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000d99000-0x4)=0x5, 0x4) r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) setsockopt$inet_tcp_int(r2, 0x6, 0x17, &(0x7f000070a000-0x4)=0x0, 0x4) 2017/12/25 06:28:02 executing program 6: mmap(&(0x7f0000000000/0xfe1000)=nil, 0xfe1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000ff7000-0x9)='/dev/sg#\x00', 0x2009, 0x10000) syz_extract_tcp_res(&(0x7f000086a000-0x8)={0x0, 0x0}, 0x3ff, 0x5) timer_gettime(0x0, &(0x7f0000fdf000)={{0x0, 0x0}, {0x0, 0x0}}) clock_gettime(0x1, &(0x7f0000c4b000-0x10)={0x0, 0x0}) timerfd_gettime(r0, &(0x7f000027d000-0x20)={{0x0, 0x0}, {0x0, 0x0}}) r1 = syz_open_procfs(0x0, &(0x7f00003c9000-0x12)='net/ip6_flowlabel\x00') preadv(r1, &(0x7f0000b18000-0x50)=[{&(0x7f000023e000)=""/103, 0x67}], 0x1, 0x36) fcntl$getownex(r0, 0x10, &(0x7f0000324000-0x8)={0x0, 0x0}) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000fe0000)={0x0, 0x0, 0x0}, 0xc) stat(&(0x7f0000a79000)='./file0\x00', &(0x7f0000217000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(r2) lstat(&(0x7f0000eaf000-0x8)='./file0\x00', &(0x7f0000fe0000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000ad8000-0xc)={0x0, 0x0, 0x0}, &(0x7f0000993000-0x4)=0xc) fcntl$getownex(r1, 0x10, &(0x7f0000fe1000-0x8)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000b37000)={{{@in=@loopback=0x0, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in6=@loopback={0x0, 0x0}, 0x0, 0x0}, 0x0, @in=@remote={0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f0000fe1000-0x4)=0xe8) getresgid(&(0x7f0000fe1000-0x4)=0x0, &(0x7f000083d000)=0x0, &(0x7f0000fe0000)=0x0) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000fe0000)={0x0, 0x0, 0x0}, 0xc) stat(&(0x7f00001f3000)='./file0\x00', &(0x7f0000fe1000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000fe0000)='./file0\x00', &(0x7f0000a3e000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$SO_PEERCRED(r1, 0x1, 0x11, &(0x7f0000fe0000)={0x0, 0x0, 0x0}, 0xc) stat(&(0x7f00000f3000-0x8)='./file0\x00', &(0x7f0000fb5000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00005a9000)='./file0\x00', &(0x7f0000523000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getpgrp(0x0) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000af1000)={0x0, 0x0, 0x0}, 0xc) mmap(&(0x7f0000fe1000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fe1000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fe1000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) stat(&(0x7f0000b27000)='./file0\x00', &(0x7f0000fe2000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000928000-0x4)=0x0) fstat(r0, &(0x7f0000668000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000024000)={0x0, 0x0, 0x0}, &(0x7f0000fe1000-0x4)=0xc) getsockopt$SO_PEERCRED(r1, 0x1, 0x11, &(0x7f0000fe1000-0xc)={0x0, 0x0, 0x0}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000fe1000-0xe8)={{{@in6=@remote={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@multicast1=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in6=@loopback={0x0, 0x0}, 0x0, 0x0}, 0x0, @in6=@remote={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f0000fe0000)=0xe8) getresgid(&(0x7f000031d000-0x4)=0x0, &(0x7f0000b74000)=0x0, &(0x7f0000183000)=0x0) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f000084e000-0x1)={0x0, 0x0, 0x0}, 0xc) stat(&(0x7f0000fe1000-0x8)='./file0\x00', &(0x7f0000fe1000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgid() getpgrp(0xffffffffffffffff) fstat(r0, &(0x7f0000fd5000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$SO_PEERCRED(r1, 0x1, 0x11, &(0x7f0000305000-0xc)={0x0, 0x0, 0x0}, 0xc) getsockopt$SO_PEERCRED(r1, 0x1, 0x11, &(0x7f0000fe0000)={0x0, 0x0, 0x0}, 0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00005c6000-0xe8)={{{@in=@loopback=0x0, @in=@broadcast=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@rand_addr=0x0, 0x0, 0x0}, 0x0, @in6=@loopback={0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f0000fe0000)=0xe8) getegid() fcntl$getown(r0, 0x9) stat(&(0x7f0000fe1000-0x8)='./file0\x00', &(0x7f0000fe1000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f00007c2000)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]) gettid() getuid() getgroups(0x0, &(0x7f0000fe1000-0x8)=[]) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000fe0000)=0x0) stat(&(0x7f0000fe1000-0x8)='./file0\x00', &(0x7f000085a000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000fe1000-0xc)={0x0, 0x0, 0x0}, &(0x7f0000fe1000-0x4)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000b0a000-0x4)=0x0) getsockopt$SO_PEERCRED(r0, 0x1, 0x11, &(0x7f0000fe0000)={0x0, 0x0, 0x0}, 0xc) getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000fe0000)={0x0, 0x0, 0x0}, &(0x7f0000e38000)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000cc4000)={0x0, 0x0, 0x0}, &(0x7f0000fe1000-0x4)=0xc) getresgid(&(0x7f0000221000-0x4)=0x0, &(0x7f000050d000-0x4)=0x0, &(0x7f0000fe1000-0x4)=0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000fe1000-0xe8)={{{@in6=@remote={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, @in=@multicast2=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@multicast1=0x0, 0x0, 0x0}, 0x0, @in=@remote={0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f00002dc000)=0xe8) getgroups(0x3, &(0x7f0000174000-0xc)=[0xffffffffffffffff, 0x0, 0x0]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000fe0000)=0x0) lstat(&(0x7f0000a36000-0x8)='./file0\x00', &(0x7f00000eb000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000fe0000)=0x0, &(0x7f0000def000)=0x0, &(0x7f0000640000)=0x0) fcntl$getown(r0, 0x9) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00002be000-0xe8)={{{@in=@remote={0x0, 0x0, 0x0, 0x0}, @in6=@remote={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@loopback=0x0, 0x0, 0x0}, 0x0, @in6=@remote={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f0000c3e000)=0xe8) getegid() ioctl$TIOCGSID(r0, 0x540f, &(0x7f0000a1a000)=0x0) lstat(&(0x7f0000bbf000)='./file0\x00', &(0x7f0000fe0000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgid() fcntl$getown(r1, 0x9) fstat(r1, &(0x7f0000f37000-0x44)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000fe0000)=0x0, &(0x7f0000154000)=0x0, &(0x7f0000fe0000)=0x0) getpid() 2017/12/25 06:28:02 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00007bd000)=0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ptrace$setsig(0x4203, r0, 0x6, &(0x7f0000001000-0x10)={0x23, 0x5, 0x5, 0x3}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f000095e000)='encrypted\x00', &(0x7f0000534000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f0000d50000-0x1)='\x00', 0xfffffffffffffffb) r2 = add_key(&(0x7f0000003000)='rxrpc\x00', &(0x7f0000e68000-0x5)={0x73, 0x79, 0x7a, 0x1, 0x0}, &(0x7f0000003000)="", 0x0, r1) socket$inet6_sctp(0xa, 0x1, 0x84) add_key$keyring(&(0x7f00005d0000)='keyring\x00', &(0x7f000064f000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, 0x0, 0x0, r2) keyctl$set_reqkey_keyring(0xe, 0x1) keyctl$revoke(0x3, r2) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000946000-0xc)={0x0, 0x0, 0x0}, &(0x7f0000a4d000)=0xc) ptrace$setopts(0x4200, r3, 0x8001, 0x41) 2017/12/25 06:28:02 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x100000000c) removexattr(&(0x7f0000f5d000+0xeca)='./file0\x00', &(0x7f0000c7d000-0x12)=@random={'osx.\x00', ':GPLsecurity\x00'}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000b2000)={0x0, 0x0}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000b4e000-0x20)={@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x2, 0x3, 0xff, 0xd, 0x8, 0x3ff, 0xea77}, 0x20) syz_open_dev$sg(&(0x7f000043d000)='/dev/sg#\x00', 0x1, 0x208000) r2 = openat$selinux_user(0xffffffffffffff9c, &(0x7f00005e0000-0xe)='/selinux/user\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f000049d000+0x260)=0x0, &(0x7f000013c000)=0x4) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000a57000-0x4)=0xaec) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000a2f000-0x11)='/dev/vga_arbiter\x00', 0x400, 0x0) writev(r0, &(0x7f0000a3b000-0x10)=[{&(0x7f00009f6000-0x1f)="1f00000002021900000007000000088100fd3b8509000b00000100ff3f0009", 0x1f}], 0x1) accept4$llc(r2, &(0x7f0000588000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, [0x0, 0x0]}, &(0x7f00005e1000-0x4)=0x10, 0x80000) sendmsg$netlink(r0, &(0x7f00002de000)={&(0x7f0000b61000)={0x10, 0x0, 0x2, 0x4b3}, 0xc, &(0x7f0000eed000)=[{&(0x7f00005f6000-0x7f)=[{0x23, 0x401, 0x400, 0xe76, 0x81, "e1db0c15c598f6b045832682fbbed0c0553bf0"}, {0x5c, 0x3ea27662, 0x1, 0x3, 0x2b, "fdea4b27297f4266ac0ffde48ce8d10e83aa0e3fba13e14381dd308a3ef21ffcd371ab0f6982c2e16ddf8882700a466e33aa1d5bf53cb61d328dd96af0ca90be3293943ecdf1da389c39b94b"}], 0x7f}, {&(0x7f0000a6c000-0xcc)=[{0xcc, 0x4, 0x208, 0x5f3b, 0x80, "69a49aa78076e07348e7a320befc19564c863d5e02fb6200fb2d3f9d730aec1a57079c69bc477fb0f1846e775817b64fbfd762006128aa849c10ba1cd62a182e0e9b4220d140f4996c597d591b4d6321a4363d6b2eb358ea144f4447f45bbdc4f5e0e0f95e509bf86b626211ea3448539530d074896b41c3ab9e9de3c2366371d4c398fc801ce5cc21eb700ae055cc349d4b580fa842b8474fe08efa120e7a5e1971fc789defe2db54ef6a8def559005ffd915fcc1e1b050dd06ca41"}], 0xcc}, {&(0x7f00005ee000-0xb4)=[{0xb4, 0x800, 0x110, 0x58dd, 0x1ff, "93026fd81b3e15da02cd009988f571e12b76abe66e19553fb71e0087479d05d87e7d8a3a19009e2aebd48c1b6e0b59050bad1b938f59583273c8a795ec1007d745398af980962e5f4cf6f2437f4066eabf76452bec1cf13a14b37b1af8e7b9692b87858b5353f211151b22428a223ba399412da0da162474b6e137d9cf6006462b29e6ced175c63ad9b01a64fcb4062b41ed90dcc55c9b41d54395f6539d20218a83078c"}], 0xb4}], 0x3, &(0x7f0000470000-0x28)=[@rights={0x28, 0x1, 0x1, [r1, r2, r2, r1, r2]}], 0x28, 0x8080}, 0x81) [ 33.817038] audit: type=1400 audit(1514183282.700:5): avc: denied { create } for pid=3735 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 2017/12/25 06:28:02 executing program 3: r0 = syz_open_dev$mice(&(0x7f000057a000)='/dev/input/mice\x00', 0x0, 0x40080) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f000060d000)=0x99e, &(0x7f000047f000)=0x4) dup2(r0, r0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000001000-0x9)='/dev/rtc\x00', 0x4300, 0x0) clone(0x0, &(0x7f0000000000)="", &(0x7f00003e8000-0x4)=0x0, &(0x7f0000f92000-0x4)=0x0, &(0x7f0000000000)="") msync(&(0x7f00002f3000/0x3000)=nil, 0x3000, 0x0) 2017/12/25 06:28:02 executing program 0: mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000)='/dev/sg#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000001000)={0x0, 0x1}, &(0x7f0000001000)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000002000-0xaf)={r1, 0xa7, "93705016c07676f760ab9dc855da331b4b74889574ad379ef863a2f4fe738719f1b50f90844216e5043eab77dd4ca5e9658919e629d6370b74e93b78dbe029d72e7f4ba0bd31622b7c91b3444d3d7eed687a329702d56c34cfaafe28206bfd08926fad8fab500fe58aa125d559621f76c911dc7e2e26d3212c92b33250e443cee61bf1295348881506bad00e9e2332c04226c525021822a7674783fc9ec632cee61fab1a4f0158"}, &(0x7f0000002000-0x4)=0xaf) madvise(&(0x7f000000c000/0x2000)=nil, 0x2000, 0xb) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000002000-0xe8)={{{@in=@broadcast=0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0, 0x0}, 0x0, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f0000003000-0x4)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001000)={{{@in=@broadcast=0xffffffff, @in=@multicast2=0xe0000002, 0x1, 0x4000000000000000, 0x0, 0x6, 0x15, 0x20, 0x80, 0x93f, r2, 0x0}, {0x3, 0x1000, 0x100000000, 0x19, 0x10001, 0x1, 0x69f, 0x4}, {0x9, 0x20, 0x9, 0x2}, 0x4, 0x200, 0x7ff, 0x0, 0x20, 0x3}, {{@in=@broadcast=0xffffffff, 0x53b, 0xff}, 0x1b, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x3, 0x0, 0x9, 0x0, 0xc9d, 0x9}}, 0xe8) kexec_load(0x5, 0x7, &(0x7f000000b000)=[{&(0x7f000000c000-0x58)="eaa30ab2e0968ffbb8bfba6780857dc9cd195d0a490fc84f74c14419681f3be0dbb6735f3fad77fefd3847d40b26cdca65ffbeaed8d67f7dc2ba48583a244d26ec12e9f66492ada810c2bf0cca30f2ff4d6d946544740702edc6c57bc9274b46a6618c89986f8b62fd380801ee6e265c5e3e5b9e915ea6486e0d124c5aab7d611a91f6d42f14013c9d82abe513cc2017e4bf54bba6fd499590e72d0bf3ea45825903114e41b30731d5e1228d5de9a714cd4999fd0c", 0xb5, 0x4, 0x8}, {&(0x7f0000000000)="66734c3cb654ec0e083c03be0fe2f277418401313ea8561bd2ccfc8fc4db6a1f43ea2ec522a7f500f5167f70ab679b08a6781d72ff20a2cbfb6bbaa28ab0a305a55869e1f11a12fa90b2bd", 0x4b, 0x80000000, 0x7}, {&(0x7f0000002000-0xc0)="85d85e63b7ecf22e9591224c498bbc1b127f3e07bb2305ed0e33e6c7c328dbe6b406d33fd294780f72f883855b22c0a6917c54db1897d00bc60d4549924e379a75e7a4dc9036c5612be946b0bf483478d1f0518493cfa65f2d70ec2017eb37666c42806893c99a2de32cfa3ce1697807db122e24bf37801332ab6b2516e796f9f2d2613d04b00bbf07a19fa1dcd013029ed4ef06846a76c960158e352889f3dd86662fac09a05f69750386f9b3c7305de4377e5a4e1bce92949f3b24d039d605", 0xc0, 0x9, 0x0}, {&(0x7f0000001000-0x95)="db8ea00fec86070c83113712f26761178301e60eefbc4353ec089d3a0606d7325ddb28ec2055b4f2405aa672ea74f69dc836138ef50aad129e6160dc6b018e1b251fcebc6725afa9cf0c0582645f019129705f459c2341bf2e6ddaa09c69c41d15b05b3f57242eab0a8386f895d6aa3222365b7c1f5e8df92d5f077fcdffb112d4b564420002e7d9458db09fab8ac928686f58aca7", 0x95, 0x80000001, 0xbe87}, {&(0x7f000000d000-0x6b)="a019aaa5e743941c8dc62dc824171a23ca2ebb436d2a31e01889f93f40f6a3482412c2f568651da5f75f4944367c901cda022b5d4d973716f81a39e4a48b4a9bff06b2e41198450d72aebeffc8752e7d2fcfcf3222e709e305f71c08eea3bd5e2cce29c0c9d84ae57f2110", 0x6b, 0xff, 0x6eee}, {&(0x7f0000000000+0xcc9)="4fa4f27330ec55cc332be59617598bbbff59b3a7e2283f6004a6043ad19dd7fc25532263911b1357a9edf21c5e814290ceecb93acaa40b5502873ff0d0f104bf4965a68a4c9fbc0b9019816bfdca08c8335063ec68e9afe8a4c3d5f30d25d9820003925e8a269c899cd35a8dc2a6b8efd907da1fd3ecf41685437aee96b463e8e9c18a5244f26c5cd009c60b031114d28f7a12122e2a426655c21f4281a33dafeb2f903b018c0079697b8d709e1cd12c68aa50fc08a628ad511e", 0xba, 0xfffffffffffffff9, 0xa50}, {&(0x7f000000c000-0xb9)="4c3754e4c8e232ad20f302be154ec1ed2487adaf90627b3a5739cea0ddf7ca7e46f253c91d346fc962a5a85ee71ef5000197694b12209fd1431c9ee89c87904460622819b919f6f9299f1cfd91101c1572a7a68a92ed53e207f8783609ca3389d4540682ba83040ed00ca932388e0208e5884f13e024cc2d310523d8036e4edf8d3457ab5202e1915377ef696b416e8b537efb088df7d5d6dce04db1dbd663e917d3eb2162636fc98bb4b7afbba216f5e85562bee60c5d8332", 0xb9, 0xffffffffffff4c25, 0x81}], 0x1) 2017/12/25 06:28:02 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000c1f000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f000015e000-0x18)={0xfff, 0x9, 0x2, 0x2, 0x4, 0x3}) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000706000-0x4)={0x0, 0x7, 0x0}, 0x4) mmap(&(0x7f0000000000/0xfeb000)=nil, 0xfeb000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000349000-0xd)='/dev/usbmon#\x00', 0x0, 0x10000) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1d, &(0x7f0000610000)="0d4112aec396bbe72de2c7e6714747053eb22823420af095532925", 0x1b) socket(0x0, 0x6, 0x1) fstatfs(r1, &(0x7f00005a4000-0x1000)=""/4096) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000316000)={0x9, [0x280, 0x7, 0x4, 0x5361, 0x100, 0x28e, 0x22da, 0x3, 0x0]}, 0x16) openat$keychord(0xffffffffffffff9c, &(0x7f0000a83000)='/dev/keychord\x00', 0x208401, 0x0) setsockopt(r1, 0x30000000107, 0x16, &(0x7f00007bd000-0x4)='I"-U', 0x4) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000672000)={0x0, 0x1}, &(0x7f00003f6000-0x4)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00004e6000)={r3, 0x5}, &(0x7f0000cd8000)=0x8) 2017/12/25 06:28:02 executing program 4: pipe(&(0x7f00007a5000-0x8)={0x0, 0x0}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000000)={0x8, &(0x7f0000001000-0x20)=[{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}]}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f00000c0000-0x8)={0x0, 0x0, 0x0, 0x0, 0x0}) add_key(&(0x7f0000f57000-0x8)='keyring\x00', &(0x7f0000767000)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000c66000-0x54)="", 0x0, 0x52e2f637490a4e7f) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000e4c000-0x10)='/selinux/policy\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x1) 2017/12/25 06:28:02 executing program 6: mmap(&(0x7f0000000000/0xc32000)=nil, 0xc32000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f000003d000-0xc)={0x0, 0x0, 0x0}, &(0x7f0000048000)=0xc) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000995000-0x8)={0x0, 0x0}, &(0x7f0000c2f000)=0x8) fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000acd000-0x8)={0x0, 0x0}) ptrace$setopts(0x4206, r3, 0x0, 0x0) ptrace(0x4207, r3) waitid(0x0, 0x0, &(0x7f0000c30000-0x5)={0x0, 0x0, 0x0, 0x0}, 0x9, &(0x7f0000023000-0x90)={{0x0, 0x0}, {0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ptrace$setregs(0xd, r3, 0x40, &(0x7f0000abc000-0x75)="448f1373e1c459c75d5f555b9387fec2196883b4b8149923c27aa382851a5d7f3405c38a5d1b2064cd6c3fd721066c49afe0831d2f430b4ddb8ec24fff17ae628b6c4caf0286356a2b74c3a888981f9fd26a6be873164a0be515af3a111c64377984e27aeadd11b0c02e70b9f3e379153d3a5b5820") socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000596000-0x8)={0x0, 0x0}) mmap(&(0x7f0000c32000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000c33000-0x8)='./file0\x00', 0x40) readahead(r0, 0x0, 0x1ae) ioctl$TIOCCBRK(r5, 0x5428) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000012c000)={0x0, @multicast2=0x0, @multicast1=0x0}, &(0x7f000099b000)=0xc) mmap(&(0x7f0000c32000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000c33000-0xe8)={{{@in=@remote={0xac, 0x14, 0x0, 0xbb}, @in6=@local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xaa}, 0x2, 0x8, 0x3, 0x80000001, 0x5, 0xa0, 0x20, 0x564d, r6, r2}, {0x0, 0x7f, 0xffffffffffffea28, 0x400, 0x5, 0x4, 0x19ad, 0x4bbc}, {0x1ff, 0x8, 0x3ff9fd95, 0x5}, 0xffff, 0x6, 0xffffffff000, 0x0, 0x8, 0x1}, {{@in=@empty=0x0, 0x7fffffff, 0x8}, 0x2, @in=@broadcast=0xffffffff, 0xc34f, 0x4, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0x9}}, 0xe8) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f0000a88000)=0x0, &(0x7f00003f3000)=0x4) 2017/12/25 06:28:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00005c3000)='/dev/loop#\x00', 0xe8d, 0x4002) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f000099b000-0xe)=""/14) pwritev(r1, &(0x7f0000e81000-0x40)=[{&(0x7f0000788000)="", 0x0}, {&(0x7f000045a000-0x83)="d4", 0x1}], 0x2, 0x0) 2017/12/25 06:28:02 executing program 5: mmap(&(0x7f0000f76000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000f76000)='/selinux/context\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @in=@loopback=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@local={0x0, 0x0, 0x0, 0x0}, 0x0, 0x0}, 0x0, @in6=@empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f0000f77000-0x4)=0xe8) r2 = gettid() mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000001000)={0x0, r2}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000f77000-0x4c)={0x3ff, 0x9, 0x7fff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @loopback={0x0, 0x1}, 0x25, 0x7f, 0xfffffffffffffff7, 0x100, 0x51c, 0x10, r1}) ptrace$cont(0x1f, r2, 0x4, 0x100000000) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000f77000-0x8d)={0x0, {{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x0}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0, 0x0, []}, 0x90) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) fsetxattr(r0, &(0x7f0000000000)=@random={'system.\x00', '\x00'}, &(0x7f0000003000-0x11)='/selinux/context\x00', 0x11, 0x2) 2017/12/25 06:28:02 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f000011f000)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000728000)={@generic="8c696bf75cc254b086387540ee8b012e", @ifru_flags=0x900}) r1 = syz_open_dev$tun(&(0x7f00007e8000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000928000-0x28)={@common='gre0\x00', @ifru_mtu=0x6}) r2 = open(&(0x7f0000b38000-0x8)='./file0\x00', 0x501000, 0x20) accept$packet(r2, &(0x7f000053d000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0]}, &(0x7f0000b52000-0x4)=0x14) r3 = syz_open_procfs(0x0, &(0x7f000029f000-0xe)='net/dev_mcast\x00') lremovexattr(&(0x7f0000c95000-0x8)='./file0\x00', &(0x7f00008ea000)=@random={'osx.\x00', 'gre0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}) sendfile(r3, r3, &(0x7f0000dc0000)=0x0, 0xff) [ 33.850191] audit: type=1400 audit(1514183282.730:6): avc: denied { write } for pid=3735 comm="syz-executor2" path="socket:[9153]" dev="sockfs" ino=9153 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 2017/12/25 06:28:02 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000f60000-0x4)=0x2, 0x4) r2 = syz_open_dev$tun(&(0x7f0000d00000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000928000-0x28)={@common='gre0\x00', @ifru_addrs=@l2={0x1f, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0}}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000630000-0x20)={@common='gre0\x00', @ifru_flags=0x301}) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000556000-0x10)='/selinux/status\x00', 0x0, 0x0) accept$ipx(r3, &(0x7f00000d1000-0x10)={0x0, 0x0, 0x0, ""/6, 0x0, 0x0}, &(0x7f00006b4000-0x4)=0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000971000-0x10)=@common='gre0\x00', 0x10) sendto$inet(r0, &(0x7f0000589000-0x1)="", 0x0, 0x20000040, &(0x7f0000d17000)={0x2, 0x0, @remote={0xac, 0x14, 0x0, 0xbb}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) 2017/12/25 06:28:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) inotify_init() r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000428000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f000039a000-0x4)=0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1f, &(0x7f00003bf000+0x508)=0x0, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) sendto$inet(r0, &(0x7f0000a92000)="", 0x0, 0x20000000, &(0x7f0000303000)={0x2, 0x0, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) socketpair$inet_sctp(0x2, 0x0, 0x84, &(0x7f0000694000-0x8)={0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000f27000)={{{@in=@remote={0x0, 0x0, 0x0, 0x0}, @in6=@remote={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {{@in=@empty=0x0, 0x0, 0x0}, 0x0, @in=@rand_addr=0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f0000d08000-0x4)=0xe8) setuid(r3) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000c2a000)=[{0x4, 0x1000000000008000}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}], 0x8) 2017/12/25 06:28:02 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f0000d13000)={&(0x7f00000bc000-0x60)={0x2, 0x3, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, []}, 0x10}, 0x1, 0x0, 0x0, 0x0}, 0x4) set_robust_list(&(0x7f00006a2000-0x18)={&(0x7f000016f000/0x1000)=nil, 0x100000005, &(0x7f0000483000/0x2000)=nil}, 0x18) 2017/12/25 06:28:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000e97000)='/dev/sg#\x00', 0x3ff, 0x20000) r0 = userfaultfd(0x0) fcntl$lock(r0, 0x5, &(0x7f0000012000)={0x0, 0x0, 0x0, 0x0, 0x0}) 2017/12/25 06:28:02 executing program 5: mmap(&(0x7f0000e5b000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x1, &(0x7f0000029000-0x10)={0x0, &(0x7f0000e5b000)=[]}) prctl$setmm(0x23, 0x0, &(0x7f0000ab5000/0x2000)=nil) [ 34.005113] device gre0 entered promiscuous mode 2017/12/25 06:28:02 executing program 1: mmap(&(0x7f0000000000/0x15000)=nil, 0x15000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x20000, 0x0) fcntl$setlease(r0, 0x400, 0x0) 2017/12/25 06:28:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) times(&(0x7f0000694000-0x20)={0x0, 0x0, 0x0, 0x0}) seccomp(0x1, 0x0, &(0x7f0000045000-0x10)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) pipe2(&(0x7f0000a70000)={0x0, 0x0}, 0x800) r1 = inotify_add_watch(0xffffffffffffff9c, &(0x7f0000863000)='./file0\x00', 0x80) inotify_rm_watch(r0, r1) modify_ldt$read_default(0x2, &(0x7f0000ded000-0x62)=""/98, 0x62) 2017/12/25 06:28:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000a12000-0xa)='/dev/ptmx\x00', 0x242, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000195000-0x11)='/dev/vga_arbiter\x00', 0x400000, 0x0) write(r0, &(0x7f0000e42000-0x1)='\x00', 0x1) pipe2(&(0x7f0000001000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r1) mknod(&(0x7f0000ed7000-0x8)='./file0\x00', 0x0, 0x1000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000a0d000-0x48)={{0x0, 0x1, 0x5b0, 0x2, 0xfffffffffffffffc}, 0x9, 0x3f, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) readv(r1, &(0x7f00008fd000-0x30)=[{&(0x7f00001ae000-0x94)=""/148, 0x94}], 0x1) splice(r0, 0x0, r2, 0x0, 0x200, 0x0) 2017/12/25 06:28:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00006d2000-0x11)='/selinux/relabel\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000608000)=0x6, 0x4) r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f00005c9000-0x22)="1f0000004a0007000000220a000008ff0a3f80311100000004000a03441951", 0x1f) 2017/12/25 06:28:02 executing program 7: r0 = socket$inet(0x2, 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f000082a000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffff9c}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r3 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000ef000-0xc)={r2, 0x80000, r3}) unshare(0x20000400) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r4 = accept(r0, &(0x7f0000000000)=@nfc_llcp={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/63, 0x0}, &(0x7f00000d9000)=0x60) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00009a0000-0x8)={0x0, 0x2}, &(0x7f0000000000)=0x8) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000002000-0x4)=@assoc_id=r5, 0x4) getsockname$packet(r0, &(0x7f0000dbf000-0x14)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={[0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, [0x0, 0x0]}, &(0x7f0000eee000)=0x14) 2017/12/25 06:28:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000eb1000)='/dev/keychord\x00', 0x4200, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000f4c000-0x8)={0x0, 0x0}) sched_getparam(r1, &(0x7f0000175000-0x4)=0x0) r2 = request_key(&(0x7f0000389000)='keyring\x00', &(0x7f0000b4d000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00009f5000)=':em1bdevppp1.vboxnet1bdev\x00', 0x0) keyctl$revoke(0x3, r2) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000ee2000-0x4)=0x2, 0x4) r3 = add_key(&(0x7f000014b000-0x5)='user\x00', &(0x7f00008fa000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f0000ac7000)="8f", 0x1, 0xfffffffffffffffc) mmap(&(0x7f0000000000/0x93d000)=nil, 0x93d000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000e3b000)=0x0, &(0x7f0000bff000-0x4)=0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) request_key(&(0x7f0000ca0000)='user\x00', &(0x7f00000c5000-0x5)={0x73, 0x79, 0x7a, 0x3, 0x0}, &(0x7f00006fe000-0x5)='posix_acl_accessmd5sum.#+\x00', r2) getsockopt$inet_buf(r4, 0x0, 0x484, &(0x7f000093a000-0x18)=""/24, &(0x7f0000163000-0x4)=0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) keyctl$read(0xb, r3, &(0x7f000094d000)=""/136, 0x88) 2017/12/25 06:28:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000833000)={&(0x7f0000564000)=@abs={0x0, 0x0, 0x0}, 0x8, &(0x7f00007e0000)=[{&(0x7f0000007000)="fd20932fcc7cfaafcf960802e02348f8fba600069da7a78a04a646", 0x1b}], 0x1, &(0x7f0000335000-0xd8)=[], 0x0, 0x0}, 0x0) r0 = syz_open_dev$sg(&(0x7f0000733000-0x9)='/dev/sg#\x00', 0x0, 0x102) ioctl(r0, 0x2285, &(0x7f0000007000)='S') dup(r0) [ 34.146787] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 34.191152] netlink: 3 bytes leftover after parsing attributes in process `syz-executor0'. [ 35.517578] IPVS: Creating netns size=2552 id=9 [ 36.974300] IPVS: Creating netns size=2552 id=10 [ 38.435875] IPVS: Creating netns size=2552 id=11 [ 39.895988] IPVS: Creating netns size=2552 id=12 [ 41.351549] IPVS: Creating netns size=2552 id=13 [ 42.811712] IPVS: Creating netns size=2552 id=14 [ 44.278024] IPVS: Creating netns size=2552 id=15 [ 45.741923] IPVS: Creating netns size=2552 id=16 [ 47.168977] IPVS: Creating netns size=2552 id=17 [ 48.538574] IPVS: Creating netns size=2552 id=18 [ 49.923658] IPVS: Creating netns size=2552 id=19 panic: executor 6: invalid status 11, exit status: exit status 69 goroutine 13 [running]: main.(*Proc).executeRaw(0xc421cac4a0, 0xc420e37eb8, 0xc4225492a0, 0x1, 0x0, 0x0, 0x0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:271 +0x539 main.(*Proc).execute(0xc421cac4a0, 0xc420012620, 0xc4225492a0, 0x0, 0x1, 0x1, 0x21cc, 0x2400) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:232 +0xc0 main.(*Proc).loop(0xc421cac4a0) /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/proc.go:85 +0x4db created by main.main /syzkaller/gopath/src/github.com/google/syzkaller/syz-fuzzer/fuzzer.go:278 +0x10f2