[....] Starting enhanced syslogd: rsyslogd[ 12.097310] audit: type=1400 audit(1515713077.648:4): avc: denied { syslog } for pid=3173 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.192' (ECDSA) to the list of known hosts. 2018/01/11 23:24:44 fuzzer started 2018/01/11 23:24:44 dialing manager at 10.128.0.26:40117 2018/01/11 23:24:48 kcov=true, comps=false 2018/01/11 23:24:49 executing program 0: 2018/01/11 23:24:49 executing program 7: 2018/01/11 23:24:49 executing program 1: 2018/01/11 23:24:49 executing program 2: 2018/01/11 23:24:49 executing program 3: 2018/01/11 23:24:49 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) timer_create(0x3, &(0x7f0000044000)={0x0, 0x0, 0x1, @tid=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000044000)=0x0) timer_delete(0x0) 2018/01/11 23:24:49 executing program 5: mmap(&(0x7f0000001000/0xfe8000)=nil, 0xfe8000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000fe6000-0x2)="8c68", 0x0) write(r0, &(0x7f0000fe4000-0x1)="85", 0x1) sendfile(r0, r0, &(0x7f0000003000-0x8)=0x0, 0x801) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000fea000-0xb9)="") mmap(&(0x7f0000fe9000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) fremovexattr(r0, &(0x7f0000fea000-0xc)=@random={'osx.\x00', '@GPL,-\x00'}) 2018/01/11 23:24:49 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00001af000)='./file0\x00', 0x0) open(&(0x7f00001fd000)='./file0/file0\x00', 0x8140, 0x1) execve(&(0x7f000015a000-0xe)='./file0/file0\x00', &(0x7f0000000000)=[], &(0x7f000001e000)=[]) syzkaller login: [ 24.098303] audit: type=1400 audit(1515713089.648:5): avc: denied { sys_admin } for pid=3381 comm="syz-executor7" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 24.218366] IPVS: Creating netns size=2536 id=1 [ 24.275446] IPVS: Creating netns size=2536 id=2 [ 24.293588] audit: type=1400 audit(1515713089.848:6): avc: denied { sys_chroot } for pid=3537 comm="syz-executor0" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 24.350027] IPVS: Creating netns size=2536 id=3 [ 24.363179] IPVS: Creating netns size=2536 id=4 [ 24.386680] IPVS: Creating netns size=2536 id=5 [ 24.408129] IPVS: Creating netns size=2536 id=6 [ 24.432264] IPVS: Creating netns size=2536 id=7 [ 24.454446] IPVS: Creating netns size=2536 id=8 [ 24.473152] audit: type=1400 audit(1515713090.028:7): avc: denied { dac_override } for pid=3604 comm="syz-executor6" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/01/11 23:24:50 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000d71000+0x8f9)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000704000)={0xff15}, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f00001ee000)={@common='nr0\x00', 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000c33000-0x10)={r1, 0x1, 0x6, @remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, [0x0, 0x0]}, 0x10) timer_create(0x5, &(0x7f0000940000-0x60)={0x0, 0x41, 0x0, @thr={&(0x7f00004ab000)="40f4f322a7bd89379d806fe426a3c1c6c8c1e2c4eec924c2bd116c20396a18eea7a88537ec3efab44e637f4aed936a40234890db207e501e48e978a35f0de8dd1d1f20038f3dbff15f09bdd2b19d0179edc8d44dc003a95e7ed38e63fced8a90840807118e17caa2e4e65b7b0d5b12f782410ec561d1c9e00fe246270af4304f758aff215862e5a3fa98db6b375058bbca78af6020fcf1ac2888492cb640873da47ae07c7bd9c800502662", &(0x7f0000899000-0x51)="8ce94dc5e3b5a30afa75d5dfd50c0c31f1eab0e27d74d00b2c95f0d978ab813b91d789a8498b5be2e711d37e7e98f48a8f2cb3b6aa814eebe6de71d07154f1eaa42698c8c699095328aca8e56fd254b2e5"}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00007e8000-0x4)=0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000e17000)=0x0) timer_settime(r2, 0x0, &(0x7f0000877000)={{0x0, 0x0}, {0x0, 0x0}}, &(0x7f0000a2e000)={{0x0, 0x0}, {0x0, 0x0}}) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000791000)=""/230) init_module(&(0x7f0000622000-0x2)='!\x00', 0x2, &(0x7f000072e000)="766d6e65743025e300") preadv(r0, &(0x7f0000922000)=[{&(0x7f00009fd000-0xa2)=""/162, 0xa2}, {&(0x7f0000e79000-0x1000)=""/4096, 0x1000}, {&(0x7f00003c7000-0x3e)=""/62, 0x3e}, {&(0x7f0000757000-0x36)=""/54, 0x36}, {&(0x7f0000832000)=""/178, 0xb2}], 0x5, 0x0) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000fe6000-0x10)='/dev/sequencer2\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f000048d000)={0x0, 0x2, 0x8001, 0x4, 0x8, 0xfffffffffffffffb, 0x400, 0x8, {0x0, @in={{0x2, 0x0, @rand_addr=0x2d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x40000000000000, 0xfff, 0x80, 0x6, 0x2}}, &(0x7f0000a98000)=0xb8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000657000)={r4, 0x7, 0x51e0}, 0x8) accept4$llc(r3, &(0x7f0000397000-0x10)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={[0x0, 0x0, 0x0, 0x0, 0x0], 0xffffffffffffffff}, [0x0, 0x0]}, &(0x7f0000705000)=0x10, 0x800) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f00007d0000-0x20)={@syzn={0x73, 0x79, 0x7a, 0x0, 0x0}, @ifru_flags=0x4000}) ioctl(0xffffffffffffffff, 0xa36, &(0x7f000092b000)="") 2018/01/11 23:24:50 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x100000002, 0x801, 0x2) setsockopt(r0, 0x6, 0xe, &(0x7f0000766000-0xd8)="020008000000000000005462db01a15eaf0d2cf600f13cc379ede4eaf40f4a95bbff850a8263357506b31e58a98399b397e695c0f03d3b3d54436fe71cbcdc6e30ac10369300f6af7d07634832b8a5c0a94c470502e9337b3e7298fc74e81b1058d02f9b14732017e2466a9fc43aea71263335960415800020f9575da60200000100008000530000ebcb12c7291871363e97100c4a4c2e9f5c0c14f1659ce8c8bed2e97e60a3649f93ea0c8263f864802ad72fa698807ef14a4a1813e976be1d113b514dbdc05ea1309163d6a4830de8391f2ecab7bbfbcb", 0xd8) 2018/01/11 23:24:50 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000fcf000)='/dev/loop#\x00', 0xc52, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000693000)='/dev/sequencer\x00', 0x80, 0x0) readahead(r0, 0x7fffffff, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000306000-0x4)=0x0) preadv(0xffffffffffffffff, &(0x7f0000e78000-0x40)=[], 0x0, 0x0) getpeername$ax25(r0, &(0x7f00008de000-0x10)={0x0, {""/7}, 0x0}, &(0x7f0000bb0000)=0x10) 2018/01/11 23:24:50 executing program 7: mmap(&(0x7f0000000000/0xf75000)=nil, 0xf75000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000f75000-0x14)={@multicast2=0xe0000002, @local={0xac, 0x14, 0x0, 0xaa}, 0x2, 0x0, []}, 0x10) mmap(&(0x7f0000f75000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f00007b4000/0x1000)=nil, 0x1000, 0x1000004, r1) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000f76000-0xc)='/dev/rfkill\x00', 0x10000, 0x0) mmap(&(0x7f0000f75000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000f76000-0xb0)=""/176) mmap(&(0x7f0000f76000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000f76000)='/dev/rfkill\x00', 0x101800, 0x0) fcntl$addseals(r0, 0x409, 0x6) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00005e9000)={0x0, @in={{0x2, 0x3, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x2, 0x9, 0x5, 0x3, 0x200}, &(0x7f00007d9000-0x4)=0xa0) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000518000)=@assoc_value={r4, 0x2}, &(0x7f0000edf000)=0x8) 2018/01/11 23:24:50 executing program 4: mmap(&(0x7f0000000000/0xe69000)=nil, 0xe69000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2000000088) mmap(&(0x7f0000e76000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000713000-0x5c0)="", 0x0, 0x8084, &(0x7f00004d4000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) sendto$inet(r0, &(0x7f0000e75000)='\x00', 0x1, 0x0, &(0x7f0000e76000)={0x2, 0x0, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) mmap(&(0x7f0000e69000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000d2000)={0x0, @in={{0x2, 0x2, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0xb1, 0x7, 0x0, 0x54, 0x1}, &(0x7f0000e69000)=0xa0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000896000)={r1, 0x6, 0x3, [0x1, 0x10001, 0x9]}, 0xe) mmap(&(0x7f0000e69000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000e6a000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000e6b000-0x4)={0x40}, 0x4) r2 = openat$pktcdvd(0xffffffffffffff9c, &(0x7f0000e69000)='/dev/pktcdvd/control\x00', 0x400000, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000af1000)={0x1, 0x8, 0xfff, 0x101, 0x1, 0xffffffff, 0x9, 0x3, 0x5, 0xfffffffffffffff9, 0x7, 0x20f8}) mmap(&(0x7f0000e6a000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) accept$inet(r2, &(0x7f0000806000)={0x0, 0xffffffffffffffff, @rand_addr=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000e6a000)=0x10) 2018/01/11 23:24:50 executing program 5: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000001000)={0x6, 0xc0, 0x8000, 0x800, 0xe0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f0000001000-0x4c)={0x80000001, 0xef, 0x4, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = syz_open_dev$usbmon(&(0x7f0000fc7000)='/dev/usbmon#\x00', 0x1, 0x420400) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) connect$netlink(r1, &(0x7f0000002000)=@unspec={0x0, 0x0, 0x0, 0x0}, 0xc) unlinkat(r1, &(0x7f0000001000-0x8)='./file0\x00', 0x200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) unshare(0x400) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000960000-0xc)='/dev/autofs\x00', 0x0, 0x0) fchown(r2, 0x0, 0x0) 2018/01/11 23:24:50 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f000055a000)='map_files\x00') ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f000025d000-0x8c)={0x8, 0x9, 0x1, 'queue1\x00', 0xffffffffffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = request_key(&(0x7f0000777000)='cifs.spnego\x00', &(0x7f0000af0000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f00008c8000)='/dev/binder#\x00', 0xfffffffffffffffd) add_key$user(&(0x7f000005b000-0x5)='user\x00', &(0x7f0000e5b000-0x5)={0x73, 0x79, 0x7a, 0x0, 0x0}, &(0x7f00001cd000-0x70)="", 0x0, r1) clone(0x0, &(0x7f0000004000-0x1000)="", &(0x7f0000006000)=0x0, &(0x7f0000008000)=0x0, &(0x7f0000002000-0x63)="") 2018/01/11 23:24:50 executing program 6: mmap(&(0x7f0000000000/0xfe6000)=nil, 0xfe6000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fe6000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000037000)='./file1\x00', &(0x7f0000fe6000)='./file0\x00', &(0x7f000002f000-0x6)='ramfs\x00', 0x100000, &(0x7f0000ce3000)="") mount(&(0x7f000052f000)='./file0\x00', &(0x7f00008fd000-0x1)='.', &(0x7f00003a3000-0x6)="0700cc667300", 0x1000, 0x0) mount(&(0x7f0000c6c000-0x8)='./file0\x00', &(0x7f000092f000)='./file0\x00', &(0x7f0000dcd000)='ramfs\x00', 0x8ff8c, &(0x7f000002f000)="") socket$inet6_icmp(0xa, 0x2, 0x3a) mmap(&(0x7f0000fe7000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xdf5000)=nil, 0xdf5000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000ee7000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mmap(&(0x7f0000fe8000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockname$unix(r0, &(0x7f0000fe8000)=@abs={0x0, 0x0, 0xffffffffffffffff}, &(0x7f00007a6000)=0x8) mount(&(0x7f000000a000)='.', &(0x7f0000852000)='.', &(0x7f0000a60000)='ramfs\x00', 0xff8c, &(0x7f00008a7000)="") openat$selinux_create(0xffffffffffffff9c, &(0x7f0000d24000-0x10)='/selinux/create\x00', 0x2, 0x0) mmap(&(0x7f0000fe8000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000fe9000-0x4)=0x8) umount2(&(0x7f0000d5c000-0x1)='.', 0x0) 2018/01/11 23:24:50 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000741000)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000a28000)={0x4, 0x4262, 0x497, 0x0, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) mkdir(&(0x7f0000916000-0x8)='./file0\x00', 0x0) chroot(&(0x7f0000cfb000)='./file0\x00') chdir(&(0x7f000073a000-0x2)='..') r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000026000-0xd)='/selinux/mls\x00', 0x0, 0x0) faccessat(r1, &(0x7f0000805000-0x8)='./file0\x00', 0x20, 0x1100) umount2(&(0x7f0000067000)='..', 0x0) 2018/01/11 23:24:50 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x20000000000000a, 0x2, 0x0) connect$inet6(r0, &(0x7f0000e19000-0x1c)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x0}, 0x1c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000bf1000-0x4)=0x0) r2 = syz_open_procfs(r1, &(0x7f000095b000)='net/udp6\x00') sendfile(r2, r2, &(0x7f0000c4e000-0x8)=0x0, 0x8005) 2018/01/11 23:24:50 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000eb8000)=0x1002, 0x4) sendto$inet(r0, &(0x7f000038d000-0x69)="", 0x0, 0x0, &(0x7f0000822000-0x10)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000da000-0xc)={@remote={0x0, 0x0, 0xffffffffffffffff, 0x0}, @rand_addr=0x0, 0x0}, &(0x7f0000b21000-0x4)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000d85000)={@generic="e2fbf520b3058e3f324393f8859a5d1f", r1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) recvfrom$inet(r0, &(0x7f0000201000)=""/186, 0xba, 0x40002021, &(0x7f00002f4000-0x10)={0x2, 0xffffffffffffffff, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) 2018/01/11 23:24:50 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000000e000-0xa)='./control\x00', 0x0) r0 = open(&(0x7f00002e5000)='./control\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f000095c000)=[{0x2, 0x0}, {0x4, 0x9}], 0x2) lseek(r0, 0x8000, 0x0) r1 = open(&(0x7f0000df3000-0xa)='./control\x00', 0x0, 0xfffffffffffffffc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000614000)={0x0, @in6={{0xa, 0x3, 0x635, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1}, 0x9}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x8, 0x3, 0x5, 0xfffffffffffffffa, 0x7, 0x9, 0x1ff, 0x1, 0x667, 0x2, 0x2c53, 0x0, 0x20, 0x8]}, &(0x7f00004ca000-0x4)=0x108) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000c1f000)=@req={0x2, 0x5, 0x2, 0x1}, 0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000c3c000-0x8)=@assoc_value={r2, 0x2}, &(0x7f0000ff9000)=0x8) lseek(r1, 0x8000, 0x0) renameat(r1, &(0x7f0000db4000-0xa)='./control\x00', r1, &(0x7f0000fd0000-0xa)='./control\x00') 2018/01/11 23:24:50 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000b83000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_open_dev$loop(&(0x7f0000449000)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000a34000-0x12)="657468300800000000000600000000000000", 0x0) pwritev(0xffffffffffffffff, &(0x7f00000a4000-0x10)=[{&(0x7f0000b64000-0x1e0)="b5", 0x1}], 0x1, 0x10049) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) pread64(r1, &(0x7f00006a6000-0x93)=""/147, 0x93, 0x0) sendfile(r1, r2, &(0x7f0000a31000-0x8)=0x0, 0x100000001) readlinkat(r0, &(0x7f00000b4000)='./file0\x00', &(0x7f00003dd000)=""/65, 0x41) ioctl$LOOP_CLR_FD(r1, 0x4c01) 2018/01/11 23:24:50 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) seccomp(0x1, 0x0, &(0x7f000003c000)={0x1, &(0x7f000003f000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) fchmodat(0xffffffffffffffff, &(0x7f0000e5e000-0x8)='./file0\x00', 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = fanotify_init(0x60, 0x800) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f00000bc000-0x6)={0x2, 0x8, 0xcb}) 2018/01/11 23:24:50 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000539000-0x17)='/selinux/validatetrans\x00', 0x1, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000283000-0x8)={0x0, 0x0}) seccomp(0x1, 0x0, &(0x7f000003c000)={0x1, &(0x7f000003f000)=[{0x6, 0x0, 0x0, 0xffffffff}]}) recvmmsg(0xffffffffffffffff, &(0x7f00003f7000-0x1e0)=[], 0x0, 0x0, &(0x7f0000571000-0x10)={0x0, 0x1c9c380}) 2018/01/11 23:24:50 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000b5e000)='net/igmp6\x00') creat(&(0x7f0000a25000)='./file0\x00', 0x20) preadv(r0, &(0x7f0000f5e000-0x10)=[{&(0x7f0000a9d000)=""/210, 0xd2}], 0x1, 0x0) 2018/01/11 23:24:50 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) r0 = syz_open_procfs(0x0, &(0x7f0000799000)='net/ptype\x00') setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00009f0000-0x10)={0x0, 0x0}, 0x10) readv(r0, &(0x7f0000d39000-0x70)=[{&(0x7f0000393000-0x74)=""/116, 0x74}, {&(0x7f00003f0000)=""/225, 0xe1}], 0x2) 2018/01/11 23:24:50 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000bdd000)="2600000010000fff0069e90a080023def90000000100000000ffebffddff000005009f00041f", 0x26) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000692000-0x3)='/selinux/member\x00', 0x2, 0x0) accept$unix(r1, 0x0, &(0x7f0000523000-0x4)=0x0) 2018/01/11 23:24:50 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_context(0xffffffffffffff9c, &(0x7f00000b6000)='/selinux/context\x00', 0x2, 0x0) sendto$ax25(r0, &(0x7f0000110000)="d98f50ab8629d1614f304d7480684668e0d4fa2beb3bf65e926051b67c9ff102bad0e1a6084aafd83f684189215fdef22c30a0c904c09ca40a4b136257ab074181eeb1b90437013079dc485794a5e3653f529fc4a7c7cce65ef2641c41ce282547e42a915d0cebdf2e2f5424eb3aa60a14794e26bf87f0999ce17b2d7b21249345165977b8bfa85ba5646632c0a91caafef45949f441909c7733fab52fb3a54df489a6d655582ec9ff378833f25869f5e7399661944ca28efb571b2be0136924ffa48ab44f40a08248f0e4f53309c7743c9085484b7c0217b1f5476ca6676f1f678ec1f5104dd25e", 0xe8, 0x20000001, &(0x7f0000439000)={0x3, {"4b8d04ab773be7"}, 0xe4}, 0x10) r1 = socket(0x11, 0x80003, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000c28000)=0x39) openat$selinux_access(0xffffffffffffff9c, &(0x7f000059c000)='/selinux/access\x00', 0x2, 0x0) getsockopt$sock_int(r1, 0x1, 0x27, &(0x7f0000fdb000-0x4)=0x0, &(0x7f000019f000)=0x4) 2018/01/11 23:24:50 executing program 7: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80000000000802, 0x4) socket(0x0, 0x80f, 0x7fffffff) write(r0, &(0x7f0000000000)="fc00000012000700ab03f608090007000a2278020000220400030021000100034533a49e3500a60000000000036915fa2c1ec2ff12f0009bb94b461219d07f9400020000008ce600036c04000000000000008c22ebc247ad4774540009db6b34d07302ade01720d700bbc9fc3d2e80772c81fb2cc56ce1f15627625ba4fdcf3cdefd5a0000000083ab82f687f70c9d00f9fe0800000003900000000000000405000000b90200f295ed94e0ad91bd07babc7c3f2eeb96d43dd16b17e583df150c3b880f419f4600b567b4d5715505e658a1ad0a4f015b1dff000000000000008f6ff6b6210003deac270e33429fd3000175e63fb8d38a8757f1e8844e", 0xfc) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000001000-0x20)={@generic="275e012eb51c63cebcca0b33681af04f", @ifru_addrs={0x2, 0x2, @multicast2=0xe0000002, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) 2018/01/11 23:24:50 executing program 0: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000001000-0x17)='/selinux/validatetrans\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000001000-0x14)={0xffffffffffffffff, 0x0, 0x8, 0x0, 0x2}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x80000000009, &(0x7f0000d41000)=0x1, 0x4) bind$inet(r1, &(0x7f0000f1c000)={0x2, 0x0, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0xffffffffffffff75) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000786000-0x20)={{&(0x7f000010d000/0x3000)=nil, 0x3000}, 0x2, 0x0}) connect$inet(r1, &(0x7f000000c000)={0x2, 0x0, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10) setsockopt$inet_tcp_int(r1, 0x6, 0x4, &(0x7f000000e000)=0x4, 0x4) 2018/01/11 23:24:50 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000bc0000-0xa)='/dev/ptmx\x00', 0x0, 0x0) r1 = creat(&(0x7f0000da3000-0x8)='./file0\x00', 0x10) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000dec000-0x8)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffff9c, 0xc010640b, &(0x7f000069d000-0x10)={0x0, 0x0, 0x2}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f000089c000)={r2, r3, 0x5}) r4 = dup2(r0, r0) ioctl$TCSETS(r4, 0x40045431, &(0x7f000034a000-0x24)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) clock_gettime(0x0, &(0x7f00008ee000)={0x0, 0x0}) write$evdev(r4, &(0x7f0000538000)=[{{r5, r6/1000+10000}, 0xd39, 0xffffffffffffefea, 0xffffffffffffff00}, {{0x77359400, 0x0}, 0x8, 0x100000000, 0x1}], 0x30) getsockopt$inet_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000876000-0x14)={0x0, 0x501c, 0xc86, 0x1, 0x401, 0x4}, &(0x7f0000cac000-0x4)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f0000429000)={r7, 0xfffffffffffff7bf}, &(0x7f000058a000-0x4)=0x8) syz_open_pts(r4, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000c5000)=0x2) ioctl$FIONREAD(r1, 0x541b, &(0x7f00003bb000)=0x0) r8 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f0000e8a000)={0x9, 0x5, 0x2, 0xfffffffffffffffd}, 0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f000079b000)={0x0, 0x4, 0x101, 0x4}, &(0x7f0000eea000-0x4)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f000014e000)={r9, 0x0}, &(0x7f0000c19000-0x4)=0x8) setsockopt$sock_void(r8, 0x29, 0x1, 0x0, 0x0) 2018/01/11 23:24:50 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) unshare(0x8000404) mq_open(&(0x7f000004b000)='/$cgrouplo\x00', 0x42, 0x0, &(0x7f000004b000)={0x3, 0x7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000003000-0xf)='/dev/sequencer\x00', 0x0, 0x0) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) pselect6(0x40, &(0x7f00000ac000-0x40)={0x3ffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000768000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00007fc000-0x40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000554000-0x8)={0x0}, 0x8}) socket$inet6_sctp(0xa, 0x5, 0x84) 2018/01/11 23:24:50 executing program 5: r0 = socket$inet(0x2, 0x807, 0xbae) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00006ff000)=0x0, &(0x7f0000f0b000-0x4)=0x4) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000002000)={0xaa, 0x0, 0x0}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000002000-0x8)='./file0\x00', 0x20100, 0x20) r2 = open(&(0x7f0000001000-0x8)='./file0\x00', 0x10000, 0x100) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000012000-0x7b)={0x0, 0x73, "ae39386e1c3148cb28979ce15f17acc462767157defe11787555c8aa10339452d9a4af64f4bb819bbbe127ff8886a6cd9f57d6f66ce98533c9e7ddd2a9f1c70ee9b4d12323c42fa0e719d4313f576bedef209da79e484b881641616b3f209219c8f3924da587b92b2237ded7974ecae2444d78"}, &(0x7f0000003000-0x4)=0x7b) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000003000)={0x0, 0x0, 0x7, 0x4, 0x5, 0xfffffffffffffffd, 0x0, 0x3ab, {0x0, @in={{0x2, 0x1, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0xffff, 0x2, 0x81, 0x8000, 0x100000000}}, &(0x7f0000003000)=0xb8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000014000-0x8)={r3, 0xff}, &(0x7f0000004000-0x4)=0x176) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$TUNGETSNDBUF(r2, 0x800454d3, &(0x7f0000003000)=0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000001000-0x8)={r4, 0xf21}, &(0x7f0000000000)=0x8) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000004000)=0x0) syz_open_procfs(r6, &(0x7f0000012000-0xf)='attr/keycreate\x00') ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001000-0x20)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x0}) dup2(r1, r5) getpeername$netlink(r5, &(0x7f0000008000)={0x0, 0x0, 0x0, 0x0}, &(0x7f0000013000-0x4)=0xc) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) clone(0x0, &(0x7f0000f39000)="", &(0x7f0000eaa000-0x4)=0x0, &(0x7f0000bf3000-0x4)=0x0, &(0x7f00003b9000-0xcd)="") syz_open_dev$tun(&(0x7f0000fb4000-0xd)='/dev/net/tun\x00', 0x0, 0x210000) ioctl$UFFDIO_ZEROPAGE(r1, 0x8010aa02, &(0x7f0000770000-0x10)={&(0x7f00007c0000/0x1000)=nil, 0x1000}) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f000030a000-0x10)={0x4, &(0x7f0000646000)=[{0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}, {0x0, 0x0}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000b17000-0x40)={r7, 0x2, &(0x7f000057f000)=[0x9, 0x3], &(0x7f000002e000)=[0x51f9, 0x4], 0x4, 0x6, 0x2, &(0x7f00002d8000)=[0x232, 0x80000001, 0x4, 0x0, 0x3, 0x1ff], &(0x7f0000e1b000)=[0x8, 0x3f], 0x0}) [ 24.923660] audit: type=1400 audit(1515713090.478:8): avc: denied { sys_ptrace } for pid=3671 comm="ps" capability=19 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 2018/01/11 23:24:50 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00008cd000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000d4a000)={0xa0000014, 0x0}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000304000)={0x0, 0x0}) epoll_wait(r2, &(0x7f000011a000-0xc)=[{0x0, 0x0}], 0x1, 0x454) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00009f5000)={0x0, 0x0}) ioctl$DRM_IOCTL_RM_CTX(r1, 0xc0086421, &(0x7f00004e4000)={r3, 0x2}) clone(0x0, &(0x7f0000f3f000)="", &(0x7f0000545000)=0x0, &(0x7f0000ac0000-0x4)=0x0, &(0x7f00009df000)="") r4 = openat$selinux_status(0xffffffffffffff9c, &(0x7f000013d000-0x10)='/selinux/status\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f00001dc000-0x4)=@int=0x9, 0x4) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000321000)={0xbfffffffc000000d, 0x0}) 2018/01/11 23:24:50 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f0000520000-0xd)='/dev/net/tun\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000103000)={{0xa, 0x2, 0x3, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x70c1}, {0xa, 0x2, 0x6, @ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0xff, 0xff], @multicast2=0xe0000002}, 0x9}, 0x7, [0x800, 0x1, 0x10000, 0xfffffffffffffffc, 0x8, 0xfffffffffffffff9, 0x6e2, 0x8]}, 0x5c) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000a5b000-0x28)={@common='gre0\x00', @ifru_names=@generic="11000080c021ed4f3a00fffe012073b5"}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000cf7000)={@generic="de60ec2ee1398314586de0ab6bdb6212", @ifru_data=&(0x7f00004db000-0x20)="e8d033e676a1997fcd562a15a16dfdef59c54d2cb6d32aa3315bf3de3d510b55"}) uname(&(0x7f0000a17000-0xc4)=""/196) 2018/01/11 23:24:50 executing program 1: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000-0x20)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1, 0x0}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000002000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000001000)={0x0, 0x0}, 0x80800) mmap$binder(&(0x7f0000e7d000/0x4000)=nil, 0x4000, 0x402000000, 0xd1050, r2, 0x2) select(0x40, &(0x7f0000012000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000002000-0x40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000013000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000014000-0x10)={0x0, 0x2710}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000546000)={&(0x7f0000f84000/0x1000)=nil, 0x1000}) mlock2(&(0x7f000009c000/0x2000)=nil, 0x2000, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f00000c1000-0x10)={&(0x7f0000011000/0x3000)=nil, 0x3000}) [ 24.970885] audit: type=1400 audit(1515713090.518:9): avc: denied { net_raw } for pid=3674 comm="syz-executor2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/01/11 23:24:50 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x802, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f00009b1000-0x4)=0x8, 0x4) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00008dc000)={{{@in6=@loopback={0x0, 0x1}, @in=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xa, 0x0, 0x80, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0}, {{@in=@local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, 0xffffffffffffffff, 0x0}, 0x0, @in6=@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xffffffffffffffff, 0xbb}, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0xe8) sendto$inet6(r1, &(0x7f0000b5b000)="", 0x0, 0x0, &(0x7f0000999000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}, 0x0}, 0x1c) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000b31000)=0x100, 0x4) sendmsg$inet_sctp(r0, &(0x7f0000558000-0x38)={&(0x7f0000a34000)=@in={0x2, 0x3, @empty=0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x10, &(0x7f0000119000)=[], 0x0, 0x0, 0x0, 0x0}, 0x0) 2018/01/11 23:24:50 executing program 1: unshare(0x400) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f00002a9000)={0x0, 0x0}) r0 = timerfd_create(0x0, 0x0) timerfd_gettime(r0, &(0x7f0000fee000)={{0x0, 0x0}, {0x0, 0x0}}) 2018/01/11 23:24:50 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f00001b3000)={0x0, 0x0}) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000dc0000)={0xffffffff80000015, 0x0}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r2, &(0x7f0000d38000-0xc)={0x2012, 0x0}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000b1f000-0xc)={0x1, 0x0}) epoll_pwait(r1, &(0x7f0000dc8000-0x3c)=[{0x0, 0x0}], 0x1, 0x0, &(0x7f0000dc7000)={0x0}, 0x8) 2018/01/11 23:24:50 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000de3000-0xc)='/dev/rfkill\x00', 0x940, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000a8000)={0x0, 0x7f, 0x81, 0x0, 0x4, 0x81, 0x5, 0x86c, {0x0, @in={{0x2, 0x2, @loopback=0x7f000001, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, 0x6, 0x9, 0x0, 0x1dc31c23, 0x1}}, &(0x7f0000420000-0x4)=0xb8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000b29000-0x10)={0x2, 0x9, 0x1c69, 0xebf, r1}, &(0x7f0000d55000-0x4)=0x10) r2 = socket(0xa, 0x2400000001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x2a, &(0x7f0000034000)={0x1, {{0xa, 0xffffffffffffffff, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1}, 0x0}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x1e4) getsockopt$inet6_buf(r2, 0x29, 0x10000000000030, &(0x7f0000035000-0x1000)=""/144, &(0x7f0000001000-0x4)=0x90) 2018/01/11 23:24:50 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = getpid() wait4(r0, &(0x7f0000200000-0x4)=0x0, 0x3, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f000030f000-0x12)='/dev/loop-control\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000f24000-0xc)='/dev/autofs\x00', 0x0, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000ed7000)='/selinux/member\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000c18000)=@assoc_value={0x0, 0x5}, &(0x7f0000f5e000-0x4)=0x8) ioctl$DRM_IOCTL_SET_UNIQUE(r3, 0x40106410, &(0x7f00000c7000-0x10)={0x0, &(0x7f00001ad000-0x1)=""}) writev(r1, &(0x7f000054a000)=[{&(0x7f0000b0a000-0x39)="87b4ee2b6997b2de23f67189280a27a571b95b99b3eed7d1433ebbbda55e0083aad39e5f767bd54d86b8886fe76ef0257b7a58f7de04ef4352", 0x39}], 0x1) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000264000-0x2)={0x6, 0x1ff}) clock_getres(0x2, &(0x7f0000a66000)={0x0, 0x0}) timerfd_settime(r3, 0x1, &(0x7f0000697000-0x20)={{0x77359400, 0x0}, {0x0, 0x0}}, &(0x7f0000ebf000)={{0x0, 0x0}, {0x0, 0x0}}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r3, 0xc05c5340, &(0x7f0000ab7000)={0x0, 0xfffffffffffffffa, 0x200002, {0x0, 0x1c9c380}, 0x6, 0x100000000, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) open(&(0x7f0000d68000-0x8)='./file0\x00', 0x200, 0x100) [ 24.971653] audit: type=1400 audit(1515713090.528:10): avc: denied { net_admin } for pid=3675 comm="syz-executor1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 25.723469] IPVS: Creating netns size=2536 id=9 2018/01/11 23:24:51 executing program 7: mmap(&(0x7f0000000000/0x1c000)=nil, 0x1c000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000017000)='/selinux/user\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f000001a000)={{{@in=@empty=0x0, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0], @empty=0x0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, {{@in=@local={0x0, 0x0, 0xffffffffffffffff, 0x0}, 0xffffffffffffffff, 0x0}, 0x0, @in=@remote={0x0, 0x0, 0xffffffffffffffff, 0x0}, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f000000f000)=0xe8) fchmod(r0, 0x9) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000014000)={@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1}, @remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1}, 0x6, 0x7, 0x848, 0x100, 0x8, 0x20000, r1}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f000001b000)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_GET_NAME(r2, 0x81007702, &(0x7f000001c000-0xf1)=""/241) r3 = openat(0xffffffffffffffff, &(0x7f000000b000)='./file0\x00', 0xa0000, 0x4) mmap(&(0x7f000001c000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f000001c000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f000001c000)={0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f000001c000)=0x14) setsockopt$ax25_int(r3, 0x101, 0xf, &(0x7f000000c000-0x4)=0x38, 0x4) 2018/01/11 23:24:51 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) syz_open_dev$tun(&(0x7f0000520000-0xd)='/dev/net/tun\x00', 0x0, 0xa) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f000090f000-0xe)='/dev/keychord\x00', 0x1, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000533000)=0x0) sched_rr_get_interval(r2, &(0x7f0000d26000)={0x0, 0x0}) write$tun(r1, &(0x7f0000723000)=@pi={0x0, 0x80f3, @eth={@remote={[0xbb, 0xbb, 0xbb, 0xbb, 0xbb], 0x0}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [{[], {0x8100, 0x800, 0x3, 0xfffffffffffffff7}}], {{0x800, @x25={0x3, 0x4, 0xf, "53bec236bbe94991577f711dcacc5e08192d75b3b724e605284398cdc5fe3e2ac656a8b36b28e55e7e4cb16c1684df2466c98d1c2e620d1a7cc12e5b111b05d23ff5cd9bff966800f75a7e009970a659a57145e252d092d2df9042a803f664707640cc25b05fab08d179ac0a38c33b9857101c90301fb082bda7fe4657100fc1379da525682b59b5159e34ba8b735ba35ec521465c9bddfbaadd3716d6ec07d1c1778c22e5477a7cb37cba1a39161faa812dea1cf77eaf3416ff06c71b2840ad35dab15fc1351027dc4f936911bc107039be6fd9fa927b8c3f3762e6a335ba713f246d7d4f21b27bdd5f"}}}}}, 0x103) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00002ea000-0x28)={@common='gre0\x00', @ifru_addrs=@in={0x2, 0x0, @broadcast=0xffffffff, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000630000-0x20)={@common='gre0\x00', @ifru_flags=0x301}) write$eventfd(r1, &(0x7f000077f000-0x8)=0x1f, 0x10000015e) 2018/01/11 23:24:51 executing program 2: r0 = socket$inet6(0xa, 0x4000000000005, 0x2000010001) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000de6000-0x4)=0x0) setsockopt$inet6_buf(r0, 0x29, 0x48, &(0x7f0000001000-0x2)="", 0x0) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000000)={0x7ff, 0x1}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xbb}, 0x9, 0x2, 0x2, 0x8, 0xea, 0x64, 0x3430}, 0x20) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000001000-0x10)={0x0, 0x0}, &(0x7f0000000000)=0x10) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000001000)=0x3, 0x4) 2018/01/11 23:24:51 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet6_buf(r0, 0x29, 0xcc, &(0x7f0000f17000)=""/230, &(0x7f0000efa000-0x4)=0xe6) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000471000)={0x0, 0x0}) capset(&(0x7f00001b5000-0x8)={0x19980330, r1}, &(0x7f0000780000-0x18)={0x0, 0x0, 0x0, 0x0, 0x20, 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000600000-0x10)=[{&(0x7f0000356000)="290000001800310902000001000000070a0000040000f706800000000c00080000001000000300ff01", 0x29}], 0x1) fanotify_init(0x4, 0x1800) 2018/01/11 23:24:51 executing program 4: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) uname(&(0x7f0000001000-0x17)=""/23) mmap(&(0x7f0000000000/0x8000)=nil, 0x8000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) mprotect(&(0x7f0000004000/0x2000)=nil, 0x2000, 0x4) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000006000-0x28)={0x0, 0x0, 0x0, 0x0, "9158636aaec4c954128014408c261e1f323a36357b19b4e5ae7f3c63c0407410"}) r1 = dup(r0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x4) 2018/01/11 23:24:51 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x80800, 0x5) setsockopt$inet_int(r0, 0x0, 0x0, &(0x7f0000b0f000-0x4)=0x80000000, 0x4) r1 = syz_open_procfs(0x0, &(0x7f000027c000)='net/netlink\x00') lseek(r1, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00003ae000-0x3)='lp\x00', 0x3) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00007b8000-0x6)={0x1, [0x3]}, 0x6) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000c29000)=""/104) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000c8f000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 2018/01/11 23:24:51 executing program 1: mmap(&(0x7f0000000000/0xfdc000)=nil, 0xfdc000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000dfa000)={0x0, 0x0}) mmap(&(0x7f0000fdc000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000fdd000-0x4)=0x0) ioctl$int_out(r0, 0x5462, &(0x7f0000232000)=0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='status\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x3, 0x0) write(r2, &(0x7f0000009000)="2400000058001f0014f9f407002304000afff51108000100febfffff0800020001000000", 0x24) flock(r1, 0x1) ftruncate(r1, 0x0) 2018/01/11 23:24:51 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000700000-0x8)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r1, r1) connect$unix(r0, &(0x7f0000f57000)=@abs={0x0, 0x0, 0x0}, 0x8) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)={0x10000004, 0x0}) sendmmsg$unix(r1, &(0x7f00000bd000)=[], 0x80, 0x0) read(r0, &(0x7f0000498000-0xc3)=""/195, 0xfffffffffffffd1c) epoll_wait(r2, &(0x7f0000167000-0xc)=[{0x0, 0x0}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000525000)=[{{&(0x7f0000dfa000-0xe)=@l2={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0}, 0xe, &(0x7f0000f82000-0x20)=[], 0x0, &(0x7f0000239000)=""/0, 0x0, 0x0}, 0x0}], 0x1, 0x0, 0x0) [ 25.813960] keychord: Insufficient bytes present for keycount 253 [ 25.823395] capability: warning: `syz-executor6' uses 32-bit capabilities (legacy support in use) [ 25.830894] ------------[ cut here ]------------ [ 25.830914] WARNING: CPU: 0 PID: 3777 at mm/page_alloc.c:3550 __alloc_pages_slowpath+0x1136/0x1d90 [ 25.830919] Kernel panic - not syncing: panic_on_warn set ... [ 25.830919] [ 25.830927] CPU: 0 PID: 3777 Comm: syz-executor3 Not tainted 4.9.76-g9154940 #10 [ 25.830931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 25.830944] ffff8801d5e1f6d0 ffffffff81d93149 ffffffff83a47180 ffff8801d5e1f7a8 [ 25.830953] ffffffff83aa4400 ffffffff81451d16 0000000000000009 ffff8801d5e1f798 [ 25.830963] ffffffff8142e371 0000000041b58ab3 ffffffff84189678 ffffffff8142e1b5 [ 25.830965] Call Trace: [ 25.830976] [] dump_stack+0xc1/0x128 [ 25.830985] [] ? __alloc_pages_slowpath+0x1136/0x1d90 [ 25.830993] [] panic+0x1bc/0x3a8 [ 25.831002] [] ? percpu_up_read_preempt_enable.constprop.53+0xd7/0xd7 [ 25.831010] [] ? load_image_and_restore+0xf9/0xf9 [ 25.831018] [] ? __warn+0x1a9/0x1e0 [ 25.831026] [] ? __alloc_pages_slowpath+0x1136/0x1d90 [ 25.831032] [] __warn+0x1c4/0x1e0 [ 25.831040] [] warn_slowpath_null+0x2c/0x40 [ 25.831048] [] __alloc_pages_slowpath+0x1136/0x1d90 [ 25.831057] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 25.831067] [] ? _raw_spin_unlock_irq+0x38/0x50 [ 25.831075] [] ? finish_task_switch+0x1ed/0x630 [ 25.831082] [] ? __schedule+0x64d/0x1ba0 [ 25.831089] [] ? __schedule+0x683/0x1ba0 [ 25.831096] [] ? __lock_is_held+0xa1/0xf0 [ 25.831104] [] ? gfp_pfmemalloc_allowed+0x110/0x110 [ 25.831112] [] ? get_page_from_freelist+0xcff/0x19f0 [ 25.831120] [] ? __might_sleep+0x95/0x1a0 [ 25.831128] [] __alloc_pages_nodemask+0x33b/0x6b0 [ 25.831136] [] ? __alloc_pages_slowpath+0x1d90/0x1d90 [ 25.831144] [] kmalloc_order+0x2a/0x70 [ 25.831151] [] kmalloc_order_trace+0x1f/0x190 [ 25.831159] [] __kmalloc+0x19d/0x310 [ 25.831167] [] keychord_write+0xce/0xbc0 [ 25.831176] [] ? rtnl_unlock+0xe/0x10 [ 25.831184] [] ? avc_ss_reset+0x110/0x110 [ 25.831191] [] ? do_futex+0x3f8/0x15c0 [ 25.831198] [] ? keychord_read+0x510/0x510 [ 25.831206] [] ? debug_check_no_locks_freed+0x2c0/0x2c0 [ 25.831214] [] ? _raw_spin_unlock_irqrestore+0x5a/0x70 [ 25.831221] [] ? keychord_read+0x510/0x510 [ 25.831229] [] __vfs_write+0x103/0x680 [ 25.831237] [] ? do_iter_readv_writev+0x400/0x400 [ 25.831244] [] ? __might_sleep+0x95/0x1a0 [ 25.831252] [] ? __inode_security_revalidate+0xd9/0x130 [ 25.831259] [] ? avc_policy_seqno+0x9/0x20 [ 25.831266] [] ? selinux_file_permission+0x82/0x460 [ 25.831273] [] ? security_file_permission+0x89/0x1e0 [ 25.831281] [] ? rw_verify_area+0xe5/0x2b0 [ 25.831288] [] vfs_write+0x189/0x530 [ 25.831295] [] SyS_write+0xd9/0x1b0 [ 25.831303] [] ? SyS_read+0x1b0/0x1b0 [ 25.831311] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 25.831318] [] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 25.831333] [] entry_SYSCALL_64_fastpath+0x23/0xe2 [ 25.833118] Dumping ftrace buffer: [ 25.833180] (ftrace buffer empty) [ 25.833182] Kernel Offset: disabled [ 26.187655] Rebooting in 86400 seconds..