Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 18.757425] random: sshd: uninitialized urandom read (32 bytes read, 33 bits of entropy available) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 20.356412] random: sshd: uninitialized urandom read (32 bytes read, 36 bits of entropy available) [ 20.745306] random: sshd: uninitialized urandom read (32 bytes read, 36 bits of entropy available) [ 21.681808] random: nonblocking pool is initialized Warning: Permanently added '10.128.0.33' (ECDSA) to the list of known hosts. 2018/02/14 10:07:42 fuzzer started 2018/02/14 10:07:42 dialing manager at 10.128.0.26:33333 2018/02/14 10:07:45 kcov=true, comps=false 2018/02/14 10:07:46 executing program 0: mmap(&(0x7f0000000000/0x101000)=nil, 0x101000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000008000-0x4)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000001000)={0x1, &(0x7f000000a000)=[{0x6}]}, 0x10) close(r0) 2018/02/14 10:07:46 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x805, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000001000-0x7)=[@in={0x2, 0xffffffffffffffff, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}], 0x10) 2018/02/14 10:07:46 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x13e, &(0x7f0000a62000-0x4a)={@local={[0xaa, 0xaa, 0xaa, 0xaa], 0x0, 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "cd2000", 0x14, 0x6, 0x0, @empty, @empty, {[], @tcp={{0xffffffffffffffff, 0xffffffffffffffff, 0x42424242, 0x42424242, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, {[]}}}}}}}}, 0x0) 2018/02/14 10:07:46 executing program 4: 2018/02/14 10:07:46 executing program 2: 2018/02/14 10:07:46 executing program 3: 2018/02/14 10:07:46 executing program 5: 2018/02/14 10:07:46 executing program 6: [ 31.518124] IPVS: Creating netns size=2552 id=1 [ 31.579770] IPVS: Creating netns size=2552 id=2 [ 31.622971] IPVS: Creating netns size=2552 id=3 [ 31.676019] IPVS: Creating netns size=2552 id=4 [ 31.731310] IPVS: Creating netns size=2552 id=5 [ 31.801802] IPVS: Creating netns size=2552 id=6 [ 31.900074] IPVS: Creating netns size=2552 id=7 [ 32.024574] IPVS: Creating netns size=2552 id=8 [ 32.469982] ip (4160) used greatest stack depth: 25000 bytes left 2018/02/14 10:07:49 executing program 1: 2018/02/14 10:07:49 executing program 1: 2018/02/14 10:07:49 executing program 1: 2018/02/14 10:07:49 executing program 1: 2018/02/14 10:07:49 executing program 1: 2018/02/14 10:07:49 executing program 1: 2018/02/14 10:07:49 executing program 1: 2018/02/14 10:07:49 executing program 1: 2018/02/14 10:07:49 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000e00000)={@link_local={0x1, 0x80, 0xc2}, @local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff, 0xaa}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @rand_addr, @dev={0xac, 0x14}, {[]}}, @icmp=@info_request={0xf}}}}}, &(0x7f0000ea3000)={0x0, 0x1, [0x0]}) 2018/02/14 10:07:49 executing program 7: 2018/02/14 10:07:49 executing program 2: 2018/02/14 10:07:49 executing program 4: 2018/02/14 10:07:49 executing program 6: 2018/02/14 10:07:49 executing program 3: mmap(&(0x7f0000000000/0xe65000)=nil, 0xe65000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80005, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001000)={0x0, 0x20, &(0x7f0000000000)=[@in={0x2, 0xffffffffffffffff, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, @in={0x2, 0xffffffffffffffff, @rand_addr}]}, &(0x7f0000e64000-0x4)=0x10) 2018/02/14 10:07:49 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) bind$inet6(r0, &(0x7f0000363000)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendto$inet6(r0, &(0x7f00004b6000-0x1)='X', 0x1, 0x0, &(0x7f0000060000-0x1c)={0xa, 0x3, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x9, &(0x7f0000b7d000)={0x0, @in6={{0xa, 0xffffffffffffffff, 0x0, @empty}}, 0x0, 0x4fb4}, 0x98) 2018/02/14 10:07:49 executing program 1: 2018/02/14 10:07:50 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f000029e000)='%{\x00', 0x1) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000f8c000)=0x7ff, 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd1000-0x38)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f00003f4000-0x10a8)={0x2, 0xd, 0x0, 0x0, 0x8, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, [@sadb_x_sec_ctx={0x1, 0x18}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}}]}, 0x40}, 0x1}, 0x0) 2018/02/14 10:07:50 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de3000-0xc)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000d7f000-0x14)={0x14, 0x3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, {}, []}, 0x14}, 0x1}, 0x0) recvmsg(r0, &(0x7f0000fb5000-0x38)={&(0x7f00003d2000)=@pppol2tpv3={0x0, 0x0, {0x0, 0x0, {0x0, 0xffffffffffffffff, @local}}}, 0x2e, &(0x7f000068a000)=[]}, 0x0) 2018/02/14 10:07:50 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f000000c000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, {[]}}, @icmp=@dest_unreach={0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @dev={0xac, 0x14}, {[]}}}}}}}, 0x0) 2018/02/14 10:07:50 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x80003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00004bf000)={@common='bridge0\x00', 0x0}) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f00001a2000)=0x4, 0x4) sendto$packet(r0, &(0x7f000051a000)="9b00010000ecffffffffe55ca73d", 0xe, 0x0, &(0x7f0000572000+0x402)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="2fb96c7e1017"}, 0x14) 2018/02/14 10:07:50 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000df9000-0x27)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0xe7) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000b4c000-0x4), 0x4) sendto(r0, &(0x7f0000cff000-0x12)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000fa3000)={&(0x7f0000d0b000)=@ax25, 0x10, &(0x7f00002b3000)=[], 0x0, &(0x7f0000878000)}, 0x0) 2018/02/14 10:07:50 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000dbc000)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [0xff, 0xff], @empty}}, 0x1c) connect$inet6(r0, &(0x7f00001e2000-0x1c)={0xa, 0xffffffffffffffff, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/02/14 10:07:50 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000073000-0x12)='/dev/input/event#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f00003eb000)={0x0, 0x0, 0x0, {}, {}, @ramp}) r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, &(0x7f0000d04000-0x7)='ns/ipc\x00') 2018/02/14 10:07:50 executing program 3: clone(0x0, &(0x7f0000aed000), &(0x7f00006c4000-0x4), &(0x7f000049d000-0x4), &(0x7f0000c12000)) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001000-0xa)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5437, &(0x7f0000001000)) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000001000-0x8)='./file0\x00', 0x0, 0x4) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sendto(r1, &(0x7f0000000000)="692a5bdef3bc095908988e6f6921717b3d8a605765accf86eb84081e6b0e43df3a95a48a5804835a30cf030095268d9015f1b5651b8c", 0x36, 0x1, &(0x7f0000002000-0x10)=@nfc={0x27, 0x8001, 0x1, 0x7}, 0x10) recvfrom$llc(r1, &(0x7f0000000000)=""/54, 0x36, 0x2020, &(0x7f0000000000)={0x1a, 0x17, 0x2, 0x5, 0x6, 0x7fff, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0x0, 0xbb}}, 0x10) renameat2(0xffffffffffffffff, &(0x7f000082a000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000b2e000-0x8)='./file0\x00', 0x0) 2018/02/14 10:07:50 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000246000-0x16)='/selinux/checkreqprot\x00', 0x82200, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000ced000-0x7c)={0x0, 0x74, "e5d6fb694c67786f035d5dbb201c4ac3f19559debbd576e24a7ca787b9a9bb6f61541af2006cadd83a95ccdb445939fe6dcf69c4328558b0bac7782ccf588a04d072012d4f0a49042a2ac2061a59c6c32f8340eb4878a56069cbfff04d8503fb04f8202c06b37d1edcc32ae9067c8f2be418ccc2"}, &(0x7f00002a7000-0x4)=0x7c) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00002de000)={r1}, &(0x7f0000998000-0x4)=0x8) socketpair$unix(0x1, 0x4000000005, 0x0, &(0x7f000000b000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f000055d000)={r2, 0x6}, &(0x7f0000e6b000-0x4)=0x8) r4 = syz_open_dev$binder(&(0x7f0000011000-0xd)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r5 = accept4$inet6(0xffffffffffffffff, &(0x7f00000da000)={0x0, 0xffffffffffffffff, 0x0, @ipv4={[], [], @multicast1}}, &(0x7f000029a000)=0x1c, 0x80000) setsockopt$inet6_dccp_int(r5, 0x21, 0x11, &(0x7f0000f5c000-0x4)=0xf3e0, 0x4) getsockname$packet(r0, &(0x7f0000920000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000d84000)=0x14) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000644000)={0x0, 0x0}, &(0x7f000014c000-0x4)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000014000-0xe8)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@empty, 0x3, 0x8001, 0x0, 0x6, 0xa, 0xa0, 0xa0, 0x0, r6, r7}, {0x2, 0x4, 0x0, 0x7f, 0x1, 0x0, 0x6, 0xfffffffffffeffff}, {0x400, 0x4a, 0xf8f1, 0x3}, 0x6, 0x0, 0x3, 0x0, 0x3, 0x3}, {{@in=@local={0xac, 0x14, 0x0, 0xaa}, 0x2, 0x3e}, 0xa, @in=@loopback=0x7f000001, 0x2, 0x7, 0x0, 0x5, 0x3, 0x2, 0x3}}, 0xe8) mmap$binder(&(0x7f000000c000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x0) recvmsg(r3, &(0x7f000000e000)={0x0, 0x0, &(0x7f000095c000)=[{&(0x7f0000ea7000)=""/39, 0x27}, {&(0x7f0000a9c000)=""/225, 0xe1}, {&(0x7f00000db000-0x69)=""/105, 0x69}, {&(0x7f0000f12000-0xcd)=""/205, 0xcd}, {&(0x7f00001ec000)=""/39, 0x27}], 0x5, &(0x7f00004ba000)}, 0x0) 2018/02/14 10:07:50 executing program 7: mmap(&(0x7f0000000000/0xb000)=nil, 0xb000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x6, 0x0) mlock(&(0x7f0000001000/0x2000)=nil, 0x2000) mmap(&(0x7f000000b000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000001000)='./file0\x00', &(0x7f000000c000-0x8)='./file0\x00') clone(0x0, &(0x7f000000c000-0x1), &(0x7f000000c000-0x4), &(0x7f0000004000), &(0x7f0000008000-0x1000)) mmap(&(0x7f000000c000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mice(&(0x7f000000c000)='/dev/input/mice\x00', 0x0, 0x400000) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000006000)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f000000b000)='/dev/hwrng\x00', 0x800, 0x0) mmap(&(0x7f000000d000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000e000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000e000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f000000e000)={{{@in=@rand_addr, @in6=@mcast1, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@remote}}, &(0x7f000000e000)=0xa) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000004000-0x14)={@remote={0xfe, 0x80, [], 0x0, 0xbb}, r2}, 0x14) mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000005000-0x10)="7c4774f98fe7637b8fff13140e891c8e", 0x10) 2018/02/14 10:07:50 executing program 3: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000f2c000-0xe8)={{{@in=@broadcast, @in=@multicast2, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@multicast2}}, &(0x7f0000001000-0x4)=0xe8) setuid(r0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0xf, &(0x7f000053c000-0x4), &(0x7f0000001000-0x4)=0xffffffffffffffd1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000b0e000-0x10)='/selinux/status\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r2, 0x40485404, &(0x7f00009e1000)={{0x2, 0x3, 0x7f, 0x0, 0x7fffffff}, 0x8773}) r3 = syz_open_procfs(0x0, &(0x7f000051f000-0xa)='cgroup\x00') prctl$setendian(0x14, 0x0) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f0000d4b000-0x8)={0x5, 0x600000000000000}) ftruncate(r1, 0x100000001) readv(r3, &(0x7f00007a5000)=[{&(0x7f000027b000-0x51)=""/81, 0x51}], 0x1) [ 34.779389] audit: type=1400 audit(1518602870.001:5): avc: denied { create } for pid=4986 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 2018/02/14 10:07:50 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000985000)=',&\x00', 0x0) rt_sigaction(0x6, &(0x7f0000c4a000-0x20)={0xa}, &(0x7f0000278000), 0x8, &(0x7f0000406000+0x651)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x9, 0x11, r0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f00002a1000-0x8)=0x40) rt_sigaction(0x7, &(0x7f0000fc3000-0x20)={0x428425, {0x400003ffffffe}}, &(0x7f00009fb000), 0x8, &(0x7f00001a4000-0x8)) syz_open_dev$evdev(&(0x7f0000258000)='/dev/input/event#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00004cc000-0x8), &(0x7f00004fc000-0x4)=0x8) [ 34.818009] audit: type=1400 audit(1518602870.041:6): avc: denied { read } for pid=4986 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 34.833430] mmap: syz-executor7 (5013) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/02/14 10:07:50 executing program 6: mmap(&(0x7f0000000000/0xf1b000)=nil, 0xf1b000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) mmap(&(0x7f0000f1b000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000f1b000)={@local={0xac, 0x14, 0x0, 0xaa}, @multicast2=0xe0000002}, 0x8) mmap(&(0x7f0000f1c000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) bind(r0, &(0x7f00007df000-0x10)=@in={0x2, 0x0, @dev={0xac, 0x14, 0x0, 0x16}}, 0x1) sendto$inet(r0, &(0x7f0000f1a000)="dc92cbe03a3f805e608740c4763140d4756ef04f24f3ea3122ba2c96a6d60cbe5477028a394b00000000000000074ca8200205760785b6b152e37d5de5bd2f7d4f615c2c57", 0x45, 0x0, &(0x7f0000e82000-0x10)={0x2, 0x0, @empty}, 0x10) r1 = dup3(r0, r0, 0x80000) connect$ipx(r1, &(0x7f000027a000)={0x4, 0x7, 0x0, "9fc673dcb243", 0x9}, 0x10) 2018/02/14 10:07:50 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000985000)=',&\x00', 0x0) rt_sigaction(0x6, &(0x7f0000c4a000-0x20)={0xa}, &(0x7f0000278000), 0x8, &(0x7f0000406000+0x651)) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x9, 0x11, r0, 0x0) ioctl$int_in(r0, 0x5421, &(0x7f00002a1000-0x8)=0x40) rt_sigaction(0x7, &(0x7f0000fc3000-0x20)={0x428425, {0x400003ffffffe}}, &(0x7f00009fb000), 0x8, &(0x7f00001a4000-0x8)) syz_open_dev$evdev(&(0x7f0000258000)='/dev/input/event#\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00004cc000-0x8), &(0x7f00004fc000-0x4)=0x8) 2018/02/14 10:07:50 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000018c000)={0xa, 0x1, 0x57f8d0d, @remote={0xfe, 0x80, [], 0x0, 0xbb}, 0x3}, 0x13b) sendto$inet6(r0, &(0x7f00006a0000)="147771f9102e69d67437c286abe1f17d478e4b10db90b5d9add221e1136216134ad8e84679c5146e46a4cadc413e13a3006fa71ae4b4e3e54b64fd8fcd6cdfacfdab1965afa75d6f6d9b4710579b738f158df11dbc2b6745fd293e5e827eb17f97b18f42c05e53d45a745bd6d45d9d05bbf1f3116017dbaeb7c10b5e5d8c4d91e6f4c188d5b15848643fa2050ef15a959ce9acdbcb3a8065fa5647661ee23b2ca520163c6cefa23b7a3ace91eb262424979a0a03b14c30a4859f8a2e9c748081e380d0eefdac680819fb36acc48c6e5c0a", 0xd1, 0x4000, &(0x7f000045d000-0x1c)={0xa, 0x1, 0x6, @dev={0xfe, 0x80, [], 0x0, 0x10}, 0x8}, 0x1c) bind$inet6(r0, &(0x7f0000a18000)={0xa, 0x2, 0x9f, @local={0xfe, 0x80, [], 0x0, 0xaa}, 0x24000000000}, 0x1c) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f000032d000-0xc)={0x0, @multicast1, @remote}, &(0x7f000064b000)=0xc) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f00003fb000-0x50)={@ipv4={[], [0xff, 0xff], @rand_addr=0x5}, @remote={0xfe, 0x80, [], 0x0, 0xbb}, @empty, 0xe1, 0x800, 0x81, 0x500, 0x3, 0x40000000, r1}) bind$inet6(r0, &(0x7f0000994000-0x1c)={0xa, 0xffffffffffffffff, 0x0, @loopback={0x0, 0x1}}, 0x1c) connect$inet6(r0, &(0x7f0000f70000-0x1c)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0xc) 2018/02/14 10:07:50 executing program 7: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) prctl$setname(0xf, &(0x7f0000000000)=',#@lo\'x[/\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={&(0x7f0000de3000-0xc)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000d7f000-0x14)={0x14, 0x3, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, {}, []}, 0x14}, 0x1}, 0x0) r1 = creat(&(0x7f0000926000)='./file0\x00', 0x10) setsockopt$inet_buf(r1, 0x0, 0x33, &(0x7f00006e8000)="23bf0ba435f13eb4658f1002952e75f4fe12091bc6d0bcd3374527309960345d0fefe3d374d3d28c127d41dc44e67b72b81955f4b2cf7c68c0129359c865558125b1e754369c92ab60d9cf48edab98ed767f22caeb2345cda2035c137497a864dcf4229680da520c1dd351c5", 0x6c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000337000)={0x0, 0xc, "a10d8aa7359577ca7a9fc765"}, &(0x7f0000d67000-0x4)=0x14) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f00001d9000-0x4)=0x5833ee60, 0x4) [ 34.868563] audit: type=1400 audit(1518602870.091:7): avc: denied { write } for pid=4986 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 2018/02/14 10:07:50 executing program 0: mmap(&(0x7f0000000000/0xdf6000)=nil, 0xdf6000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000df4000), &(0x7f0000aab000)=0x4) mmap(&(0x7f0000df6000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00009d2000)='/dev/keychord\x00', 0x400, 0x0) r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000895000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f00001f1000)=0x14, 0x800) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000823000)={0x4, 0xa28, 0x69f7, 0x3, 0x1, 0x9}) mmap(&(0x7f0000df7000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000df7000)={@dev={0xfe, 0x80, [], 0x0, 0x11}, r3}, 0x14) ioctl$sock_proto_private(r0, 0x89e1, &(0x7f0000df6000)="102f7386c3f2c2299c5a7930af3aef72ba72d3add3289e80fd27bc30aab41a9081bde3ff89e656719f098f2e4c31b32c82c8fdef431a72afe33cf9384b9c293d61609bdb4401fd7658d85bf1366383de") mmap(&(0x7f0000df8000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000df9000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f00007b3000)={r3, 0x1, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa], 0x0, 0xaa}}, 0x10) mmap(&(0x7f0000dfa000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000dfa000)={@generic="b364d267a3aeea1481701a658cf27429", @ifru_flags=0x102}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000df9000)={{0xffffffff, 0x3}, 0x1, 0xfffffffffffffffa, 0x8, {0x6d, 0x8}, 0xaea, 0x1f}) getsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000df8000), &(0x7f0000993000-0x4)=0x4) 2018/02/14 10:07:50 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000002000+0x901)='dev ', 0x0) getgid() ftruncate(r0, 0xffff) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00004a4000-0x10)={0x0, 0xb34, 0x4, 0x4}, &(0x7f00006f6000-0x4)=0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000973000-0x4)=@assoc_id=r1, 0x4) write(r0, &(0x7f00007fc000-0x3)='H', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) creat(&(0x7f0000c0d000-0x8)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000ce8000-0x8)={0x1, [0x0]}, &(0x7f0000cbf000-0x4)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00009dc000)={r2, 0x40}, 0x8) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000002000)='./file0\x00') 2018/02/14 10:07:50 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f000086e000-0xc)='/dev/autofs\x00', 0x8002, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00007ad000)=0xaf03) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000390000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000a45000-0x4)=0xe) ioctl$TCFLSH(r1, 0x540b, 0x2) 2018/02/14 10:07:50 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000840000)='/selinux/enforce\x00', 0x501d80, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000843000-0xd4)=""/212) sendmsg(r0, &(0x7f0000e36000)={&(0x7f0000da7000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0xffffffffffffffff, @multicast1=0xe0000001}}}, 0x26, &(0x7f000086a000)=[], 0x0, &(0x7f0000d2d000-0x2218)=[]}, 0x41) 2018/02/14 10:07:50 executing program 3: mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x237000)=nil, 0x237000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$bt_hci(r0, 0x0, 0x60, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x44) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') pwrite64(r1, &(0x7f0000360000-0x82)="ec", 0x1, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f000048d000)='/selinux/mls\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00004f2000-0x4), &(0x7f00003b4000-0x4)=0x4) mmap(&(0x7f0000d25000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_netrom_SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000d25000)) mmap(&(0x7f0000d26000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) creat(&(0x7f0000d27000-0x8)='./file0\x00', 0x15) 2018/02/14 10:07:50 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, 0xffffffffffffffff, 0x0) futex(&(0x7f0000c29000), 0xb, 0x0, &(0x7f0000a0b000)={0x0, 0x989680}, &(0x7f00008d9000), 0x0) r0 = gettid() sched_getparam(r0, &(0x7f00002e3000)) 2018/02/14 10:07:50 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) creat(&(0x7f000015f000)='./file0\x00', 0x0) link(&(0x7f000042f000)='./file0\x00', &(0x7f0000eeb000)='./file0\x00') r0 = socket$inet6_dccp(0xa, 0x6, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f000000b000)={&(0x7f000000f000)={0x10}, 0xc, &(0x7f0000667000)={&(0x7f0000e29000-0x234)=@newsa={0x140, 0x10, 0x713, 0xffffffffffffffff, 0xffffffffffffffff, {{@in6=@dev={0xfe, 0x80}, @in=@rand_addr}, {@in6=@local={0xfe, 0x80, [], 0xffffffffffffffff, 0xaa}, 0xffffffffffffffff, 0x32}, @in6=@ipv4={[], [0xff, 0xff], @empty}, {}, {}, {}, 0xffffffffffffffff, 0xffffffffffffffff, 0xa}, [@algo_aead={0x50, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x20, 0x60, "d12a3fcb"}}]}, 0x140}, 0x1}, 0x0) ftruncate(r0, 0x0) 2018/02/14 10:07:50 executing program 4: clone(0x0, &(0x7f0000f39000), &(0x7f00008a3000), &(0x7f0000bf3000-0x4), &(0x7f00003b9000-0xcd)) r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000232000)='/dev/ashmem\x00', 0x400800, 0x0) ioctl$int_out(r0, 0x5462, &(0x7f0000d4f000-0x8)) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000001000)={@syzn={0x73, 0x79, 0x7a, 0x0}, @ifru_addrs=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @loopback=0x7f000001}, 0x2, 0x0, 0x2, 0x1}}}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f000048b000)={0x0, 0x4}, &(0x7f0000640000-0x4)=0x8) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000001000-0x61)={r2, 0x59, "1131611dd4c44b73cbdc1b28e4efc8728753e2e2b419af3a119995cefa58d0c71244453c26818d3b77f82c9ba34c229e7853a1191ff8d0ffc119b83484ba630699e14d567c8abdc0df5d0c2b40711fb315e51c905da3b5675f"}, &(0x7f0000943000)=0x61) listxattr(&(0x7f00007b7000)='./file0\x00', &(0x7f000079d000)=""/45, 0x2d) 2018/02/14 10:07:50 executing program 5: r0 = accept$nfc_llcp(0xffffffffffffff9c, 0x0, &(0x7f0000a29000-0x4)) mmap(&(0x7f00006f5000/0x1000)=nil, 0x1000, 0x1000000, 0x40000002871, r0, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000001000-0xc)={0x0, 0x80000, 0xffffffffffffff9c}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000000)={0x0, 0x0, 0x8}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000001000-0x8)={0x0}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000000)={r2, r3, 0x80}) mprotect(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x1000001) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00000cc000/0x4000)=nil) mremap(&(0x7f00000cc000/0x3000)=nil, 0x3000, 0x4000, 0x7, &(0x7f00000cc000/0x4000)=nil) mincore(&(0x7f0000b3c000/0xa000)=nil, 0xa000, &(0x7f00000cd000)=""/150) 2018/02/14 10:07:50 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mknod(&(0x7f000006e000)='./file0\x00', 0x103c, 0x0) r0 = open$dir(&(0x7f00004be000)='./file0\x00', 0x880, 0x0) ppoll(&(0x7f0000726000-0x20)=[{r0}], 0x1, &(0x7f0000880000-0x10)={0x77359400}, &(0x7f0000fb0000-0x8), 0x8) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000287000-0x9)='/dev/ppp\x00', 0x800, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000e93000-0x4)) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f000021e000-0x8)={0x44, 0x9}) open(&(0x7f000006f000)='./file0\x00', 0x20000000000042, 0x0) 2018/02/14 10:07:50 executing program 3: mmap(&(0x7f0000000000/0xae0000)=nil, 0xae0000, 0x3, 0x4d031, 0xffffffffffffffff, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00006a9000)='/selinux/mls\x00', 0x0, 0x0) mmap(&(0x7f0000ae0000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000ae1000-0x1000)=""/4096) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f000035c000+0x286)) futex(&(0x7f0000001000-0x4), 0x85, 0x0, &(0x7f0000587000-0x8), &(0x7f0000153000-0x4), 0x0) 2018/02/14 10:07:50 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r1, 0x40a85321, &(0x7f0000967000-0xb0)={{0x4, 0x3}, 'port0\x00', 0x80, 0x0, 0x686, 0x6, 0x4322, 0x0, 0x65d0, 0x0, 0x7, 0x9}) r2 = dup(r0) setsockopt$inet_tcp_int(r2, 0x6, 0x11, &(0x7f00007b6000-0x4)=0x1, 0x4) bind$inet(r0, &(0x7f000012e000)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9c000-0x10)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x3, @empty}, 0x10) sendmsg$nl_generic(r2, &(0x7f0000e6d000)={&(0x7f0000cb0000)={0x10}, 0xc, &(0x7f0000337000)={&(0x7f00003e0000)={0x14, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, {}, []}, 0x14}, 0x1}, 0x1) sendmsg$nl_crypto(r2, &(0x7f0000b5b000)={&(0x7f00006c2000)={0x10}, 0xc, &(0x7f0000fd3000-0x10)={&(0x7f0000e5e000)=@del={0xe0, 0x11, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, {{'ecb-twofish-3way\x00'}}, []}, 0xe0}, 0x1}, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000882000-0x4)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f00007d0000)=r3) 2018/02/14 10:07:50 executing program 0: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x40000000, &(0x7f0000000000), &(0x7f0000004000+0x6cf), &(0x7f0000006000-0x4), &(0x7f00000a3000-0x65)) mlockall(0x1) clock_gettime(0x0, &(0x7f0000002000)={0x0, 0x0}) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000004000)='/dev/rfkill\x00', 0x4000, 0x0) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGEFFECTS(r2, 0x80044584, &(0x7f0000006000-0xaa)=""/170) mmap(&(0x7f0000005000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000004000-0x8)={0xffffffff}, &(0x7f0000005000-0x10), &(0x7f0000001000)={r0, r1+10000000}, 0xffffffffffffffd6) [ 35.088191] IPVS: Creating netns size=2552 id=9 [ 35.124558] pktgen: kernel_thread() failed for cpu 0 [ 35.129688] pktgen: Cannot create thread for cpu 0 (-4) [ 35.135879] pktgen: kernel_thread() failed for cpu 1 [ 35.141176] pktgen: Cannot create thread for cpu 1 (-4) [ 35.146507] pktgen: Initialization failed for all threads [ 35.201649] kasan: CONFIG_KASAN_INLINE enabled [ 35.206071] kasan: GPF could be caused by NULL-ptr deref or user memory accessgeneral protection fault: 0000 [#1] PREEMPT SMP KASAN [ 35.218922] Dumping ftrace buffer: [ 35.222435] (ftrace buffer empty) [ 35.226114] Modules linked in: [ 35.229392] CPU: 0 PID: 5080 Comm: syz-executor0 Not tainted 4.4.115-g78d59f1 #12 [ 35.236976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.246299] task: ffff8800b5ba4800 task.stack: ffff8800b0010000 [ 35.252320] RIP: 0010:[] [] nfqnl_nf_hook_drop+0x190/0x3a0 [ 35.261244] RSP: 0018:ffff8800b0017998 EFLAGS: 00010202 [ 35.266664] RAX: 0000000000000007 RBX: 0000000000000003 RCX: ffffffff82f9d289 [ 35.273905] RDX: 0000000000010000 RSI: ffffc90000f1d000 RDI: ffffffff84418180 [ 35.281144] RBP: ffff8800b00179c8 R08: 0000000000000000 R09: 0000000000000000 [ 35.288383] R10: ffffffff838443e0 R11: 1ffff10016002efe R12: dffffc0000000000 [ 35.295622] R13: ffff8801d4092728 R14: 0000000000000038 R15: 00000000000000b8 [ 35.302863] FS: 00007f789dec0700(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000 [ 35.311059] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 35.316908] CR2: 00007f789dee19d0 CR3: 00000000ac4f6000 CR4: 0000000000160670 [ 35.324149] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 35.331388] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 35.338627] Stack: [ 35.340745] ffffffff82f9d200 ffffffff83cc6620 ffff8800a8271e00 ffff8801d4092728 [ 35.348740] ffff8801d4092728 ffff8801d4092720 ffff8800b00179f8 ffffffff82f9514e [ 35.357046] ffffffff82f95090 ffffffff843e37e0 ffff8800a82728b8 dffffc0000000000 [ 35.365009] Call Trace: [ 35.367567] [] ? nfqnl_nf_hook_drop+0x100/0x3a0 [ 35.373854] [] nf_queue_nf_hook_drop+0xbe/0x1d0 [ 35.380142] [] ? nf_queue_entry_release_refs+0x150/0x150 [ 35.387217] [] nf_unregister_net_hook+0x2ab/0x350 [ 35.393679] [] netfilter_net_exit+0x40/0xb0 [ 35.399621] [] ? nf_unregister_net_hooks+0x60/0x60 [ 35.406168] [] ops_exit_list.isra.4+0xae/0x150 [ 35.412369] [] setup_net+0x221/0x3e0 [ 35.417707] [] ? ops_init+0x3a0/0x3a0 [ 35.423125] [] ? kasan_slab_alloc+0x12/0x20 [ 35.429063] [] copy_net_ns+0xd2/0x190 [ 35.434488] [] create_new_namespaces+0x2f6/0x610 [ 35.440874] [] copy_namespaces+0x291/0x320 [ 35.446727] [] ? copy_namespaces+0x3e/0x320 [ 35.452665] [] copy_process+0x1d98/0x6120 [ 35.458431] [] ? __cleanup_sighand+0x50/0x50 [ 35.464463] [] ? up_write+0x1a/0x60 [ 35.469709] [] ? vm_mmap_pgoff+0xdf/0x1c0 [ 35.475473] [] _do_fork+0x151/0xe00 [ 35.480717] [] ? fork_idle+0x270/0x270 [ 35.486228] [] ? do_futex+0x15d0/0x15d0 [ 35.491821] [] ? vm_stat_account+0x130/0x130 [ 35.497852] [] ? __fget_light+0x199/0x1e0 [ 35.503621] [] SyS_clone+0x37/0x50 [ 35.508778] [] entry_SYSCALL_64_fastpath+0x1c/0x98 [ 35.515321] Code: de 83 01 00 0f 84 d8 00 00 00 4d 8d 77 38 49 bc 00 00 00 00 00 fc ff df 49 81 c7 b8 00 00 00 e8 57 3b 3c fe 4c 89 f0 48 c1 e8 03 <42> 80 3c 20 00 0f 85 f4 01 00 00 49 8b 1e e8 fd 8b 2e fe 48 85 [ 35.541855] RIP [] nfqnl_nf_hook_drop+0x190/0x3a0 [ 35.548454] RSP [ 35.552327] ---[ end trace ca73f72fc304a2ea ]--- [ 35.557068] Kernel panic - not syncing: Fatal exception [ 35.562911] Dumping ftrace buffer: [ 35.566423] (ftrace buffer empty) [ 35.570101] Kernel Offset: disabled [ 35.573695] Rebooting in 86400 seconds..