[ 16.656981] audit: type=1400 audit(1521516904.631:5): avc: denied { syslog } for pid=4076 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.741557] audit: type=1400 audit(1521516910.716:6): avc: denied { map } for pid=4221 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.2' (ECDSA) to the list of known hosts. 2018/03/20 03:35:17 fuzzer started [ 29.069448] audit: type=1400 audit(1521516917.044:7): avc: denied { map } for pid=4232 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/03/20 03:35:17 dialing manager at 10.128.0.26:46745 [ 34.795750] can: request_module (can-proto-0) failed. [ 34.804637] can: request_module (can-proto-0) failed. 2018/03/20 03:35:23 kcov=true, comps=true [ 35.369358] audit: type=1400 audit(1521516923.344:8): avc: denied { map } for pid=4232 comm="syz-fuzzer" path="/sys/kernel/debug/kcov" dev="debugfs" ino=9452 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2018/03/20 03:35:26 executing program 0: openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/03/20 03:35:26 executing program 7: perf_event_open(&(0x7f0000723f88)={0x2, 0x70, 0xc34, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x0, 0x1}, &(0x7f00000001c0)) 2018/03/20 03:35:26 executing program 1: perf_event_open(&(0x7f0000723f88)={0x2, 0x70, 0xc34, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) 2018/03/20 03:35:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001200e7ff40ffe90009149b00f99b", 0x12, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000fd0ed4)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/60, 0x3c}, {&(0x7f00006f8f8b)=""/117, 0x70}, {&(0x7f0000000180)=""/236, 0xec}, {&(0x7f0000de6000)=""/4096, 0x1000}, {&(0x7f0000000280)=""/85, 0x55}], 0x5, &(0x7f0000fd0000)=""/100, 0x64}}], 0x7fffffffffffc19, 0x0, &(0x7f00000000c0)={0x0, r1+30000000}) 2018/03/20 03:35:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000271000)={0x2, 0x70, 0x49, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) pipe(&(0x7f0000000240)) syz_open_dev$vcsn(&(0x7f0000000280)='/dev/vcs#\x00', 0x0, 0x0) syz_open_pts(r0, 0x0) 2018/03/20 03:35:26 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x40101) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'bridge0\x00', 0x1003}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0x2001}) pwrite64(r1, &(0x7f0000000140)="d8", 0x1, 0x0) 2018/03/20 03:35:26 executing program 3: perf_event_open(&(0x7f0000723f88)={0x2, 0x70, 0xc34, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x0, 0x0) 2018/03/20 03:35:26 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff000}, {0x16}]}, 0x10) [ 38.547379] audit: type=1400 audit(1521516926.522:9): avc: denied { map } for pid=4232 comm="syz-fuzzer" path="/root/syzkaller-shm479368686" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 38.596626] audit: type=1400 audit(1521516926.570:10): avc: denied { sys_admin } for pid=4278 comm="syz-executor2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 38.636670] IPVS: ftp: loaded support on port[0] = 21 [ 38.690615] IPVS: ftp: loaded support on port[0] = 21 [ 38.695893] audit: type=1400 audit(1521516926.662:11): avc: denied { net_admin } for pid=4280 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 38.752152] IPVS: ftp: loaded support on port[0] = 21 [ 38.809911] IPVS: ftp: loaded support on port[0] = 21 [ 38.861235] IPVS: ftp: loaded support on port[0] = 21 [ 38.949337] IPVS: ftp: loaded support on port[0] = 21 [ 39.057992] IPVS: ftp: loaded support on port[0] = 21 [ 39.176771] IPVS: ftp: loaded support on port[0] = 21 [ 40.084532] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 40.200585] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 40.451801] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 40.467832] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 40.596501] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 40.784551] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 40.923007] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 41.082938] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 42.788396] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 42.794508] 8021q: adding VLAN 0 to HW filter on device bond0 [ 42.958323] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 42.964448] 8021q: adding VLAN 0 to HW filter on device bond0 [ 43.120812] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 43.215906] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 43.256773] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 43.262910] 8021q: adding VLAN 0 to HW filter on device bond0 [ 43.322448] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 43.328662] 8021q: adding VLAN 0 to HW filter on device bond0 [ 43.427808] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 43.434168] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.449175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.467294] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 43.473380] 8021q: adding VLAN 0 to HW filter on device bond0 [ 43.484758] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 43.488368] audit: type=1400 audit(1521516931.458:12): avc: denied { sys_chroot } for pid=4280 comm="syz-executor0" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 43.490848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 43.538310] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 43.544556] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.551648] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.584447] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 43.660627] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 43.666815] 8021q: adding VLAN 0 to HW filter on device bond0 [ 43.675338] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 43.732429] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 43.740587] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 43.823167] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 43.829367] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.839616] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.883126] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 43.892697] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 43.898970] 8021q: adding VLAN 0 to HW filter on device bond0 [ 43.915931] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 43.922272] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.935610] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.953602] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 43.959849] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 43.973740] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 43.989572] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 43.996263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.003575] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.039621] audit: type=1400 audit(1521516932.014:13): avc: denied { dac_read_search } for pid=4289 comm="syz-executor4" capability=2 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 44.069659] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 44.076480] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.083550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.092609] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 44.099773] audit: type=1400 audit(1521516932.073:14): avc: denied { net_raw } for pid=5561 comm="syz-executor5" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/03/20 03:35:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000f00000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000f8f000)="0a0775b0", 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="74fa2e", 0x3) 2018/03/20 03:35:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000018000)={&(0x7f000001a000)={0x10}, 0xc, &(0x7f000002fff8)={&(0x7f0000024000)={0x14, 0x1e, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, {0x6}}, 0x14}, 0x1}, 0x0) r1 = add_key(&(0x7f0000000000)='.dead\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080)="80fa5fc5377f85260a82763b92c0ee2ee9e69fddb43636ce3e68e41f4e7bc01436524a88aa80a643d78f52ebdc79a1f92073f27ccdb6fe2b10073ad584d101d87492c0b1856b393245fe", 0x4a, 0x0) r2 = add_key(&(0x7f0000000180)='.dead\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000200)="ddbc735ac1f372af167e68779c2aaf6dc4f8e4b9e805731c8f4cd2f7c9b636f3f16690b0667ed4ad773e9c0231e02cdc313195d8db2f62e2fe7d23ca83e2337d1f50f66a56ddd0a645e8939740dfd7c727aac7916b3d671ab9d6de22536bb27b4ab4bdbe1711ae2243806a3348b18445708269dcf2ba01926e93105cb64c0bd42effa5a677854e4fece4556eca3fc3f797d429edf6befc336eaf5cb34f1ff1bc876d727a068e839fa96eb340ef1656c41c1d1c5434ae990d09a6cb6c5e478aebf54e6e74b1ba890513241ea432e93b4bddd646f04d639bdce8295ff089d770ba06b43b47", 0xe4, 0x0) keyctl$search(0xa, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, r2) 2018/03/20 03:35:32 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x1e) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000140)=@buf={0xe3, &(0x7f0000000040)="4db8e63324d53dd082df1adc1d3ab0d48337befb2e4dcb89190f437f85ee943491d96f8cb9f90d996fe5377d7a18674720e4764aad202348c469257832b1d6ef4a700165676c17503c34225ef50e62d84ed608c8b29f05e285f136e1f0908ab6aa81945efcfd4789898f8355d84e5f93e062bec19cd3cfd0f481684532114181486b9151f4b5dc53a74f3cbe3c554bb57e48154548f51b359503df28ec43bcebc99ec84e6825fe41e5b00c6a69acbff234eefcda009548a493c09e1b8a6a2c95775cf827cc92154d7e9739ea3d43d325920e705ff694e4448ba248a8021e23514632ac"}) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000200), &(0x7f0000eebff0)) clone(0x0, &(0x7f00002c9000), &(0x7f0000d70ffc), &(0x7f00001cc000), &(0x7f0000154000)) 2018/03/20 03:35:32 executing program 1: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) fallocate(r0, 0x0, 0xa7b3, 0x1) r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x9, 0x20000) fcntl$setsig(r0, 0xa, 0xc) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)='\a', 0x1}], 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f00000000c0)=0x4, 0x8) fsetxattr(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="59db6f73322e776c616e30ddb0ce6310249d883cfe14aad6fa8c5d563b0869b66ae65813d674dd71f21dc5f5fb41b9efb4794c2780e7d50e6c0dfa2a025cc5d3162aa5fa9771d0b3c49f46e8877ea0d4283e5fc6318d2e486bf483b1c7694789ec54e2806c3c3a71c0c7f5ae616a18074365297432fb007f8a1f507663673d0f60b623d8e52e201af705da2b7fc14376ccc730c2020d1dcdbd348e5f1d09846aa8f47298326113d8e9dcf95a3dc68a3a5648a5403a6dfdd3d2d2e078ad040a849b8d1b5b008245b1"], &(0x7f0000000080)='dev ', 0x4, 0x2) lseek(r0, 0x0, 0x4) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000040)={0x7, 0xfffffffffffffff7, 0x376, 0x6}, 0x10) 2018/03/20 03:35:32 executing program 4: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0/file0\x00', 0x40000000000000, 0x88) mkdirat(r0, &(0x7f0000643ff8)='./file0\x00', 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000000)='./file0/file0\x00') syz_open_pts(r0, 0x2000) 2018/03/20 03:35:32 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff000}, {0x16}]}, 0x10) 2018/03/20 03:35:32 executing program 3: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$join(0x1, &(0x7f0000fb7000)={0x73, 0x79, 0x7a}) keyctl$session_to_parent(0x12) keyctl$session_to_parent(0x12) 2018/03/20 03:35:32 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) timer_create(0x7, &(0x7f0000000040)={0x0, 0x12, 0x2}, &(0x7f0000000080)=0x0) timer_delete(r2) creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000fb4000)=ANY=[@ANYBLOB="0000fb00008000000000"]) [ 44.152730] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 44.158856] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 44.165748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 44.201487] audit: type=1400 audit(1521516932.175:15): avc: denied { create } for pid=5574 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 2018/03/20 03:35:32 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='hybla\x00', 0x6) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000240)="9403", 0x1) 2018/03/20 03:35:32 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff000}, {0x16}]}, 0x10) 2018/03/20 03:35:32 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x400000000000008b) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}, 0x2000000000000000}, 0x1c) io_setup(0x101, &(0x7f00000000c0)=0x0) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f0000928fc0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000001ec0)="5ba81c8b", 0x4}]) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000000)=0x2, 0x4) r2 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$EBT_SO_GET_INIT_INFO(r2, 0x0, 0x82, &(0x7f0000000040)={'nat\x00'}, &(0x7f0000000100)=0x78) socket$inet_tcp(0x2, 0x1, 0x0) 2018/03/20 03:35:32 executing program 4: r0 = socket$inet6(0xa, 0x0, 0x9) recvmsg$kcm(0xffffffffffffff9c, &(0x7f0000001340)={&(0x7f00000000c0)=@hci={0x0, 0x0}, 0x80, &(0x7f0000001240)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/41, 0x29}, {&(0x7f0000001180)=""/148, 0x94}], 0x3, &(0x7f0000001280)=""/135, 0x87, 0x6055}, 0x2) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000001380)={@ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, r1}, 0x14) setsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000040), 0xfffffffffffffe66) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) getsockname$inet6(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, @local}, &(0x7f00000013c0)=0x1c) 2018/03/20 03:35:32 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f00003f7ffc)=0x1, 0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000bfcffc), &(0x7f0000d12ffc)=0x4) [ 44.238843] audit: type=1400 audit(1521516932.204:16): avc: denied { write } for pid=5574 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 2018/03/20 03:35:32 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000000)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000002480)={0xffffffff}, 0x13f}}, 0xb7) write$rdma_cm(r0, &(0x7f0000000040)=@bind_ip={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x1e8ee92e}, r1}}, 0x30) 2018/03/20 03:35:32 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff000}, {0x16}]}, 0x10) 2018/03/20 03:35:32 executing program 7: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x1, 0x7], 0x3, 0x8, 0xfffffffffffffffc, 0x101, 0x3, 0x800, {0xb8dd, 0x1, 0x7, 0x0, 0x5, 0x9, 0xfff, 0x8, 0x5, 0x85d1, 0x20, 0x8001, 0x7fffffff, 0x5, "702d0b4b9541d9b198d9949a2fed47372447c73e2e5627d326355c20948650df"}}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000239ff6)='/dev/cuse\x00', 0x2, 0x0) io_setup(0x1ff, &(0x7f0000000000)=0x0) io_submit(r2, 0x2, &(0x7f0000000240)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x8, 0xfc34, r0, &(0x7f0000000080)="090585a24a2e3eface4fee27a18684c8ded117f2a551a0c7997191d687dc8f888e23d63f0430ad423a9d8d46782943aed43e", 0x32, 0x5, 0x0, 0x0, r1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x1, r1, &(0x7f0000000140)="960fb794e3dd0de17f94bd9236742cae865c000d48d7294ddaa12153d852ecca4c26c60f06eeb0ebafff713d8b76da72a8484e46704679f76b48d1dc9688e2abb950a993d388a3049beea8b6eee79b4c2ae48c50c4f2c907cd6054c76d0f69446d6c3e15b599464c575a4f8f39f9757b5e326976b74208ff27f4d29d80338497966f2d96c99622b2e3ea1dae2d9f2c04", 0x90, 0x1f, 0x0, 0x1, r0}]) readv(r1, &(0x7f0000c6efe0)=[{&(0x7f00006c8f31)=""/207, 0xcf}], 0x1) io_setup(0xcf, &(0x7f00000000c0)=0x0) io_submit(r3, 0x0, &(0x7f00000003c0)) write$fuse(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x5a) fdatasync(r1) 2018/03/20 03:35:32 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xfffffffffffffffc, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'lo\x00', {0x2, 0x4e20, @broadcast=0xffffffff}}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f000015ffa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-camellia-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f000007ff6f)="9fa0291e41797c3d71854a9fe2cd8586", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f00001cffc8)={0x0, 0x0, &(0x7f000021e000), 0x0, &(0x7f000021efe8)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) r3 = dup3(r2, r1, 0x0) sendmsg$nl_xfrm(r3, &(0x7f00000008c0)={&(0x7f00000afff4)={0x10}, 0xc, &(0x7f0000119ff0)={&(0x7f0000000540)=@migrate={0x50, 0x21, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, {{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in6=@mcast2={0xff, 0x2, [], 0x1}}}}, 0x50}, 0x1}, 0x0) recvmsg(r2, &(0x7f0000214fc8)={&(0x7f0000101000)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, 0x14, &(0x7f0000140fd0)=[{&(0x7f0000214f7d)=""/131, 0x83}], 0x1, &(0x7f0000214000)=""/155, 0x9b}, 0x0) 2018/03/20 03:35:32 executing program 0: mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x2000004, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xef) read(r0, &(0x7f0000004f45)=""/187, 0xbb) setsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000013ffc)=0x2, 0x4) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f00000000c0)=ANY=[@ANYBLOB="0800040000000000"], 0x8) sendto$inet6(r0, &(0x7f0000001ffe), 0x0, 0x0, &(0x7f0000003000)={0xa, 0x4e20, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) 2018/03/20 03:35:32 executing program 2: perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000000300)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r0, &(0x7f0000001dc0)=ANY=[@ANYBLOB="100000d87d076d49", @ANYPTR=&(0x7f0000001d80)=ANY=[@ANYRES32=0xffffffff], @ANYBLOB="01000000000000000a004e23be000000ff02000000000000000000000000000109000000", @ANYRES32=r1], 0x38) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x10800, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f00000000c0)=""/78) write$rdma_cm(r0, &(0x7f0000002340)=@reject={0x9, 0x0, 0xfa00, {r1, 0xc8, "c28141", "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"}}, 0xfffffffffffffd3c) 2018/03/20 03:35:32 executing program 1: mkdir(&(0x7f0000f4eff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000001c000)) mkdir(&(0x7f0000024ff0)='./file0/control\x00', 0x0) lremovexattr(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)=@known='trusted.syz\x00') r0 = open(&(0x7f0000000000)='./file0/file0\x00', 0x200082, 0xc0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000100)=""/14) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000040)) rmdir(&(0x7f0000183ff0)='./file0/control\x00') 2018/03/20 03:35:32 executing program 6: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff000}, {0x16}]}, 0x10) 2018/03/20 03:35:32 executing program 3: r0 = socket$packet(0x11, 0x800000002, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req={0x8, 0x0, 0x9c12, 0xe9e}, 0xfffffffffffffe16) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)=""/81, 0x51}, {&(0x7f0000000000)=""/30, 0x1e}, {&(0x7f0000000100)=""/138, 0x8a}], 0x3, 0x0) 2018/03/20 03:35:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x2, 0x4000) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000140)=0x4) socketpair(0x0, 0x200001, 0x1, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000040), &(0x7f0000000080)=0x10) getsockopt$sock_timeval(r1, 0x1, 0x100000000000037, &(0x7f000000aff0), &(0x7f0000000000)=0x11) 2018/03/20 03:35:32 executing program 7: r0 = socket$packet(0x11, 0x400000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000040), 0x10) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f00000000c0)=""/227) 2018/03/20 03:35:32 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendfile(r0, r1, &(0x7f0000000100), 0x7) ioctl$KVM_SET_SIGNAL_MASK(r1, 0x4004ae8b, &(0x7f0000000140)={0x88, "4a83583ed88835858fc7afa81cd5bbfe1703444358f83ab3b78024d7b6bb5f97ad0b9e5dd6b66a31c60dc2c55d6bf49b2e0729c8e7737a1acc724fe97f3041e564bc7e284a7e1ab2587bbf24aac2081cc25a70d37df4db6f13785ec73c2cf76fc8919010290af625e5fec4d3b7035d119cb82548855464ea3897ca7862df44a543ca3615b3dcf0a0"}) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r2, 0x80000080045006, &(0x7f00000000c0)) [ 44.406523] audit: type=1400 audit(1521516932.298:17): avc: denied { dac_override } for pid=5580 comm="syz-executor5" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/03/20 03:35:32 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff000}, {0x16}]}, 0x10) 2018/03/20 03:35:32 executing program 2: r0 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x2, [0x5, 0xafd1]}, &(0x7f0000000040)=0x8) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, 0x0, 0x2, [{{0xa}}, {{0xa}}]}, 0x18c) 2018/03/20 03:35:32 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x16}]}, 0x10) 2018/03/20 03:35:32 executing program 1: r0 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000ff0ffc)=0x1008000000000003, 0xffce) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000865000), 0xffe4, 0x0, &(0x7f0000fd9ff0)={0x2, 0x4e20, @rand_addr}, 0x10) 2018/03/20 03:35:32 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) r1 = dup2(r0, r0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x6, 0x6, 0x7, 0xffffffff, 0xffff}, &(0x7f00000000c0)=0x98) socket$kcm(0x29, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x1, 0x1}, &(0x7f0000000140)=0x8) sendmsg$nl_route(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getneightbl={0x14, 0x42, 0x2, 0x70bd27, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20000000) getsockopt$inet6_tcp_int(r1, 0x6, 0x14, &(0x7f0000e69000), &(0x7f0000913000)=0x4) 2018/03/20 03:35:32 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000974fee)='/dev/input/event#\x00', 0x0, 0x101002) r1 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x5, 0x0) socketpair$inet(0x2, 0x0, 0x8000, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$notify(r0, 0x402, 0x9) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000140)={r3, 0x8}) write$evdev(r0, &(0x7f0000037fe8)=[{}], 0xfffffe43) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000000180)={{0x9, 0x0, 0x2, 0x3, "ab5467db082238229fcfe6201c96935089cf20ad0bf2e27df257a991720b39f4701cd96f5e61ffef1d33922e", 0x8}, 0x8, [0x2, 0x0, 0xb02, 0x5, 0x1, 0x101, 0x1, 0xffffffffffffffff, 0x6, 0x0, 0xbe0d, 0x800, 0x80, 0x7, 0x7fffffff, 0x1cc9, 0x4, 0x7ff, 0xff, 0x0, 0x40, 0x4, 0x2, 0x7, 0x3, 0x323f, 0x1, 0x81, 0x47ae3e3a, 0x7, 0x7, 0x9a, 0x10000, 0x7780000000000, 0x5, 0xa9d2, 0xfffffffffffffff8, 0x8, 0x2, 0xfffffffffffffffc, 0x1f, 0x2, 0xffffffffffffe18f, 0x3, 0x5, 0x7, 0x6, 0xda4, 0x40, 0x3b13, 0x1, 0x40, 0x100000001, 0x1ff, 0x80, 0xd95, 0x8, 0x6, 0x1, 0xffffffff, 0x1db8, 0x3ff, 0x1, 0x5, 0x9, 0x1, 0x100, 0x6, 0x8, 0x23a, 0x2a6, 0x119, 0x8000, 0xff, 0x7, 0x36ae, 0x5, 0x88a, 0x7, 0x0, 0x8000, 0x8, 0x4, 0x8001, 0x4c, 0x783444d0, 0xffffffffffff8001, 0x62, 0x5, 0x9f, 0x5, 0x5, 0x2800000000000, 0x4, 0x6, 0x0, 0x8, 0x4, 0x9, 0x4, 0x1000, 0x7, 0x1, 0xfffffffffffffffb, 0x7, 0x6, 0x8000, 0x40, 0x7fffffff, 0x8, 0x2, 0x1, 0x8, 0x3, 0x800, 0xe000000, 0x2, 0x9, 0x4, 0xff, 0x6, 0x44, 0x9, 0x100000000, 0x8001, 0x0, 0x7, 0xb84a], {0x77359400}}) mmap(&(0x7f0000a94000/0x1000)=nil, 0x1000, 0x3, 0x8972, 0xffffffffffffffff, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r4, 0xc0086421, &(0x7f0000000080)={r5, 0x2}) mremap(&(0x7f0000a93000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000b1d000/0x1000)=nil) 2018/03/20 03:35:32 executing program 4: r0 = perf_event_open(&(0x7f0000220000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast=0xffffffff}, 0x1}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x2}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYRES32=r4, @ANYBLOB="ed104a35f9f2741a0c4d020081000000"], 0xc) bind$netrom(r0, &(0x7f0000000180)=@full={{0x3, {"0c080e708daf80"}, 0x100}, [{"9e6e7716cd8748"}, {"0971ad25a0c526"}, {"9edf99f0c14eea"}, {"7b8b2a06eca069"}, {"24493b724385da"}, {"8ceed410bcb5f1"}, {"88fd95ec1e148c"}, {"71032e19b1bd42"}]}, 0x48) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000140)) connect$pptp(r3, &(0x7f0000000080)={0x18, 0x2, {0x2, @broadcast=0xffffffff}}, 0x1e) fcntl$getown(r3, 0x9) connect$l2tp(r2, &(0x7f0000003000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x1, 0x15}}, 0x2e) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000040)) 2018/03/20 03:35:33 executing program 5: r0 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001200)={'nat\x00', 0x0, 0x0, 0x90, [], 0x100000e4, &(0x7f00000001c0), &(0x7f0000000200)=""/4096}, &(0x7f0000001280)=0x108) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140)=@assoc_value, &(0x7f0000000180)=0x8) socket$inet_smc(0x2b, 0x1, 0x0) 2018/03/20 03:35:33 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8c7, 0x24000) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000000c0)) getsockopt$inet6_int(r0, 0x29, 0x50, &(0x7f0000000000), &(0x7f0000000040)=0x4) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x8, 0x20000) 2018/03/20 03:35:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, &(0x7f00000001c0)=""/254) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x204000, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[{0x3, 0x10001}, {0x0, 0x7e5}, {0x4, 0x6f8b}], 0x3) 2018/03/20 03:35:33 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000080)=@ethtool_eeprom={0xf, 0x0, 0xe6}}) 2018/03/20 03:35:33 executing program 7: ioctl$DRM_IOCTL_AGP_FREE(0xffffffffffffffff, 0x40206435, &(0x7f0000002000)={0x0, 0x0, 0x0, 0x141371}) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x20, 0x2000) ioctl$KVM_GET_CLOCK(r0, 0x8030ae7c, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00006f4fb8)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0x5, 0x5, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x5}], {0x95}}, &(0x7f00009b4000)='syzkaller\x00', 0xea4c, 0xc3, &(0x7f000000a000)=""/195}, 0x48) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000080)=""/104, &(0x7f0000000100)=0x68) 2018/03/20 03:35:33 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x16}]}, 0x10) 2018/03/20 03:35:33 executing program 3: mmap(&(0x7f0000000000/0x17000)=nil, 0x17000, 0x0, 0x31, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x7fffffff, 0x430042) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x1f}, &(0x7f00000000c0)=0x8) getpeername$netlink(r0, &(0x7f0000000240), &(0x7f0000000280)=0xc) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000100)={r1, @in6={{0xa, 0x4e21, 0x9, @dev={0xfe, 0x80, [], 0xb}, 0x1cb}}, [0x2, 0x9, 0x7, 0x6, 0x0, 0x1, 0xffffffffffffffff, 0x2, 0x0, 0x5, 0xcd8, 0x2, 0x81, 0x7, 0x5]}, &(0x7f0000000200)=0x100) setsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000040), 0x4) 2018/03/20 03:35:33 executing program 4: modify_ldt$write2(0x11, &(0x7f0000000100), 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$notify(r0, 0x402, 0x80000004) r1 = syz_open_dev$sndpcmc(&(0x7f0000001fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r1, 0x81204101, &(0x7f0000005e0b)) sendto$inet(r1, &(0x7f0000000200), 0x0, 0xfffffffffffffffe, &(0x7f0000000080)={0x2, 0x0, @dev={0xac, 0x14, 0x14}}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xa43, 0x1f, 0xfffffffffffffffa, 0x10001}, &(0x7f0000000000)=0x98) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000040)={0x0, 0xff, 0x0, 0x7ff}, &(0x7f00000000c0)=0x18) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/relabel\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000200)={r2, 0x8, 0x0, 0x0, 0x3ff, 0x800, 0x869, 0x3, {r3, @in={{0x2, 0x4e21, @multicast1=0xe0000001}}, 0x1, 0xb6, 0x81, 0x8001, 0x5}}, &(0x7f00000002c0)=0xb0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000380)={r1, 0x50, &(0x7f0000000300)={0x0, 0x0}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000003c0)=r4, 0x4) 2018/03/20 03:35:33 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x1) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0xc0400, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000080)={0x7, 0x1}) r2 = socket(0x1e, 0x2, 0x0) bind(r2, &(0x7f0000d80f80)=@ax25={0x3, {"19c3c518326707"}, 0x8}, 0x80) write$selinux_validatetrans(r1, &(0x7f0000000180)={'system_u:object_r:var_spool_t:s0', 0x20, 'system_u:object_r:ldconfig_cache_t:s0', 0x20, 0x30, 0x37, 0x20, '/usr/lib/telepathy/mission-control-5\x00'}, 0x6f) bind(r2, &(0x7f0000afb000)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) r3 = socket(0x1e, 0x5, 0x0) sendmsg(r3, &(0x7f0000316000)={&(0x7f0000dd7000)=@generic={0x10000000001e, "010000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48006be61ffe06d79f00000000000000076c3f010039d8f986ff03000000000000af50d5fe32c419d67bcbc7e3ad316a198356ed0008341c1fd45624281e27800ece70b076cf979ac40000bd767e2e78a1dfd300981a1565b3b16d7436"}, 0x80, &(0x7f0000d0bfd0), 0x0, &(0x7f00002d4000)}, 0x0) ioctl$sock_SIOCBRADDBR(r3, 0x89a0, &(0x7f0000000000)='sit0\x00') 2018/03/20 03:35:33 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x16}]}, 0x10) 2018/03/20 03:35:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x8000000001e, 0x2, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000040)) bind(r0, &(0x7f00002ff000)=@generic={0x1e, "0103000000000039000000004700000000a979f321b30c5dc8790405c7bad62e0a63a632ed4938d30373fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001b6d7c980400000000e80dc136cb184a"}, 0x80) bind(r0, &(0x7f0000000100)=@generic={0x1e, "01030000000000b9000000004700000000a979f321b30c7bc8790405c7bad62e0a63a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb3151d24acef1f1622ca5bdb9c8ea31000077aeb81c90001d6d7c980400000000f70dc136cb184a"}, 0x80) 2018/03/20 03:35:33 executing program 2: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f00000000c0)={0x7fffffff, 0x9, 0xff, 0x3}) r1 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000f68000)={@loopback={0x0, 0x1}, 0x800, 0x0, 0xff, 0x1}, 0x20) r2 = socket$inet6(0xa, 0x802, 0x0) dup3(r1, r2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f000088c000)={@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x0, 0x2000ff, 0x41}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote={0xfe, 0x80, [], 0xbb}, 0x800, 0x0, 0xff}, 0x20) ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) 2018/03/20 03:35:33 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x10) ioctl$VT_GETMODE(r1, 0x5601, &(0x7f00000003c0)) bind$alg(r1, &(0x7f00000005c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx\x00'}, 0x3a) r2 = accept$alg(r0, 0x0, 0x0) r3 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0xbcb, 0x4000) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r3, 0x40505331, &(0x7f00000004c0)={{0x3, 0x1}, {0x80, 0x19}, 0x77, 0x1, 0x81}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000009c0)="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", 0x6e) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000200)="ddb278cbc2fe70bb9448ec14d0e999d8fcc78bed7f37c2775561a121a4ca1afd74c3c9bc86c10980c0a45ae8e1671241cd6cb87e928bac34a1c0ff5d06ccbb995dbb60", 0x43}], 0x1) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x100, 0x101000) setsockopt$RDS_GET_MR_FOR_DEST(r4, 0x114, 0x7, &(0x7f0000000400)={@hci={0x1f, 0x0, 0x3}, {&(0x7f0000001140)=""/4096, 0x1000}, &(0x7f0000000100), 0xe}, 0xa0) getsockopt$inet6_mreq(r4, 0x29, 0x1d, &(0x7f0000000180)={@ipv4={[], [], @multicast2}}, &(0x7f00000001c0)=0x14) recvmsg(r2, &(0x7f0000000300)={&(0x7f0000000080)=@llc={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000fc0)=""/182, 0xb6}], 0x1, &(0x7f0000001080)=""/137, 0x89}, 0x0) [ 45.292885] kernel msg: ebtables bug: please report to author: Num_counters wrong [ 45.305441] audit: type=1400 audit(1521516933.279:18): avc: denied { prog_load } for pid=5687 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 45.333071] kernel msg: ebtables bug: please report to author: Num_counters wrong 2018/03/20 03:35:33 executing program 5: syz_emit_ethernet(0x1f9, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) 2018/03/20 03:35:33 executing program 0: mmap(&(0x7f0000000000/0xf82000)=nil, 0xf82000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x9) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40000, 0x0) bind$netrom(r2, &(0x7f0000000040)=@full={{0x3, {"3b3815864d5471"}, 0xfdb}, [{"19842a018dcb94"}, {"fa23f3ddc7c274"}, {"3a6ae62e5ef3b3"}, {"1b21fdcd6d4ea9"}, {"53d61ca8f58254"}, {"5e5a27314ebffa"}, {"a92e72a3c2f908"}, {"7a2d47cc48f41d"}]}, 0x48) getsockopt$inet6_int(r0, 0x29, 0x3a, &(0x7f0000be83f6), &(0x7f0000526ffc)=0x4) ioctl$sock_ifreq(r2, 0x8929, &(0x7f00000000c0)={'bcsf0\x00', @ifru_flags=0x3800}) 2018/03/20 03:35:33 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x1) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x88a8}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=r1, 0x4) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}, @local={0xac, 0x14, 0x14, 0xaa}, {[@lsrr={0x83, 0x7, 0x5ef, [@multicast1=0xe0000001]}, @ssrr={0x89, 0x3}]}}, @igmp={0x0, 0x0, 0x0, @broadcast=0xffffffff}}}}}, &(0x7f00000002c0)) 2018/03/20 03:35:33 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0xfffffffffffffffe, 0x0) r1 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000ff9000/0x4000)=nil) shmctl$SHM_LOCK(r1, 0xb) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180)=0x0) tgkill(r2, r3, 0x9) lsetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '/dev/snd/controlC#\x00'}, &(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x13, 0x3) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000000)={0x4}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x100, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f00000002c0)={@empty, @multicast2, 0x0}, &(0x7f0000000300)=0xc) setsockopt$inet_mreqn(r4, 0x0, 0x24, &(0x7f0000000340)={@dev={0xac, 0x14, 0x14, 0x17}, @broadcast=0xffffffff, r5}, 0xc) 2018/03/20 03:35:33 executing program 5: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000080)='.', 0x1, 0xfffffffffffffffe) keyctl$search(0xa, r0, &(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) 2018/03/20 03:35:33 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) get_mempolicy(&(0x7f0000000100), &(0x7f0000000140), 0x80000001, &(0x7f0000ffc000/0x1000)=nil, 0x4) 2018/03/20 03:35:33 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast2=0xe0000002, @loopback=0x7f000001}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000406fe0)={@multicast2=0xe0000002, @loopback=0x7f000001, 0x0, 0x2, [@rand_addr=0xfffffffffffffe01, @empty]}, 0x18) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000040)=""/73, &(0x7f00000000c0)=0x49) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000033000)={@multicast2=0xe0000002, @loopback=0x7f000001, @rand_addr}, 0xc) 2018/03/20 03:35:33 executing program 5: r0 = epoll_create1(0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000b86ff6)='/dev/cuse\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00005f8ff4)) dup3(r1, r0, 0x80000) read$eventfd(r1, &(0x7f00003a4ff8), 0x8) 2018/03/20 03:35:33 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xfffff000}, {0x16}]}, 0x10) [ 45.432085] audit: type=1400 audit(1521516933.406:19): avc: denied { ipc_lock } for pid=5733 comm="syz-executor0" capability=14 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/03/20 03:35:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x2d00, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000080)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f000074af90)={[{0x7}]}) syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x0, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000001000)) getsockname$ax25(r0, &(0x7f0000000100), &(0x7f0000000180)=0x10) faccessat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0xc0, 0x1000) 2018/03/20 03:35:33 executing program 5: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000300)={0x0, 0x8}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000380)=@assoc_value={r1, 0x4}, 0x8) r2 = syz_open_dev$tun(&(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x7, 0x5) getsockopt$inet6_buf(r3, 0x29, 0xf3, &(0x7f0000000200)=""/78, &(0x7f0000000080)=0x4e) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x4012}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x400002, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$l2tp(r4, &(0x7f00000001c0)=@pppol2tpin6={0x18, 0x1, {0x0, r5, 0x3, 0x2, 0x0, 0x0, {0xa, 0x4e23, 0x672, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x7}}}, 0x32) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f00000003c0)) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000040)={0x0, 0x3, 0x2, 0x3, 0x6}) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000000)={r1, 0x1, 0x3, 0xffffffffffffffff}, &(0x7f0000000400)=0x10) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000140)={'icmp6\x00'}, &(0x7f0000000280)=0x1e) 2018/03/20 03:35:33 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) creat(&(0x7f0000000180)='./file0\x00', 0x100) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x691b, 0x20000) getsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0x1000, &(0x7f0000000080)=0x4) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7ffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000082000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_netfilter(r0, &(0x7f00000fbfc8)={&(0x7f000066fff4)={0x10}, 0xc, &(0x7f00000b1000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140007000000b3880000ad0000f100ffff0000006808a07ef706bf7627b857d3ebed1bb9a0dce72d98c21b6cba852945d56855107df78fcb6870e330dfaf5e47d7a7fbb0cdbf318155466c7475f8ff777e6d9a410dbb915388fa3a439ae3ec590641e0139219812e96f27206ea36750ec445746e2508589d45dc74ed4b9db3c1319a"], 0x14}, 0x1}, 0x0) 2018/03/20 03:35:33 executing program 2: mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) truncate(&(0x7f000024aff8)='./file0\x00', 0x0) io_setup(0x8, &(0x7f0000000000)) 2018/03/20 03:35:33 executing program 1: socket$netlink(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0xe) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x20}, 0x1}, 0x0) 2018/03/20 03:35:33 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000025bfc8)={&(0x7f0000000040)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000171fc4)=ANY=[]}, 0x1}, 0xfffffffffffffffc) r1 = open(&(0x7f0000000080)='./file0\x00', 0x4b4040, 0x40) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f00000000c0)={0x4, 0x2, 0x85, 0x9, 0x6, 0x9}) 2018/03/20 03:35:33 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0xfffff000}, {0x16}]}, 0x10) 2018/03/20 03:35:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000021ff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x2, 0x71, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f000063a000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000000)="baf80c66b8d4d9f78d66efbafc0ced66b9800000c00f326635002000000f300f35dbe23e0fe3e40f20c06635040000000f22c0f3ab660f3a600474baf80c66b860489e8666efbafc0ced440f20c066350a000000440f22c0", 0x58}], 0x1, 0x0, &(0x7f00000000c0), 0xfdfa86740b472fe) ioctl$KVM_RUN(r2, 0xae80, 0x0) pwrite64(r2, &(0x7f0000000080)="705835a75967a57e253d6f76438f9d82cefb00d7b815cacb577f6231af1ac23ee3a91dec953be44399190c144e5d631fcc377438371b1d80bb8e1ad71462c31b", 0x40, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2018/03/20 03:35:33 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000783000)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000140)=""/28, 0x14) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x4000, 0x0) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000040)=0x2, 0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, 'port1\x00', 0xa9824f69d1376637, 0x20000010800a}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0xfffffffffffffffe, 0x0) 2018/03/20 03:35:33 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x30}, {0x16}]}, 0x10) [ 45.542967] audit: type=1400 audit(1521516933.517:20): avc: denied { create } for pid=5750 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 2018/03/20 03:35:33 executing program 1: r0 = socket$netlink(0xa, 0x5, 0x0) r1 = syz_open_dev$binder(&(0x7f0000e5b000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/create\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8918, &(0x7f0000000080)={'dummy0\x00'}) 2018/03/20 03:35:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="2f65786500000000000035abe1e80d903e0d717ac1889a45e581c9e14a5c8f95f5d2968ae8c767e9d18fd69a") r1 = syz_open_dev$binder(&(0x7f0000008ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) write$eventfd(r0, &(0x7f0000000000)=0x2, 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x20011, r1, 0x0) ioctl$fiemap(r0, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYBLOB="0000000000000000000000000000000300000000000000000000"]) 2018/03/20 03:35:33 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x30}, {0x16}]}, 0x10) 2018/03/20 03:35:33 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f000028c000)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000000c0)={0x14, 0x18, 0xffffffffffffffff, 0x0, 0x0, {0x5}}, 0x14}, 0x1}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1, 0x101000) setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100)=@int=0x7fffffff, 0x4) 2018/03/20 03:35:33 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x7, &(0x7f0000002000)) unshare(0x400) fcntl$lock(r0, 0x7, &(0x7f0000010000)) dup3(r0, r1, 0x0) 2018/03/20 03:35:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x89fe, &(0x7f00000000c0)={'gre0\x00', @ifru_data=&(0x7f0000000080)="47710859fbae78f013a307049d1df1beab581a5b6119c0baec658d65bb087e08"}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getpeername(r0, &(0x7f00000003c0)=@hci={0x0, 0x0}, &(0x7f0000000100)=0xa5) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000140)={@mcast1={0xff, 0x1, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, 0x7, 0x7fff, 0x0, 0x400, 0x8, 0x200, r2}) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x44001, 0x0) mq_getsetattr(r3, &(0x7f0000000340)={0x3, 0x1, 0x3, 0x8, 0x6, 0x4, 0x4}, &(0x7f0000000380)) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000200), 0x4) openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x4000, 0x0) [ 45.682710] audit: type=1400 audit(1521516933.554:21): avc: denied { write } for pid=5750 comm="syz-executor7" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 2018/03/20 03:35:33 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x30}, {0x16}]}, 0x10) 2018/03/20 03:35:33 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xe0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x9d, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x100, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) socket$pptp(0x18, 0x1, 0x2) clone(0x0, &(0x7f0000001280), &(0x7f0000001180), &(0x7f0000001340), &(0x7f0000001300)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)="cb2176626f786e6574305c2f00") 2018/03/20 03:35:33 executing program 7: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, &(0x7f0000000080)=""/178, &(0x7f0000000140)=0xb2) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000002c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00001ec000)="0a0775b0d5e383e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in={{0x2, 0x4e20, @rand_addr=0x7}}, 0x0, 0x6, 0x80000000, "3e9c265178976cb7713a1f892b72e81ad8b82e54b374956ab74a2397e5153b33156598b2d58d3eb168c6f7755e565dbfd4a868ef9af9bc2c69592ddb5f1841f5eaf16c5c5080c4be52036b2dc66efb12"}, 0xd8) io_setup(0x1, &(0x7f0000479000)=0x0) io_setup(0x1, &(0x7f0000000000)) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) io_submit(r3, 0x1, &(0x7f0000738000)=[&(0x7f0000f73fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f000079a000)="16", 0x1}]) 2018/03/20 03:35:33 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000c26000)=0xffffffffffffffff, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000000)=0x8, 0x4) syz_open_dev$random(&(0x7f0000000040)='/dev/random\x00', 0x0, 0xa0800) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) bind$inet(r0, &(0x7f0000490000)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x800000020000000, &(0x7f0000000080)={0x2, 0x4e22, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000965fec)={0x40000004, 0x800000000000852b, 0xffff, 0x10000007ffffffd}, 0x14) sendto$inet(r0, &(0x7f0000000040), 0x3e1, 0x40881, &(0x7f0000000140)={0x2, 0x0, @multicast2=0xe0000002}, 0x10) writev(r0, &(0x7f0000793fa0)=[{&(0x7f0000dfa000)="06", 0x1}], 0x1) sendto$inet(r0, &(0x7f000030a000)='\x00', 0x1, 0x1, &(0x7f0000e88000)={0x2, 0x0, @broadcast=0xffffffff}, 0x10) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x44080, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'ip6_vti0\x00', 0x1000}) epoll_create(0x0) 2018/03/20 03:35:33 executing program 5: r0 = socket$inet(0x2, 0x80006, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000780)=@broute={'broute\x00', 0x20, 0x2, 0x2a0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800], 0x0, &(0x7f0000000000), &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x318) 2018/03/20 03:35:33 executing program 3: pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x84000) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x9, 0x800000}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={r1, 0x4, 0x2, 0x973, 0xdf, 0x8}, 0x14) ustat(0x0, &(0x7f0000000140)) syz_emit_ethernet(0x15e, &(0x7f00000003c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "bd5202", 0x128, 0x21, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, {[@fragment={0x16, 0x0, 0x3, 0xd1b, 0x0, 0x9, 0x67}, @srh={0x2f, 0x6, 0x4, 0x3, 0x7, 0xb9, 0x3, [@mcast1={0xff, 0x1, [], 0x1}, @remote={0xfe, 0x80, [], 0xbb}, @dev={0xfe, 0x80, [], 0x12}]}, @srh={0x1, 0x10, 0x4, 0x8, 0x7, 0xfff, 0x7fff, [@loopback={0x0, 0x1}, @loopback={0x0, 0x1}, @loopback={0x0, 0x1}, @empty, @dev={0xfe, 0x80, [], 0xa}, @ipv4={[], [0xff, 0xff], @rand_addr=0x100000000}, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @loopback={0x0, 0x1}]}, @srh={0x3a, 0x4, 0x4, 0x2, 0x2c6, 0x5, 0xffffffffffffff54, [@ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0x16}}, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}]}, @dstopts={0x0, 0x2, [], [@pad1={0x0, 0x1}, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x800}, @jumbo={0xc2, 0x4, 0x81}, @padn={0x1, 0x1, [0x0]}]}], @icmpv6=@mld={0x0, 0x0, 0x0, 0x7, 0x6, @remote={0xfe, 0x80, [], 0xbb}}}}}}}, &(0x7f0000000600)={0x0, 0x2, [0x8ab, 0x67e, 0x4ed, 0xe58]}) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={r1, 0x7fff, 0x10}, 0x6ad) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000000)={0x3, 0xffffffffffffffff}) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0x92) socket$netlink(0x10, 0x3, 0xc) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f00000001c0)) 2018/03/20 03:35:33 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x1, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff000}]}, 0x10) 2018/03/20 03:35:33 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x4000, 0x0) socket$key(0xf, 0x3, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x4, 0x7ff, 0x40}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000300)={r1, 0x6dd}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x17, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="0900eb003eaee9827a4bc1adc553a49613448769291af62335ea94beb1066a8c188ff49e74c20060c01a92bd96714abd7c1fc768d729a7171711aa44760b3e1d7170d39c3b1db6d562885d9e194cf37c70b42e008000007181ac21f4171de7c44d90ba1d7f21cc6d633619f706917648241cba0b77c9818980975a97ab0fe2f7f21a350244a84cd472f768207564eab7e5be001ea6a3c6d9f71e9d4cc409ecbee8ff71b0c174110676f54ad6be28f3824d95eaf8ae73561507ffb20616332687544e5e8115bffa39da6c96883392e56c5248da6502817185514c5aac874a3106418ecfac66081ac0177804e5fdd978"], 0xf3) clone(0xfff7ffffeffffffc, &(0x7f0000000000)="06f8fcf55298560f77dd3721ce6b00577b6943364dd763936900005a687ae579000000000000000000000000", &(0x7f0000e4b000), &(0x7f0000000040), &(0x7f0000000080)="b8b86c3141e199fafbe6d607f8efb4b5d400bcc75dfe56d04a8e39ec903381ffb54ce00993640f6517f9f98deb3cc2015f8c6b6e2c7a5da9907574483eaf0373e640404a22166a7e2badd299b6aeb920e5107bf7f6954612385c029b843da7711249742efaf8da26567f0f3e2ef03ba9ad6e003156ac66895371b710acf70192b5") 2018/03/20 03:35:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f17000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000280)) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x9, 0x5, [0x0, 0x1, 0xfffffffffffffe00, 0x8, 0x0]}, &(0x7f00000000c0)=0x12) ioctl$KDSETMODE(r1, 0x4b3a, 0x5) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000200)=""/103) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000100)={r2, 0xffffffff, 0xdd, "fb5e9862e0993b8f7707344067b6c79edee7a150008e8133d05819e98b2cf5384d854e71ff5b42d4cf20de48499f4f415d4b3520d31a1a7960d93210cecefee222bbdeb8d5da18f4c0fff99f23242150f64bdf9c2f32a6c82c4a66237789075c593d0a2f83ece083420387b2896a9b01d201a50ceba8d3d41c4650b2f68dfa46558f6c375d423682ba71a59d86cb69f31cddeccadb52933e8e0ca056b4b95cc35e4e4ecd96d5a12c49493d6e2af8ae57828be9ba73e741044943328e1b3684738ccfb61b72bd0cf148701b55d1dd46e2869aebe077914c69427c276eba"}, 0xe5) ioctl$int_in(r0, 0x80000000000541b, &(0x7f0000000000)) 2018/03/20 03:35:33 executing program 1: r0 = perf_event_open(&(0x7f00000bf000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000014f88)={0x1, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) clock_settime(0x6, &(0x7f0000000100)={0x77359400}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000140)=0x0) syz_open_procfs(r3, &(0x7f0000000180)='pagemap\x00') connect$netrom(r2, &(0x7f0000000080)=@full={{0x3, {"46f46a92d14869"}}, [{"a40bb584102f70"}, {"fddaef0746c005"}, {"04d021d4908a28"}, {"dc6000ffa143fa"}, {"ef9655e9738a2e"}, {"a2d23c78f3aa0e"}, {"cd4f8a0b3da8b3"}, {"d37e954e3331b3"}]}, 0x48) 2018/03/20 03:35:33 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0xf000, 0x2000}) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x5}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x0, 0xbb}}], 0x2c) 2018/03/20 03:35:33 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_targets\x00') mq_timedsend(r0, &(0x7f0000000180), 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1c9c380}) 2018/03/20 03:35:33 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'erspan0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="3c000000330000000000000100000000200067188f000000000000785dd0760000002b00b970d2dc91b274507e671bbd629d9ed403bef030a089e8154e86ec33b973ee7e20e3e5158e50c5b66874005e4e28fd7c4a1e187fcbc2215ab138372fde108eb4c1677bf9baab2c7220dd1ebb65abca49235589e851320359"]}) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000002000)="24b38b20d0ef3254115223ef6cf758327575c041e002a8089496079b1b45009349041eca724fdec73fab9b04e4a4a5af1d03000000000000007faa62b9c0d263274f4a010c4f93ef85516b042511f32764171ba9bd278cbe360c22f184073fe215dee02fe37161246323ee9c82c790add905b90a64adab9fef855d72abb637d460fc6fb5a9eec5535b119c9dfbde3f76323a5af634e4235a33d57e226460104ca0dedf1f0e8365cd43d106c41d009976034d6557bf8917cad630598f6e58fd1770012d78aabb64ffffffed00002e", 0xce) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000001fde), 0x4) r2 = dup3(r0, r0, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000000200)=0xe8) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000240)={r3, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x15}}, 0x10) 2018/03/20 03:35:33 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff000}, {}]}, 0x10) [ 45.863206] kernel msg: ebtables bug: please report to author: entries_size too small [ 45.865371] dccp_invalid_packet: P.Data Offset(103) too large 2018/03/20 03:35:33 executing program 7: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x2a40000000000000, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xb}}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x4e23, @multicast2=0xe0000002}, 0x80, 0x8, 0x9, 0x5, 0x7fff, &(0x7f0000000080)='syzkaller1\x00', 0x4, 0xffff, 0x100}) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'bond0\x00', {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}}) 2018/03/20 03:35:33 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_tables_matches\x00') ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r0, 0xc0045520, &(0x7f00000000c0)=0xffffffffffffead8) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r1, 0x0, 0x482, &(0x7f0000000080)=""/24, &(0x7f0000f08ffc)=0x6c1a) 2018/03/20 03:35:33 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xaa}, 0xb}, 0x1c) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xfffffffffffffff8, 0x420001) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000080)={0xa42b, 0x3, 0x401, 0x7, 0x8}, 0x14) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20, 0x0, @local={0xfe, 0x80, [], 0xaa}}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000200)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/03/20 03:35:33 executing program 0: r0 = socket$inet_sctp(0x2, 0x800000000000001, 0x84) sendto$inet(r0, &(0x7f0000a34fff)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x4e20, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f000026cfff)="c6", 0x1, 0x0, &(0x7f0000033ff0)={0x2, 0x4e20, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000004c0)={0x0, @in={{0x2, 0x4e20}}, 0x0, 0x0, 0x0, 0x0, 0x34}, 0x98) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e20}}, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x98) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={'ip6gretap0\x00', {0x2, 0x4e22}}) 2018/03/20 03:35:33 executing program 2: exit(0x0) ioprio_get$pid(0x2, 0x0) 2018/03/20 03:35:33 executing program 6 (fault-call:1 fault-nth:0): r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff000}, {0x16}]}, 0x10) 2018/03/20 03:35:33 executing program 4: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x2c, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x11, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x10000, 0x2) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f00000000c0)={{0x0, 0x10000, 0xf, 0xffffffff, 0x1, 0x80, 0xffffffffffffff00, 0x7, 0x6, 0x6, 0x94, 0x80}, {0x2000, 0x3000, 0x4, 0x400, 0x100000001, 0x2, 0x7fff, 0x1, 0x9, 0x6, 0x7, 0x80000000}, {0x0, 0x12004, 0x0, 0x0, 0xfffffffffffffff8, 0x78, 0xfffffffffffffffb, 0x1, 0x4, 0x80000000, 0x10000, 0x697a}, {0xf000, 0x10000, 0xf, 0xa2, 0x1ff, 0x10000, 0x800, 0xe3, 0x3, 0x7f, 0x0, 0x7}, {0xf001, 0x0, 0xb, 0x9, 0x5ce, 0x4, 0x9, 0x5, 0x8000, 0x2, 0x6, 0x3}, {0x3000, 0x4, 0x0, 0x10000, 0x6f47, 0x8, 0x6, 0x9, 0x8, 0x1ff, 0x81, 0x4}, {0x3000, 0x4, 0x8, 0x8001, 0x0, 0x7, 0xfff, 0x6, 0xfffffffffffffffe, 0x7ff, 0x7, 0x20080}, {0x55814eea4c0a2259, 0x4004, 0xf, 0x20, 0x2, 0x8, 0x8, 0x0, 0xfff, 0x3, 0x6, 0x20}, {0x5000, 0x3000}, {0x10000, 0x1}, 0x10008, 0x0, 0x3000, 0x20000, 0x6, 0x100, 0xd000, [0xffff, 0x4, 0x5, 0x20]}) 2018/03/20 03:35:33 executing program 3: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e21, @multicast2=0xe0000002}, @in6={0xa, 0x4e22, 0xad, @remote={0xfe, 0x80, [], 0xbb}, 0x6}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x19}}, @in6={0xa, 0x4e21, 0x100, @dev={0xfe, 0x80, [], 0xa}, 0x2}, @in={0x2, 0x4e22, @broadcast=0xffffffff}, @in6={0xa, 0x4e21, 0x1, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x5}, @in6={0xa, 0x4e21, 0x6, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0x7}], 0xb0) syz_fuse_mount(&(0x7f0000000b00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x24804) [ 45.932247] dccp_invalid_packet: P.Data Offset(103) too large [ 45.968896] FAULT_INJECTION: forcing a failure. [ 45.968896] name failslab, interval 1, probability 0, space 0, times 1 [ 45.980285] CPU: 1 PID: 5862 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #360 [ 45.982249] IPVS: length: 27674 != 8 [ 45.987546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 45.987553] Call Trace: [ 45.987571] dump_stack+0x194/0x24d [ 45.987593] ? arch_local_irq_restore+0x53/0x53 [ 45.987605] ? finish_task_switch+0x1c1/0x7e0 [ 45.987612] ? finish_task_switch+0x182/0x7e0 [ 45.987643] should_fail+0x8c0/0xa40 [ 45.987660] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 45.987702] ? __sched_text_start+0x8/0x8 [ 45.987711] ? find_held_lock+0x35/0x1d0 [ 45.987734] ? __lock_is_held+0xb6/0x140 [ 45.987771] ? check_same_owner+0x320/0x320 [ 45.987791] ? perf_trace_lock_acquire+0xe3/0x980 [ 45.987818] should_failslab+0xec/0x120 [ 45.987832] kmem_cache_alloc_node_trace+0x5a/0x760 [ 45.987840] ? mark_held_locks+0xaf/0x100 [ 45.987851] ? retint_kernel+0x10/0x10 [ 45.987881] __get_vm_area_node+0xae/0x340 [ 45.987902] __vmalloc_node_range+0xa3/0x650 [ 45.987912] ? bpf_prog_alloc+0xaa/0x350 [ 45.987955] __vmalloc+0x45/0x50 [ 46.083638] ? bpf_prog_alloc+0xaa/0x350 [ 46.087688] bpf_prog_alloc+0xaa/0x350 [ 46.091554] ? bpf_prog_kallsyms_find+0x440/0x440 [ 46.096387] ? __might_sleep+0x95/0x190 [ 46.100344] __get_filter+0xe0/0x220 [ 46.104041] sk_attach_filter+0x1d/0x80 [ 46.107996] sock_setsockopt+0x1680/0x1b10 [ 46.112215] ? sock_enable_timestamp+0xb0/0xb0 [ 46.116774] ? proc_fail_nth_write+0x9b/0x1d0 [ 46.121244] ? map_files_get_link+0x3a0/0x3a0 [ 46.125729] ? sock_has_perm+0x2a4/0x420 [ 46.129767] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 46.135107] ? selinux_netlbl_socket_setsockopt+0x10c/0x460 [ 46.140794] ? selinux_netlbl_sock_rcv_skb+0x730/0x730 [ 46.146067] ? selinux_socket_setsockopt+0x64/0x80 [ 46.150976] ? security_socket_setsockopt+0x89/0xb0 [ 46.155972] SyS_setsockopt+0x2ff/0x360 [ 46.159930] ? SyS_recv+0x40/0x40 [ 46.163357] ? SyS_write+0x184/0x220 [ 46.167054] ? SyS_read+0x220/0x220 [ 46.170665] ? do_syscall_64+0xb7/0x940 [ 46.174622] ? SyS_recv+0x40/0x40 [ 46.178055] do_syscall_64+0x281/0x940 [ 46.181925] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 46.187441] ? syscall_return_slowpath+0x550/0x550 [ 46.192347] ? syscall_return_slowpath+0x2ac/0x550 [ 46.197261] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 46.202607] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 46.207435] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 46.212600] RIP: 0033:0x453e69 [ 46.215767] RSP: 002b:00007ff6f6e66c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 46.223458] RAX: ffffffffffffffda RBX: 00007ff6f6e676d4 RCX: 0000000000453e69 [ 46.230702] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 46.237948] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 46.245194] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000014 [ 46.252442] R13: 00000000000004f4 R14: 00000000006f7780 R15: 0000000000000000 [ 46.260822] syz-executor6: vmalloc: allocation failure: 4096 bytes, mode:0x14080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null) [ 46.268291] IPVS: length: 27674 != 8 [ 46.272031] syz-executor6 cpuset=/ mems_allowed=0 2018/03/20 03:35:34 executing program 3: mount(&(0x7f0000000140)='.', &(0x7f00000001c0)='.', &(0x7f0000000080)='bpf\x00', 0x1000, 0x0) umount2(&(0x7f00000000c0)='.', 0xb) 2018/03/20 03:35:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000400000084) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000b03000)={0x0, 0x4}, 0xb) sendto$inet6(r0, &(0x7f00008c4fac)='g', 0x1, 0x4, &(0x7f0000108fe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvmsg(r0, &(0x7f0000000600)={0x0, 0xfcb3, &(0x7f0000002640)=[{&(0x7f0000000500)=""/65, 0x41}], 0x1, &(0x7f0000000580)=""/67, 0x43}, 0x102) [ 46.280796] CPU: 1 PID: 5862 Comm: syz-executor6 Not tainted 4.16.0-rc6+ #360 [ 46.288246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 46.288250] Call Trace: [ 46.288264] dump_stack+0x194/0x24d [ 46.288279] ? arch_local_irq_restore+0x53/0x53 [ 46.308435] ? idr_get_free+0xfd0/0xfd0 [ 46.312404] ? __lock_is_held+0xb6/0x140 [ 46.316476] warn_alloc+0x19a/0x2b0 [ 46.320103] ? zone_watermark_ok_safe+0x400/0x400 [ 46.324944] ? kmem_cache_alloc_node_trace+0x36f/0x760 [ 46.330218] ? retint_kernel+0x10/0x10 2018/03/20 03:35:34 executing program 3: perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) io_setup(0x6, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000140)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000240)="dd017700908229fa3653a90c61075342", 0x10}]) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x800, 0x0) bind$unix(r2, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) 2018/03/20 03:35:34 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000498000)={&(0x7f0000000100)={0x10}, 0xc, &(0x7f00008b7ff0)={&(0x7f0000000000)=ANY=[]}, 0x1}, 0xffffffffffffffff) 2018/03/20 03:35:34 executing program 4: clock_getres(0x3, &(0x7f0000543000)) r0 = accept4$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000080)=0x60, 0x800) connect(r0, &(0x7f00000000c0)=@llc={0x1a, 0x327, 0xadc1ca2, 0xfff, 0x9, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x80) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000140)={0x8, {{0xa, 0x4e21, 0x100000000, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, 0x88) [ 46.334120] ? __get_vm_area_node+0x234/0x340 [ 46.338622] __vmalloc_node_range+0x4f0/0x650 [ 46.343147] __vmalloc+0x45/0x50 [ 46.343159] ? bpf_prog_alloc+0xaa/0x350 [ 46.343171] bpf_prog_alloc+0xaa/0x350 [ 46.343183] ? bpf_prog_kallsyms_find+0x440/0x440 [ 46.343213] ? __might_sleep+0x95/0x190 [ 46.343233] __get_filter+0xe0/0x220 [ 46.343249] sk_attach_filter+0x1d/0x80 [ 46.343261] sock_setsockopt+0x1680/0x1b10 [ 46.343277] ? sock_enable_timestamp+0xb0/0xb0 [ 46.343292] ? proc_fail_nth_write+0x9b/0x1d0 2018/03/20 03:35:34 executing program 1: r0 = socket$inet6(0xa, 0x801, 0x20000000000) syz_emit_ethernet(0x48, &(0x7f0000000000)={@empty, @random="c41b7543a1ad", [{[], {0x8100, 0x3, 0xfffffffffffffff8, 0x1}}], {@llc_tr={0x11, {@snap={0xaa, 0x1, "44ff", "9007bd", 0x11, "b958b1bcf31cf61352123d30f651dd92bac0ac5cde51688ad409775b433ca0f85e960b734e9fccc88c8443cbb9"}}}}}, &(0x7f0000000080)={0x1, 0x1, [0x4cc, 0x444, 0xd58, 0x9d1]}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@dev={0xac, 0x14, 0x14}}, 0x0, @in=@broadcast=0xffffffff}}, 0x49a) [ 46.343305] ? map_files_get_link+0x3a0/0x3a0 [ 46.343336] ? sock_has_perm+0x2a4/0x420 [ 46.343351] ? selinux_secmark_relabel_packet+0xc0/0xc0 [ 46.343365] ? selinux_netlbl_socket_setsockopt+0x10c/0x460 [ 46.343378] ? selinux_netlbl_sock_rcv_skb+0x730/0x730 [ 46.343411] ? selinux_socket_setsockopt+0x64/0x80 [ 46.343426] ? security_socket_setsockopt+0x89/0xb0 [ 46.343445] SyS_setsockopt+0x2ff/0x360 [ 46.343463] ? SyS_recv+0x40/0x40 [ 46.343471] ? SyS_write+0x184/0x220 [ 46.343486] ? SyS_read+0x220/0x220 [ 46.343500] ? do_syscall_64+0xb7/0x940 [ 46.343513] ? SyS_recv+0x40/0x40 [ 46.441279] do_syscall_64+0x281/0x940 [ 46.445145] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 46.450658] ? syscall_return_slowpath+0x550/0x550 [ 46.455565] ? syscall_return_slowpath+0x2ac/0x550 [ 46.460741] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 46.466087] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 46.470914] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 46.476077] RIP: 0033:0x453e69 [ 46.479241] RSP: 002b:00007ff6f6e66c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 46.486922] RAX: ffffffffffffffda RBX: 00007ff6f6e676d4 RCX: 0000000000453e69 [ 46.494164] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000013 [ 46.501408] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 46.508648] R10: 0000000020000440 R11: 0000000000000246 R12: 0000000000000014 [ 46.515890] R13: 00000000000004f4 R14: 00000000006f7780 R15: 0000000000000000 [ 46.523365] Mem-Info: [ 46.525789] active_anon:85238 inactive_anon:66 isolated_anon:0 [ 46.525789] active_file:3488 inactive_file:8572 isolated_file:0 [ 46.525789] unevictable:0 dirty:113 writeback:0 unstable:0 [ 46.525789] slab_reclaimable:6879 slab_unreclaimable:96716 [ 46.525789] mapped:24237 shmem:73 pagetables:689 bounce:0 [ 46.525789] free:1399447 free_pcp:425 free_cma:0 [ 46.559050] Node 0 active_anon:340952kB inactive_anon:264kB active_file:13952kB inactive_file:34288kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:96948kB dirty:452kB writeback:0kB shmem:292kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 151552kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 46.587073] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 46.613194] lowmem_reserve[]: 0 2864 6373 6373 [ 46.617807] Node 0 DMA32 free:2934444kB min:30292kB low:37864kB high:45436kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129292kB managed:2935316kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:872kB local_pcp:700kB free_cma:0kB [ 46.645514] lowmem_reserve[]: 0 0 3509 3509 [ 46.649852] Node 0 Normal free:2647436kB min:37120kB low:46400kB high:55680kB active_anon:340952kB inactive_anon:264kB active_file:13952kB inactive_file:34288kB unevictable:0kB writepending:452kB present:4718592kB managed:3593744kB mlocked:0kB kernel_stack:4320kB pagetables:2756kB bounce:0kB free_pcp:824kB local_pcp:120kB free_cma:0kB [ 46.679618] lowmem_reserve[]: 0 0 0 0 [ 46.683447] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 46.697042] Node 0 DMA32: 3*4kB (M) 4*8kB (UM) 2*16kB (UM) 3*32kB (M) 2*64kB (UM) 1*128kB (M) 3*256kB (UM) 3*512kB (UM) 3*1024kB (UM) 2*2048kB (UM) 714*4096kB (M) = 2934444kB [ 46.712846] Node 0 Normal: 1159*4kB (UME) 2086*8kB (UME) 2150*16kB (UME) 349*32kB (UME) 81*64kB (UME) 16*128kB (UME) 4*256kB (ME) 4*512kB (ME) 10*1024kB (ME) 2*2048kB (UM) 624*4096kB (M) = 2647436kB [ 46.730699] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 46.739269] 12132 total pagecache pages [ 46.743242] 0 pages in swap cache [ 46.746701] Swap cache stats: add 0, delete 0, find 0/0 [ 46.752068] Free swap = 0kB [ 46.755084] Total swap = 0kB [ 46.758097] 1965969 pages RAM [ 46.761223] 0 pages HighMem/MovableOnly [ 46.765196] 329727 pages reserved 2018/03/20 03:35:34 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x20) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) write$rdma_cm(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0a000000040000fa1375ba50128ffe62322dc19ad520e6cf3a1e9e6cd2514433094c38bb2d63b721980ccae5585d3fc590b2d87f61a843f9c941f644276d4c15a33d1888c1b36be1f8d7f2433e7c73baa82984445aebd17d7d24ce3b9fdcc723b75e36b4f3c3d2767ac27cb3934a0dd92992b9f15c532a7166fec7", @ANYRES32=0xffffffff], 0xc) 2018/03/20 03:35:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0xa, 0x5, 0x84) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$bt_hci(r0, 0x84, 0x10, &(0x7f0000000080)=""/4096, &(0x7f0000000000)=0x18f) 2018/03/20 03:35:34 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f0000002140)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000002100)={0xffffffff}, 0x111}}, 0x20) write$rdma_cm(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="03000000000000fa1b"], 0x9) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x0, @multicast1=0xe0000001}}}, &(0x7f00000001c0)=0x90) write$rdma_cm(r0, &(0x7f0000000080)=@query={0x13, 0x10, 0xfa00, {&(0x7f0000000400), r1, 0x2}}, 0x18) 2018/03/20 03:35:34 executing program 4: mmap(&(0x7f0000000000/0xff7000)=nil, 0xff7000, 0x0, 0x32, 0xffffffffffffffff, 0x0) msgctl$IPC_INFO(0x0, 0x3, &(0x7f0000000040)=""/184) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x208200, 0x0) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x4) 2018/03/20 03:35:34 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff000}, {0x16}]}, 0x10) 2018/03/20 03:35:34 executing program 7: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) poll(&(0x7f0000000140)=[{r1}, {}, {r0}], 0x3, 0x800) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f00000000c0)=0x6, &(0x7f0000000100)=0x2) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) 2018/03/20 03:35:34 executing program 3: perf_event_open(&(0x7f0000d2af88)={0x2, 0x78, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x1000000000000005, 0x0) setrlimit(0x1000000000000007, &(0x7f000068d000)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x2000, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0xc) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f00006c3ffc)) 2018/03/20 03:35:34 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$inet6(0xa, 0x7, 0x3, &(0x7f0000000000)={0xffffffffffffffff}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGKBTYPE(r2, 0x4b33, &(0x7f0000000080)) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000058000)={0x1, {{0xa, 0x4e20, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00002c2000)=ANY=[@ANYBLOB="01000000000000000a004e2000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000a004e2000000000ff02000000000000000007000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000040000000000000000000000000000000000000000000000000000000000000000"], 0x190) io_setup(0x1, &(0x7f00000000c0)=0x0) io_submit(r3, 0x1, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x3, r1, &(0x7f0000000100)="2cf102bd1ed8d4e7fa57505b3add8f8a02b229b34388911f5fb708d2d269a6b829d5e9894bbba7106498f3ddc451a98aef3601ecd2a8be2c87c6baadadebc5aa29f1b7b5972257a767ec45a02c99226d0474426d72c7a76e81b8936f21dc25ae2b90cfb788850e3a85f2fa5499bbe966dccf97524f3c5d8fe2c3", 0x7a, 0x6, 0x0, 0x0, r2}]) 2018/03/20 03:35:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) sched_getscheduler(r1) bind$alg(r0, &(0x7f0000eccfa8)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes)\x00'}, 0x58) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'yam0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xc}}}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0xe7) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f000048f000)="ad56b6c5824c8eb995298992ea54c7beef9f5d56530f90c2", 0x18) r2 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000013c0)="df6ee06b9038b3cf", 0x8}], 0x1, &(0x7f0000007000)}, 0x0) io_setup(0x7, &(0x7f0000000200)=0x0) io_submit(r3, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000c2bfc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f000007d000)="b3", 0x1}]) 2018/03/20 03:35:34 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000040)={'ip6gre0\x00', @ifru_mtu}) 2018/03/20 03:35:34 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000440)={0x2, &(0x7f0000000000)=[{0x30, 0x0, 0x0, 0xfffff000}, {0x16}]}, 0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x44000, 0x0) getsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 46.876261] kasan: CONFIG_KASAN_INLINE enabled [ 46.881196] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 46.888596] general protection fault: 0000 [#1] SMP KASAN [ 46.894130] Dumping ftrace buffer: [ 46.897655] (ftrace buffer empty) [ 46.901351] Modules linked in: [ 46.904524] CPU: 1 PID: 5917 Comm: syz-executor1 Not tainted 4.16.0-rc6+ #360 [ 46.911766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 46.921097] RIP: 0010:rdma_resolve_addr+0x13c/0x26c0 [ 46.926171] RSP: 0018:ffff8801ad067680 EFLAGS: 00010207 [ 46.931504] RAX: 0000000000000042 RBX: ffff8801ad067a44 RCX: 0000000000000000 [ 46.938745] RDX: 0000000000000000 RSI: ffff8801ad067a44 RDI: 0000000000000214 [ 46.945984] RBP: ffff8801ad0679e0 R08: ffffffff87450600 R09: 0000000000000000 [ 46.953224] R10: ffff8801ad0679f8 R11: 0000000000000000 R12: dffffc0000000000 [ 46.960463] R13: 00000000000000a0 R14: ffff8801ad067a28 R15: 0000000000000000 [ 46.967707] FS: 00007fbca869c700(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000 [ 46.975904] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 46.981754] CR2: 00007fff39b76f40 CR3: 00000001ac850002 CR4: 00000000001606e0 [ 46.988998] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 46.996243] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 47.003480] Call Trace: [ 47.006040] ? futex_wait+0x6a9/0x9a0 [ 47.009819] ? find_held_lock+0x35/0x1d0 [ 47.013864] ? rdma_bind_addr+0x1b50/0x1b50 [ 47.018161] ? lock_downgrade+0x980/0x980 [ 47.022282] ? perf_trace_lock+0xd6/0x900 [ 47.026404] ? __radix_tree_lookup+0x435/0x5e0 [ 47.030965] ? __mutex_unlock_slowpath+0xe9/0xac0 [ 47.035782] ? wait_for_completion+0x770/0x770 [ 47.040340] ? lock_release+0xa40/0xa40 [ 47.044288] ? check_same_owner+0x320/0x320 [ 47.048580] ? find_held_lock+0x35/0x1d0 [ 47.052625] ucma_resolve_ip+0x142/0x1f0 [ 47.056657] ? ucma_resolve_ip+0x142/0x1f0 [ 47.060864] ? ucma_resolve_addr+0x330/0x330 [ 47.065249] ? kasan_check_write+0x14/0x20 [ 47.069457] ucma_write+0x2d6/0x3d0 [ 47.073057] ? ucma_resolve_addr+0x330/0x330 [ 47.077442] ? ucma_resolve_route+0x1a0/0x1a0 [ 47.081909] ? handle_mm_fault+0x35b/0xb10 [ 47.086120] ? ucma_resolve_route+0x1a0/0x1a0 [ 47.090585] __vfs_write+0xef/0x970 [ 47.094185] ? rcu_note_context_switch+0x710/0x710 [ 47.099088] ? kernel_read+0x120/0x120 [ 47.102946] ? __might_sleep+0x95/0x190 [ 47.106894] ? _cond_resched+0x14/0x30 [ 47.110754] ? __inode_security_revalidate+0xd9/0x130 [ 47.115914] ? avc_policy_seqno+0x9/0x20 [ 47.119948] ? selinux_file_permission+0x82/0x460 [ 47.124764] ? security_file_permission+0x89/0x1e0 [ 47.129665] ? rw_verify_area+0xe5/0x2b0 [ 47.133694] ? __fdget_raw+0x20/0x20 [ 47.137382] vfs_write+0x189/0x510 [ 47.140897] SyS_write+0xef/0x220 [ 47.144320] ? exit_to_usermode_loop+0x198/0x2f0 [ 47.149048] ? SyS_read+0x220/0x220 [ 47.152646] ? do_syscall_64+0xb7/0x940 [ 47.156592] ? SyS_read+0x220/0x220 [ 47.160189] do_syscall_64+0x281/0x940 [ 47.164048] ? __do_page_fault+0xc90/0xc90 [ 47.168252] ? _raw_spin_unlock_irq+0x27/0x70 [ 47.172721] ? finish_task_switch+0x1c1/0x7e0 [ 47.177191] ? syscall_return_slowpath+0x550/0x550 [ 47.182093] ? syscall_return_slowpath+0x2ac/0x550 [ 47.186992] ? prepare_exit_to_usermode+0x350/0x350 [ 47.191982] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 47.197319] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 47.202138] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 47.207296] RIP: 0033:0x453e69 [ 47.210458] RSP: 002b:00007fbca869bc68 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 47.218136] RAX: ffffffffffffffda RBX: 00007fbca869c6d4 RCX: 0000000000453e69 [ 47.225377] RDX: 0000000000000009 RSI: 0000000020000100 RDI: 0000000000000014 [ 47.232617] RBP: 000000000072bf58 R08: 0000000000000000 R09: 0000000000000000 [ 47.239855] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 47.247097] R13: 0000000000000672 R14: 00000000006f9b50 R15: 0000000000000001 [ 47.254348] Code: 31 c0 e8 28 97 53 fd 48 89 df e8 d0 f5 f5 ff 4c 89 ef 48 63 d0 48 89 de e8 c2 c7 8b fd 49 8d bf 14 02 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 14 20 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f [ 47.273449] RIP: rdma_resolve_addr+0x13c/0x26c0 RSP: ffff8801ad067680 [ 47.280047] ---[ end trace 253d7bd2618a23c9 ]--- [ 47.284806] Kernel panic - not syncing: Fatal exception [ 47.290648] Dumping ftrace buffer: [ 47.294166] (ftrace buffer empty) [ 47.297844] Kernel Offset: disabled [ 47.301438] Rebooting in 86400 seconds..