[....] Starting enhanced syslogd: rsyslogd[ 12.290080] audit: type=1400 audit(1520849923.922:4): avc: denied { syslog } for pid=3647 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.32' (ECDSA) to the list of known hosts. 2018/03/12 10:18:52 fuzzer started 2018/03/12 10:18:52 dialing manager at 10.128.0.26:41885 2018/03/12 10:18:56 kcov=true, comps=false 2018/03/12 10:18:58 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@ipv6_delroute={0x1c, 0x19, 0x801, 0x0, 0x0, {0xa, 0x10}}, 0x1c}, 0x1}, 0x0) 2018/03/12 10:18:58 executing program 1: r0 = socket$inet6(0xa, 0x80005, 0x0) setsockopt(r0, 0x100000000084, 0x80000000000023, &(0x7f0000000040), 0x0) 2018/03/12 10:18:58 executing program 7: syz_emit_ethernet(0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd602f28960028290000000000000000000000ffffac141400fe8000000000000000000000000000aa00000000928d1d9dbf2958c6cf7dd7324d7f039c", @ANYRES32=0x41424344, @ANYBLOB="5000000090780000ebea0189b87971cf61e5c19486ecb887db221e4f"], 0x0) 2018/03/12 10:18:58 executing program 2: perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xd68, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001440)={&(0x7f0000000080)=@ethernet={0x0, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80, &(0x7f00000038c0)=[{&(0x7f0000001240)}, {&(0x7f00000026c0)}], 0x2, &(0x7f0000003980)}, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000200)) 2018/03/12 10:18:58 executing program 3: pipe(&(0x7f0000000000)) mmap(&(0x7f0000301000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000176000/0x7000)=nil, 0x7000, 0x0, 0x6071, 0xffffffffffffffff, 0x0) mmap(&(0x7f00006a4000/0x2000)=nil, 0x2000, 0x0, 0x3a031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000011000/0x1000)=nil, 0x1000, 0x4, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x831000)=nil, 0x831000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/03/12 10:18:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f0000db4ffc)=0x214, 0x0) shutdown(r0, 0x1) sendto$ax25(r2, &(0x7f0000000000)="8b", 0x1, 0x0, &(0x7f00000000c0)={0x3, {"ad6c7bae17b561"}}, 0x10) 2018/03/12 10:18:58 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bpq0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)=@ipv6_newaddr={0x34, 0x14, 0x109, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r2}, [@IFA_FLAGS={0x8, 0x8, 0x284}, @IFA_ADDRESS={0x14, 0x1, @local={0xfe, 0x80, [], 0xaa}}]}, 0x34}, 0x1}, 0x0) 2018/03/12 10:18:58 executing program 6: r0 = socket(0x2000000000a, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000fc0)={'bond0\x00', @ifru_names='gre0\x00'}) syzkaller login: [ 26.610692] audit: type=1400 audit(1520849938.252:5): avc: denied { sys_admin } for pid=3854 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 26.643654] IPVS: Creating netns size=2536 id=1 [ 26.657495] audit: type=1400 audit(1520849938.292:6): avc: denied { net_admin } for pid=3857 comm="syz-executor7" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 26.685962] IPVS: Creating netns size=2536 id=2 [ 26.723766] IPVS: Creating netns size=2536 id=3 [ 26.766962] IPVS: Creating netns size=2536 id=4 [ 26.790957] IPVS: Creating netns size=2536 id=5 [ 26.826864] IPVS: Creating netns size=2536 id=6 [ 26.868277] IPVS: Creating netns size=2536 id=7 [ 26.925837] IPVS: Creating netns size=2536 id=8 [ 29.061801] audit: type=1400 audit(1520849940.702:7): avc: denied { sys_chroot } for pid=3857 comm="syz-executor7" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/03/12 10:19:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000f6f000), 0x1000000c4, 0x20000001, &(0x7f0000faafe4)={0xa, 0x4e22}, 0x1c) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f0000db4ffc)=0x214, 0x0) shutdown(r0, 0x1) sendto$ax25(r2, &(0x7f0000000000)="8b", 0x1, 0x0, &(0x7f00000000c0)={0x3, {"ad6c7bae17b561"}}, 0x10) [ 29.124903] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 29.196986] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 2018/03/12 10:19:01 executing program 0: r0 = socket(0x10, 0x80002, 0x0) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) 2018/03/12 10:19:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x80000000004) write(r0, &(0x7f000082dfd9)="2700000014000707030e000012040a0010ffe400f6070000ff00000007005f050800390075001d", 0x27) 2018/03/12 10:19:01 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065000)={&(0x7f000029d000)={0x10}, 0xc, &(0x7f0000402ff2)={&(0x7f0000b92000)={0x14, 0xb, 0x6, 0x1}, 0x14}, 0x1}, 0x0) 2018/03/12 10:19:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x3}, 0x1c) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@empty, @empty, @remote={0xfe, 0x80, [], 0xbb}, 0x6, 0x80000000, 0x0, 0x100, 0xc000, 0x0, r1}) 2018/03/12 10:19:01 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x4, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, 'lo\x00'}}, 0x1e) 2018/03/12 10:19:01 executing program 3: pipe(&(0x7f0000000000)) mmap(&(0x7f0000301000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000176000/0x7000)=nil, 0x7000, 0x0, 0x6071, 0xffffffffffffffff, 0x0) mmap(&(0x7f00006a4000/0x2000)=nil, 0x2000, 0x0, 0x3a031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000011000/0x1000)=nil, 0x1000, 0x4, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x831000)=nil, 0x831000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/03/12 10:19:01 executing program 1: r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x0, 0x0, 0x2, {0xa}}}, 0x32) setsockopt(r0, 0x400000000000111, 0x1, &(0x7f0000000040)="0f9cd509", 0x4) 2018/03/12 10:19:01 executing program 6: accept4$unix(0xffffffffffffffff, &(0x7f0000000340)=@abs, &(0x7f00000003c0)=0x6e, 0x0) 2018/03/12 10:19:01 executing program 0: r0 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'bpq0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14}}}) [ 29.452640] audit: type=1400 audit(1520849941.092:8): avc: denied { create } for pid=5221 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 2018/03/12 10:19:01 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) 2018/03/12 10:19:01 executing program 1: r0 = socket(0xa, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0xc, &(0x7f0000000180)=0x81, 0x4) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x2) 2018/03/12 10:19:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2}, {0x2, 0x0, @broadcast=0xffffffff}, {0x2, 0x0, @loopback=0x7f000001}, 0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='bond0\x00'}) 2018/03/12 10:19:01 executing program 4: socketpair$unix(0x1, 0x1000000000005, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000021ff0)={0x2, &(0x7f0000016000)=[{0x28, 0x0, 0x0, 0xfffffffffffff010}, {0x6}]}, 0x10) write(r1, &(0x7f0000000200)='\x00\x00\x00\x00', 0x4) 2018/03/12 10:19:01 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1a, &(0x7f00006a0000)=""/124, &(0x7f0000664ffc)=0x7c) 2018/03/12 10:19:01 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000001e80)=[@in={0x2, 0x0, @multicast2=0xe0000002}], 0x10) 2018/03/12 10:19:01 executing program 0: socketpair$unix(0x1, 0x400000000003, 0x0, &(0x7f0000634000)={0xffffffffffffffff}) bind$unix(r0, &(0x7f000055b000)=@file={0x1, './file0\x00'}, 0xa) 2018/03/12 10:19:01 executing program 7: r0 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000100)={'nat\x00', 0x0, 0x0, 0x90, [], 0x1000010c, &(0x7f00000001c0), &(0x7f0000000200)=""/4096}, &(0x7f0000001280)=0x108) [ 29.466474] audit: type=1400 audit(1520849941.102:9): avc: denied { net_raw } for pid=5235 comm="syz-executor0" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/03/12 10:19:01 executing program 5: r0 = socket(0x10, 0x2, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x1f, 0x4) 2018/03/12 10:19:01 executing program 0: socketpair(0x1d, 0x80007, 0x0, &(0x7f0000000000)) 2018/03/12 10:19:01 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xac, 0x14}, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, @igmp={0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}}}}, &(0x7f0000000100)) 2018/03/12 10:19:01 executing program 6: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f0000a66000)={0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) listen(r0, 0x10000000009) r1 = accept4(r0, 0x0, &(0x7f00004a8ffc), 0x0) sendmmsg(r1, &(0x7f0000009240)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000180)="ce", 0x1}], 0x1, &(0x7f0000000000)}}], 0x1, 0x0) 2018/03/12 10:19:01 executing program 7: r0 = socket(0x10, 0x80002, 0x0) sendmmsg(r0, &(0x7f00000019c0)=[{{0x0, 0x0, &(0x7f0000001200)=[{&(0x7f0000000200)="4ba371fc3f8ab65a1bc291296de39ef9", 0x10}], 0x1}}, {{&(0x7f0000001240)=@pptp={0x18, 0x2, {0x0, @multicast2=0xe0000002}}, 0x80, &(0x7f0000001680), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="e80000000000000002010000c2000000b067b35451ca86e384c44828cf8d99df2e968485712d1933c0b925eae274b58c059a34c5e1a1d09f8c944501d60a7042fffa0366759d05c0fd6df9c9c6c968c8295199592cc494be5688bd710ec9d84bd703e511981a165e76601a23638838f0e0a186f0773432c55a03a7f169a2bb7d71efb89e2ed8611f93a1d598a9ac7db773087c86837aae24c6752ec1f8bf79cf5295323d65852049d620a6f5816c3fb08549ceed587e8652de186b0c5748fe186d6502432e785d35a0ac374cdf10a0fee195251ae5551909accd7b6c3e79723c5c00000000000000f8000000000000000f01000008000000"], 0xf8}}], 0x2, 0x0) 2018/03/12 10:19:01 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000580)=[{0x10}], 0x10}}], 0x1, 0x0) 2018/03/12 10:19:01 executing program 3: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={&(0x7f00000000c0)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x1}, 0x1}, 0x0) 2018/03/12 10:19:01 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0xccf641561df0697d, {0x2, 0x0, @broadcast=0xffffffff}, 'sit0\x00'}) 2018/03/12 10:19:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000ecafc8)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001d00ffff008d6bc993463ebf6b6dc5a210b49db40000000000000001000000"], 0x1}, 0x1}, 0x0) 2018/03/12 10:19:01 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000840)={0x18, 0x0, {0x0, @link_local={0x1, 0x80, 0xc2}, 'erspan0\x00'}}) 2018/03/12 10:19:01 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x42) 2018/03/12 10:19:01 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @rand_addr}, 0x10) 2018/03/12 10:19:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000ecafc8)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001d00ffff008d6bc993463ebf6b6dc5a210b49db40000000000000001000000"], 0x1}, 0x1}, 0x0) [ 29.577257] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35391 sclass=netlink_route_socket pig=5271 comm=syz-executor7 2018/03/12 10:19:01 executing program 2: r0 = socket$inet(0x2, 0x3, 0x19) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000240)=ANY=[@ANYBLOB="e0000002ac1414aa0100000001000000ac1414aa2767a08d89e336d91ba514dfe7c5c13f438193bc92012f36d5d306dca23e3b9939cc4e2d9b397976af330f077d522180e38131246370fdd1e4925f9289adb3ed166021ef2ae932d9e9bf1cde6ec098d670f08d141c05f179f69717185231c8cbe705ab89bb70c4449b571f12372891b7725799d474343cb19aa238a46b5a0aa8a64bea6cd952b7e10dc39eae0d075c95b5d2044636c5d482a6322ca9f33f8e650572b8a844d04f"], 0x1) 2018/03/12 10:19:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f00000b2000)=0xffffffffffffffff, 0x4) sendto$inet(r0, &(0x7f00005c9000), 0x252, 0x800000020000000, &(0x7f0000303000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x0, 0x800000000000852b, 0xffff}, 0x14) sendto$inet(r0, &(0x7f0000000040)="bb", 0x1, 0x0, &(0x7f00000000c0)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) writev(r0, &(0x7f0000818ff0)=[{&(0x7f000016bde8)="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", 0x218}], 0x1) 2018/03/12 10:19:01 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df8fd9)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000fb9000)=@sco, 0x80, &(0x7f0000e9c000)=[{&(0x7f0000466000)=""/4096, 0x1000}], 0x1, &(0x7f0000000100)=""/81, 0x51}, 0x0) 2018/03/12 10:19:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000a7c000)=0x2d, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) [ 29.583988] audit: type=1400 audit(1520849941.212:10): avc: denied { setopt } for pid=5257 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 2018/03/12 10:19:01 executing program 4: r0 = socket(0x2, 0x3, 0xff) sendto$inet(r0, &(0x7f0000000000)="f6b0d4dc21847d9e0900e21e1e102c9dd9b359f9", 0x14, 0x0, &(0x7f0000001040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) [ 29.611945] audit: type=1400 audit(1520849941.242:11): avc: denied { create } for pid=5279 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 2018/03/12 10:19:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000200)='bcsf0\x00') r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x1, &(0x7f0000000000)=0xe, 0x193) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') 2018/03/12 10:19:01 executing program 2: accept$inet6(0xffffffffffffffff, &(0x7f0000000180), &(0x7f00000001c0)=0x1c) socketpair$inet(0x2, 0x6, 0x800000000000, &(0x7f0000000280)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000002c0), &(0x7f0000000300)=0x8) pipe(&(0x7f0000000e00)) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000e40)={0x0, 0x3, 0x400, 0x0, 0x7, 0x0, 0x8, 0x0, {0x0, @in6={{0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}}}, 0x0, 0x0, 0x0, 0x2, 0x100}}, &(0x7f0000000f00)=0xb0) 2018/03/12 10:19:01 executing program 0: syz_emit_ethernet(0x1270, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={0xac, 0x14, 0x14, 0xbb}}}}}, &(0x7f00000000c0)) 2018/03/12 10:19:01 executing program 4: r0 = socket(0x2, 0x80000000000001, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00002f0000)=[{&(0x7f00003deff0)=@in={0x2}, 0x10, &(0x7f0000001300)}], 0x1, 0x20008843) listen(r0, 0x0) 2018/03/12 10:19:01 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00000002c0)={@dev={0xfe, 0x80}, @mcast2={0xff, 0x2, [], 0x1}, @dev={0xfe, 0x80}, 0x0, 0x2}) 2018/03/12 10:19:01 executing program 1: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f00000000c0)="1f000000160007f2000094ffa4000800000000000000000000000000f30004", 0x1f) 2018/03/12 10:19:01 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=@ipv4_newaddr={0x20, 0x14, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @dev={0xac, 0x14, 0x14}}]}, 0x20}, 0x1}, 0x0) 2018/03/12 10:19:01 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00002e9000)={0xffffffffffffffff}) close(r0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000359fff)="97", 0x1, 0x0, &(0x7f00000003c0)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvmmsg(r0, &(0x7f0000003ec0), 0x0, 0x0, 0x0) [ 29.613882] audit: type=1400 audit(1520849941.242:12): avc: denied { write } for pid=5279 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 29.642219] audit: type=1400 audit(1520849941.282:13): avc: denied { dac_override } for pid=3860 comm="syz-executor0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 29.756146] audit: type=1400 audit(1520849941.392:14): avc: denied { ioctl } for pid=5318 comm="syz-executor3" path="socket:[13596]" dev="sockfs" ino=13596 ioctlcmd=0x89a0 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 2018/03/12 10:19:01 executing program 5: r0 = socket$inet(0x2, 0x8000a, 0x0) getsockname(r0, &(0x7f0000000280)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, &(0x7f00000002c0)=0x14) 2018/03/12 10:19:01 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000000)=@assoc_value, &(0x7f0000000080)=0x8) 2018/03/12 10:19:01 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2}, 0x0, 0xffffffffffffffff, r0, 0x0) 2018/03/12 10:19:01 executing program 4: socketpair$unix(0x1, 0x400000000003, 0x0, &(0x7f0000634000)={0xffffffffffffffff}) connect$unix(r0, &(0x7f00000bc000)=@abs, 0x8) connect$unix(r0, &(0x7f0000001000)=@abs, 0x6e) 2018/03/12 10:19:01 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000389000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x3de, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa096, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 2018/03/12 10:19:01 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) bind$inet(r0, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f00000007c0)='\x00', 0x1, 0x20020003, &(0x7f0000000640)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000f43ffc)=0xfffffffffffffffc, 0x4) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x7fff, 0x80000001}, 0x14) setsockopt$inet_tcp_int(r0, 0x6, 0xa, &(0x7f0000000000)=0xfffffffffffff001, 0x4) sendto$inet(r0, &(0x7f0000000140)="e0b7ed56969279eab9867942fe94f5ed66e7d548de0e8c8a58f7", 0x1a, 0x0, &(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14}}, 0x10) 2018/03/12 10:19:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x200010a}, 0x90) 2018/03/12 10:19:01 executing program 6: mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='autofs\x00', 0x0, 0x0) 2018/03/12 10:19:01 executing program 7: mkdir(&(0x7f00005fcff8)='./file0\x00', 0x0) mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000000000)="08c70387222c") 2018/03/12 10:19:01 executing program 2: unshare(0x20400) 2018/03/12 10:19:01 executing program 7: mkdir(&(0x7f00005fcff8)='./file0\x00', 0x0) mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000000000)="08c70387222c") 2018/03/12 10:19:01 executing program 6: mount(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000145ffe)='..', &(0x7f0000c31000)='autofs\x00', 0x0, 0x0) 2018/03/12 10:19:01 executing program 4: pipe(&(0x7f0000000080)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000280)="9222a28ebe82", 0x6) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000180), 0x1000001be}], 0x78, 0x0) 2018/03/12 10:19:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000192ff0)=[{0x10000000000020, 0x0, 0x0, 0xffff7ffffffff038}, {0x6}]}, 0x10) 2018/03/12 10:19:01 executing program 6: epoll_create(0x8001) [ 29.936154] syz-executor5 uses obsolete (PF_INET,SOCK_PACKET) [ 29.955918] tmpfs: No value for mount option 'LJ"' 2018/03/12 10:19:01 executing program 1: mmap(&(0x7f0000000000/0xeef000)=nil, 0xeef000, 0x0, 0x60031, 0xffffffffffffffff, 0x0) [ 29.984227] tmpfs: No value for mount option 'LJ"' 2018/03/12 10:19:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001800)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000000)={&(0x7f0000002ff4)={0x10}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@ipv4_newaddr={0x20, 0x14, 0x471e55c68fa448cd, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r1}, [@IFA_LOCAL={0x8, 0x2, @rand_addr=0x2}]}, 0x20}, 0x1}, 0x0) 2018/03/12 10:19:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) sendto$inet6(r0, &(0x7f0000b31000)="f9", 0x1, 0x0, &(0x7f00009e1000)={0xa, 0xff, 0x1, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0x1}, 0x1c) 2018/03/12 10:19:01 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0xef) sendto$inet6(r0, &(0x7f0000001ffe), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0x2}, 0x1c) 2018/03/12 10:19:01 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x7a, &(0x7f0000f83000)={0x0, @in6={{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, &(0x7f000095f000)=0x98) 2018/03/12 10:19:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00002e9000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00002c2000)={0x1, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000e6e000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @loopback={0x0, 0x1}}}}, 0x392) 2018/03/12 10:19:01 executing program 1: r0 = socket(0x2, 0x3, 0xff) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) 2018/03/12 10:19:01 executing program 7: mkdir(&(0x7f00005fcff8)='./file0\x00', 0x0) mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000000000)="08c70387222c") 2018/03/12 10:19:01 executing program 6: r0 = socket$inet6(0xa, 0x803, 0x1) bind$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) 2018/03/12 10:19:01 executing program 6: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@loopback={0x0, 0x1}, 0x800, 0x2}, 0x20) 2018/03/12 10:19:01 executing program 2: r0 = socket(0x2, 0x2000000001, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000fff)={0x10002}) getsockopt(r0, 0x0, 0x53, &(0x7f0000001000)=""/8, &(0x7f0000000ffc)=0x8) 2018/03/12 10:19:01 executing program 1: ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000180)) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) readv(r0, &(0x7f0000000400)=[{&(0x7f0000000340)=""/93, 0x2d}], 0x1) read(r0, &(0x7f0000000480)=""/49, 0x31) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000000301ffff00000000ffffffff0000000070fdf8c5b1e023dae575c49feea13be6e2754b5ead400000000000000000000097204c48263577e8cf091f16a2abb4f77aa778071e273e96ef9811128385e811a34ab69d9800a6ef7c2f2f866b4d818851820ebb2f4cd89a743158d91a2fa7de5dca82a1"], 0x78}, 0x1}, 0x0) 2018/03/12 10:19:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x800000000100003) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x1c) accept$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) sendto$inet6(r1, &(0x7f0000f6f000), 0x11d, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x52) 2018/03/12 10:19:01 executing program 6: shutdown(0xffffffffffffffff, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000001c0)={'security\x00'}, &(0x7f0000000240)=0x24) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000340), &(0x7f0000000380)=0x4) socketpair$ipx(0x4, 0x2, 0x0, &(0x7f0000000300)) 2018/03/12 10:19:01 executing program 7: mkdir(&(0x7f00005fcff8)='./file0\x00', 0x0) mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000000000)="08c70387222c") 2018/03/12 10:19:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') socketpair(0x0, 0x0, 0x0, &(0x7f0000000140)) 2018/03/12 10:19:01 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000140)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x100000006, 0x0, @dev={0xac, 0x14}, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, @tcp={{0x4e20, 0x0, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x2}}}}}}, &(0x7f0000000100)) [ 30.069239] tmpfs: No value for mount option 'LJ"' 2018/03/12 10:19:01 executing program 0: perf_event_open(&(0x7f0000348f88)={0x2, 0x70, 0x3e2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x10, 0x3, 0x0, &(0x7f00000026c0)) 2018/03/12 10:19:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}], 0x20) 2018/03/12 10:19:01 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000058000)={0x1, {{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) getpeername(r1, &(0x7f0000000440)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff}}, &(0x7f00000004c0)=0x80) setsockopt$ipx_IPX_TYPE(r2, 0x100, 0x1, &(0x7f0000000500)=0x7ff, 0x4) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00009d3000)={0x1, {{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}}, {{0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14}}}}]}, 0x190) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f00002e9000)={0x1, {{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00002c2000)={0x1, {{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x1, 0x1, [{{0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}}]}, 0x110) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000e6e000)={0x0, {{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}}}, 0x392) 2018/03/12 10:19:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0xb}, 0x1c) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x4e20, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/03/12 10:19:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000012afe4)={0xa, 0x4e22}, 0x1c) listen(r0, 0x800000000100003) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x1a}}}, 0x1c) accept$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) sendto$inet6(r1, &(0x7f0000f6f000), 0x11d, 0x20000004, &(0x7f0000cc7fe4)={0xa, 0x4e22}, 0x52) [ 30.122742] tmpfs: No value for mount option 'LJ"' 2018/03/12 10:19:01 executing program 7: mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000000000)="08c70387222c") 2018/03/12 10:19:01 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000007e00)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0x2, 0x2, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00'], 0x10}}], 0x2, 0x0) 2018/03/12 10:19:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x7) connect$inet(r0, &(0x7f0000606ff0)={0x2, 0x4e20, @loopback=0x7f000001}, 0x10) 2018/03/12 10:19:01 executing program 7: mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000000000)="08c70387222c") 2018/03/12 10:19:01 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback={0x0, 0x1}}, 0x20) getsockopt$inet6_int(r0, 0x29, 0x38, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 2018/03/12 10:19:01 executing program 2: socketpair$unix(0x1, 0x400000000003, 0x0, &(0x7f0000634000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000bc000)=@abs, 0x8) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) close(r0) 2018/03/12 10:19:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) listen(r0, 0x1) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000040)="480000001400190d76a81014aed182f30284470080ffe00700000000000000a2bc5603ca0083d9ab50b3b4eba50000000101ff0000000309ff5bffff08c7e5ed5e00000000000000", 0x48}], 0x1) 2018/03/12 10:19:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180), 0xe9) 2018/03/12 10:19:01 executing program 5: socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000001dc0)) 2018/03/12 10:19:01 executing program 7: mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000000000)="08c70387222c") 2018/03/12 10:19:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x9, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000e4d000)=0x4, 0x4) 2018/03/12 10:19:01 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20000120, 0x5, 0xe70, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000940], 0x2, &(0x7f0000000100), &(0x7f0000000940)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'tunl0\x00', 'bcsf0\x00', 'syzkaller0\x00', 'syzkaller1\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], 0x70, 0xf0, 0x128}, [@common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x2, 'syz0\x00'}}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8}]}, @common=@mark={'mark\x00', 0x10, {{0x0, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff, 0x2, [{{{0x3, 0x0, 0x0, 'gre0\x00', 'ip6gretap0\x00', 'dummy0\x00', 'ip6tnl0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @link_local={0x1, 0x80, 0xc2}, [], 0x8f0, 0x928, 0xa58, [@among={'among\x00', 0x858, {{0x0, 0x0, 0x0, {[], 0x1, [{[], @loopback=0x7f000001}]}, {[], 0x4, [{}, {[], @local={0xac, 0x14, 0x14, 0xaa}}, {[], @broadcast=0xffffffff}, {[], @multicast2=0xe0000002}]}}}}]}, [@common=@dnat={'dnat\x00', 0x10, {{@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x0, 0x0, 'system_u:object_r:tape_device_t:s0\x00'}}}}, {{{0x11, 0x0, 0x0, 'bridge0\x00', 'ip6tnl0\x00', 'erspan0\x00', 'bridge0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], 0x70, 0xa0, 0xd0}, [@common=@STANDARD={'\x00', 0x8}]}, @common=@STANDARD={'\x00', 0x8}}]}, {0x0, '\x00', 0x3, 0xffffffffffffffff, 0x1, [{{{0x15, 0x0, 0x0, "73797a6b61686c65902f00", 'ip_vti0\x00', 'eql\x00', 'syz_tun\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x70, 0x70, 0xc0}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x0, 'syz0\x00'}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x1, [{{{0x19, 0x0, 0x0, 'lo\x00', 'teql0\x00', 'vlan0\x00', 'ip6_vti0\x00', @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], @random="d6da5b54f4cf", [], 0x70, 0x70, 0xa0}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0xee8) 2018/03/12 10:19:01 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='bcsf0\x00') accept4(0xffffffffffffffff, &(0x7f0000000080)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000100)=0x80, 0x800) accept$packet(0xffffffffffffff9c, &(0x7f0000000240), &(0x7f0000000280)=0x14) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') 2018/03/12 10:19:01 executing program 1: r0 = socket$inet(0x2, 0x80006, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x0, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200004c0], 0x0, &(0x7f0000000340), &(0x7f00000004c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000000), 0x14) 2018/03/12 10:19:01 executing program 6: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)) 2018/03/12 10:19:01 executing program 7: mkdir(&(0x7f00005fcff8)='./file0\x00', 0x0) mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000000000)) 2018/03/12 10:19:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000040)=0x9, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000e4d000)=0x4, 0x4) 2018/03/12 10:19:01 executing program 6: accept$unix(0xffffffffffffffff, &(0x7f0000001440)=@abs, &(0x7f00000014c0)=0x6e) mmap(&(0x7f0000713000/0x2000)=nil, 0x2000, 0x0, 0x50000000000031, 0xffffffffffffffff, 0x0) 2018/03/12 10:19:01 executing program 7: mkdir(&(0x7f00005fcff8)='./file0\x00', 0x0) mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000000000)) 2018/03/12 10:19:01 executing program 2: r0 = socket(0x1000000010, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000490000)={&(0x7f00008d4000)={0x10}, 0xc, &(0x7f00002c9ff0)={&(0x7f0000632fb0)=ANY=[@ANYBLOB="4000000018000303ffffffffffffffff02000000000000050000000008001500070000e51300160010000000000000006574683047504c0008000400"], 0x1}, 0x1}, 0x0) 2018/03/12 10:19:01 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f00000001c0)='bcsf0\x00') socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000000)='bcsf0\x00') 2018/03/12 10:19:01 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000000301ffff00000000ffffffff00000000"], 0x14}, 0x1}, 0x0) 2018/03/12 10:19:02 executing program 0: r0 = socket$inet6(0x10, 0x803, 0x0) sendmsg(r0, &(0x7f0000003fc8)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001000)="5500000018007fafb72d1cb2a4a280930206000000a843096c26236925000b0000040149bd50ca8a9848a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000ccd000)}, 0x0) 2018/03/12 10:19:02 executing program 2: r0 = socket(0x11, 0x800000003, 0x600081) bind(r0, &(0x7f00005a2000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r1 = dup2(r0, r0) write$tun(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000e9ff00000080000000000186dd06100000ffff110419baadffffffff00000000000000000000ffffac1414aae6616eff5c45fe800000000000000100000000000000"], 0x1) 2018/03/12 10:19:02 executing program 4: r0 = socket(0x10, 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000ee000), 0x4) write(r0, &(0x7f0000ed7000)="26000000220047019353ff07008a00000002006d200000ff1fc0e9ffff495180e507c7033500", 0x26) 2018/03/12 10:19:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000016000)={0x10}, 0xc, &(0x7f000000b000)={&(0x7f00000282dc)=@dellink={0x20, 0x11, 0x50b}, 0x20}, 0x1}, 0x0) 2018/03/12 10:19:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) 2018/03/12 10:19:02 executing program 7: mkdir(&(0x7f00005fcff8)='./file0\x00', 0x0) mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000000000)) 2018/03/12 10:19:02 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de2ff4)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000000301ffff00000000ffffffff00000000"], 0x14}, 0x1}, 0x0) 2018/03/12 10:19:02 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="b80000001900130200000000000000007f000001000000000000000000000000ac1414bb00000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000001a40960ff3a1f311a3f5df51c37d78c6fdc3505524e677bd"], 0x3}, 0x1}, 0x0) 2018/03/12 10:19:02 executing program 0: r0 = socket$inet6(0x10, 0x803, 0x0) sendmsg(r0, &(0x7f0000003fc8)={&(0x7f0000000000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001000)="5500000018007fafb72d1cb2a4a280930206000000a843096c26236925000b0000040149bd50ca8a9848a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000ccd000)}, 0x0) 2018/03/12 10:19:02 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="b80000001900130200000000000000007f000001000000000000000000000000ac1414bb00000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000001a40960ff3a1f311a3f5df51c37d78c6fdc3505524e677bd"], 0x3}, 0x1}, 0x0) 2018/03/12 10:19:02 executing program 5: r0 = socket$inet(0x2, 0x4000000805, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00006d7ff0)={0x2}, 0x10) connect$inet(r0, &(0x7f000093cff0)={0x2, 0x8000000000004e23, @loopback=0x7f000001}, 0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e23, @loopback=0x7f000001}}}, &(0x7f0000000200)=0x98) 2018/03/12 10:19:02 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000000)=@broute={'broute\x00', 0x20, 0x5, 0x6f8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001180], 0x0, &(0x7f0000000500), &(0x7f0000001180)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x15, 0x0, 0x0, 'syz_tun\x00', 'nr0\x00', 'rose0\x00', 'syz_tun\x00', @empty, [0xff, 0xff, 0xff, 0xff], @random="594e972e9e36", [0xff], 0x2a8, 0x2a8, 0x2f0, [@bpf0={'bpf\x00', 0x210, {{0x35, [{0x100000000, 0x7, 0x1, 0x6}, {0x2, 0x2, 0xca4069, 0xd11}, {0x5, 0x0, 0x200, 0x4}, {0x6, 0xb27, 0x4, 0x7f}, {0x0, 0x0, 0x101, 0x3ff}, {0x7, 0x4, 0x9, 0x1}, {0x0, 0x22, 0x81, 0x5}, {0x36, 0x4d, 0x6, 0x7}, {0x10001, 0x3, 0x3, 0x80}, {0x1, 0x0, 0x0, 0x1}, {0x0, 0x5, 0x7ff, 0x7}, {0x5, 0x7ff, 0x400, 0x80000001}, {0x7, 0x2, 0x240000, 0x5}, {0x5, 0x9, 0xfffffffffffffffc, 0x100000000}, {0x9, 0x6, 0x0, 0x3}, {0x3, 0x0, 0x9, 0x2}, {0x3, 0x10001, 0x22d, 0x5}, {0xffff, 0x100000000, 0x7ff, 0x401}, {0x6, 0x6, 0x4}, {0x1ff, 0xa2e, 0x0, 0x6}, {0x1, 0x8, 0x0, 0xfffffffffffeffff}, {0x6, 0x401, 0x9, 0xb79}, {0x7, 0x1, 0x445, 0x4}, {0x4, 0x40, 0x8, 0x1ff}, {0x4, 0x0, 0x0, 0xa81}, {0x7, 0x4b, 0x9}, {0x0, 0x0, 0x0, 0x100000001}, {0x10001, 0x10000}, {0x5, 0x81, 0x5, 0x1}, {0x0, 0x0, 0xfffffffffffff8c0, 0x3}, {0x1, 0x1, 0xfffffffffffffff8, 0xdc9}, {0x5, 0x4, 0x80000001}, {0x0, 0xffff, 0x6, 0x10000}, {0x2, 0x10001, 0x4, 0x2}, {0x3, 0x79, 0x5482, 0xff}, {0x7, 0x9, 0x6, 0x2}, {0x5, 0x6, 0x2}, {0xffffffffffff8001, 0x80000000, 0x7, 0xffffffff}, {0x8, 0x9b2d9ea, 0x6, 0x1400}, {0xfe, 0x7fff, 0x3, 0x9}, {0x1ff, 0xd, 0x1, 0x100000000}, {0x0, 0x3b13, 0xfffffffffffffbff}, {0x3, 0x7fffffff, 0x8, 0xbd0}, {0x100000000, 0x6, 0x5, 0x3}, {0x1, 0x0, 0x100000001, 0x6}, {0x11b, 0xfffffffffffffff7, 0x2c32e8c1800000, 0x5}, {0x0, 0x215, 0x5, 0x2adb}, {0x80000000, 0x7, 0x40000000, 0xfffffffffffffff7}, {0x3, 0x7fff, 0x3, 0xffffffffffffff80}, {0x101, 0x5, 0x729}, {0x0, 0x4}, {0x0, 0x9, 0x7fffffff, 0x800}, {0x40, 0x10286044, 0x1f}, {0x6, 0x7, 0x4, 0x3800000000}, {0x20, 0x80000000, 0x101, 0x9}, {0x6, 0x1ff, 0x5}, {0xffffffffffffff00, 0x0, 0xfffffffffffffffc}, {0x0, 0x0, 0x848, 0x9}, {0x40, 0x8, 0x80000001, 0x8}, {0x10001, 0x2, 0x85}, {0x100000000, 0xd2aa, 0x1000, 0x5}, {0x2}, {0x0, 0x0, 0x0, 0x9}, {0x6, 0x3f, 0x9, 0xfffffffffffff3ec}]}}}]}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x80000000, 0x5, 0xcaca}}}}, {{{0x13, 0x8, 0x8177, 'tunl0\x00', 'ipddp0\x00', 'bpq0\x00', 'bcsh0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff], @random="acc41d83a766", [0xff, 0xff, 0x102, 0xff, 0xff, 0xff], 0x108, 0x108, 0x158, [@physdev={'physdev\x00', 0x70, {{'ipddp0\x00', {0xff}, '\x00', {0xff}, 0x18, 0x10}}}]}}, @common=@IDLETIMER={'IDLETIMER\x00', 0x28, {{0x8, 'syz1\x00', 0x7}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x1, [{{{0x5, 0x8, 0xe867, "67726574617030000001001100", 'irlan0\x00', 'bridge0\x00', 'gretap0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @empty, [0x0, 0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0x70, 0xc0}}, @common=@log={'log\x00', 0x28, {{0x0, "b277fba8774510c4e51333bb3eabce87394745b1ff69d86dbc19c5622891"}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x1, [{{{0x11, 0x21, 0x6558, '\x00', 'sit0\x00', 'sit0\x00', 'dummy0\x00', @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [0xff, 0xff, 0x93605c309a3a17e9, 0xff, 0x0, 0xff], @empty, [0x0, 0xff, 0x0, 0x0, 0xef], 0xd0, 0x100, 0x130, [@arp={'arp\x00', 0x38, {{0x31f, 0x8809, 0xa, @local={0xac, 0x14, 0x14, 0xaa}, 0xffffffff, @rand_addr=0xfffffffffffff23b, 0xffffff00, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xd}, [0x0, 0xff, 0xff, 0x0, 0x0, 0xff], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], 0x8, 0x80}}}]}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x7ff}}}]}, @common=@STANDARD={'\x00', 0x8}}]}]}, 0x770) 2018/03/12 10:19:02 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000240)={0xa}, 0x1c) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f00000003c0)}}, {{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x80, &(0x7f0000000680), 0x0, &(0x7f0000000080)=[{0x18, 0x29, 0xb, "1b4c"}], 0x18}}], 0x2, 0x0) 2018/03/12 10:19:02 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00009f2000)={&(0x7f000007cff4)={0x10}, 0xc, &(0x7f00009f5000)={&(0x7f00008bc000)=ANY=[@ANYBLOB="2c0000001300ff020000000000000000000000000c0000000000ebff", @ANYBLOB="0c0001000000cb0000000000"], 0x2}, 0x1}, 0x0) 2018/03/12 10:19:02 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@remote={0xfe, 0x80, [], 0xbb}}, 0x14) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000140)={@dev={0xfe, 0x80}}, 0x14) 2018/03/12 10:19:02 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000f53fff), 0xfffffffffffffc64, 0x20000802, &(0x7f000006d000)={0x2, 0x4e23}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 2018/03/12 10:19:02 executing program 1: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000014000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa2830007a6008000000000000000683540150024001d0004c41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) [ 30.444722] netlink: 8 bytes leftover after parsing attributes in process `syz-executor1'. 2018/03/12 10:19:02 executing program 2: r0 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000100)={'nat\x00', 0x0, 0x0, 0x73, [], 0x1000010c, &(0x7f00000001c0), &(0x7f0000000200)=""/4096}, &(0x7f0000001280)=0x108) 2018/03/12 10:19:02 executing program 4: r0 = socket$inet(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f0000014000)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000008000)="4c0000001200ff09fffefd956fa2830007a6008000000000000000683540150024001d0004c41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) 2018/03/12 10:19:02 executing program 0: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@local={0xfe, 0x80, [], 0xaa}}, &(0x7f0000000080)=0x20) 2018/03/12 10:19:02 executing program 5: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f00000000c0)={'bridge0\x00', 0xb1}) 2018/03/12 10:19:02 executing program 3: socket$inet6(0xa, 0x805, 0x0) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 2018/03/12 10:19:02 executing program 7: mkdir(&(0x7f00005fcff8)='./file0\x00', 0x0) mount(&(0x7f0000340ff8)='./file0\x00', &(0x7f0000ff8ff8)='./file0\x00', &(0x7f0000426000)='tmpfs\x00', 0x0, &(0x7f0000000000)="08c703") 2018/03/12 10:19:02 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000d01000)=0x7ff, 0x4) sendto$inet6(r0, &(0x7f0000586000)="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", 0x7f8, 0x4c080, &(0x7f00005fa000)={0xa, 0x4e23}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000a86ffc)=0x8, 0x4) sendto$inet6(r0, &(0x7f0000adb000), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/03/12 10:19:02 executing program 6: syz_emit_ethernet(0x235, &(0x7f0000000280)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @rand_addr=0xf234, @empty, @dev={0xac, 0x14, 0x14}}}}}, 0x0) [ 30.593718] ------------[ cut here ]------------ [ 30.598538] WARNING: CPU: 0 PID: 5634 at net/core/dev.c:2473 skb_warn_bad_offload+0x2af/0x390 [ 30.607213] lo: caps=(0x000000a2803b7c69, 0x0000000000000000) len=2102 data_len=2040 gso_size=1992 gso_type=2 ip_summed=0 [ 30.618311] Kernel panic - not syncing: panic_on_warn set ... [ 30.618311] [ 30.625667] CPU: 0 PID: 5634 Comm: syz-executor1 Not tainted 4.9.87-ga290494 #53 [ 30.633178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.642505] ffff8801adc3ef60 ffffffff81d95a19 ffffffff83a480c0 ffff8801adc3f038 [ 30.650476] ffffffff83ee3400 ffffffff82f373bf 0000000000000009 ffff8801adc3f028 [ 30.658445] ffffffff8142f7e1 0000000041b58ab3 ffffffff8418b658 ffffffff8142f625 [ 30.666411] Call Trace: [ 30.668970] [] dump_stack+0xc1/0x128 [ 30.674307] [] ? skb_warn_bad_offload+0x2af/0x390 [ 30.680858] [] panic+0x1bc/0x3a8 [ 30.685845] [] ? percpu_up_read_preempt_enable.constprop.53+0xd7/0xd7 [ 30.694042] [] ? vprintk_emit+0x3ad/0x750 [ 30.699808] [] ? __warn+0x1a9/0x1e0 [ 30.705057] [] ? skb_warn_bad_offload+0x2af/0x390 [ 30.711519] [] __warn+0x1c4/0x1e0 [ 30.716592] [] warn_slowpath_fmt+0xc4/0x110 [ 30.722533] [] ? __warn+0x1e0/0x1e0 [ 30.727781] [] ? _raw_spin_unlock_irqrestore+0x45/0x70 [ 30.734676] [] ? ___ratelimit+0x53/0x460 [ 30.740371] [] skb_warn_bad_offload+0x2af/0x390 [ 30.746659] [] __skb_gso_segment+0x541/0x680 [ 30.752688] [] validate_xmit_skb+0x44e/0x980 [ 30.758715] [] ? check_preemption_disabled+0x3b/0x200 [ 30.765523] [] ? check_preemption_disabled+0x3b/0x200 [ 30.772337] [] __dev_queue_xmit+0xb2c/0x20a0 [ 30.778366] [] ? __dev_queue_xmit+0x1e2/0x20a0 [ 30.784569] [] ? netdev_pick_tx+0x300/0x300 [ 30.790510] [] ? memcpy+0x45/0x50 [ 30.795582] [] dev_queue_xmit+0x17/0x20 [ 30.801175] [] neigh_resolve_output+0x469/0x770 [ 30.807462] [] ? ip6_finish_output2+0x930/0x1d20 [ 30.813837] [] ? eth_mac_addr+0x1a0/0x1a0 [ 30.819606] [] ip6_finish_output2+0x930/0x1d20 [ 30.825807] [] ? ip6_finish_output2+0x175/0x1d20 [ 30.832184] [] ? ip6_sk_dst_lookup_flow+0x590/0x590 [ 30.838822] [] ? check_preemption_disabled+0x3b/0x200 [ 30.845633] [] ? ip6_mtu+0x209/0x340 [ 30.850969] [] ip6_finish_output+0x2e6/0x750 [ 30.856998] [] ip6_output+0x1f3/0x6a0 [ 30.862416] [] ? ip6_output+0x40c/0x6a0 [ 30.868008] [] ? ip6_finish_output+0x750/0x750 [ 30.874210] [] ? ip6_fragment+0x3390/0x3390 [ 30.880160] [] ip6_local_out+0x95/0x170 [ 30.885753] [] ? ip_reply_glue_bits+0xb0/0xb0 [ 30.891866] [] ip6_send_skb+0xa1/0x340 [ 30.897372] [] udp_v6_send_skb+0x301/0xeb0 [ 30.903225] [] udp_v6_push_pending_frames+0x22f/0x340 [ 30.910034] [] ? udpv6_destroy_sock+0xd0/0xd0 [ 30.916157] [] ? ip_reply_glue_bits+0xb0/0xb0 [ 30.922271] [] udpv6_sendmsg+0x1f38/0x2540 [ 30.928126] [] ? ip_reply_glue_bits+0xb0/0xb0 [ 30.934243] [] ? udp_v6_rehash+0xa0/0xa0 [ 30.939926] [] ? debug_check_no_locks_freed+0x2c0/0x2c0 [ 30.946910] [] ? sock_has_perm+0x1c2/0x3e0 [ 30.952763] [] ? sock_has_perm+0x292/0x3e0 [ 30.958616] [] ? sock_has_perm+0x9f/0x3e0 [ 30.964382] [] ? selinux_file_send_sigiotask+0x310/0x310 [ 30.971454] [] ? check_preemption_disabled+0x3b/0x200 [ 30.978264] [] ? inet_sendmsg+0x201/0x4c0 [ 30.984035] [] inet_sendmsg+0x2bc/0x4c0 [ 30.989636] [] ? inet_sendmsg+0x73/0x4c0 [ 30.995319] [] ? inet_recvmsg+0x4c0/0x4c0 [ 31.001092] [] sock_sendmsg+0xca/0x110 [ 31.006599] [] SYSC_sendto+0x2c8/0x340 [ 31.012106] [] ? SYSC_connect+0x310/0x310 [ 31.017874] [] ? __might_fault+0xe4/0x1d0 [ 31.023641] [] ? udp_lib_setsockopt+0x17a/0x560 [ 31.029928] [] ? SyS_futex+0x22e/0x2d0 [ 31.035437] [] ? do_futex+0x15c0/0x15c0 [ 31.041028] [] ? move_addr_to_kernel+0x50/0x50 [ 31.047232] [] SyS_sendto+0x40/0x50 [ 31.052476] [] ? SyS_getpeername+0x30/0x30 [ 31.058332] [] do_syscall_64+0x1a4/0x490 [ 31.064013] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 31.071451] Dumping ftrace buffer: [ 31.074994] (ftrace buffer empty) [ 31.078673] Kernel Offset: disabled [ 31.082278] Rebooting in 86400 seconds..