[....] Starting enhanced syslogd: rsyslogd[ 15.965713] audit: type=1400 audit(1519203170.460:5): avc: denied { syslog } for pid=4006 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 19.422594] audit: type=1400 audit(1519203173.917:6): avc: denied { map } for pid=4147 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.24' (ECDSA) to the list of known hosts. 2018/02/21 08:53:00 fuzzer started [ 25.662473] audit: type=1400 audit(1519203180.157:7): avc: denied { map } for pid=4158 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/02/21 08:53:00 dialing manager at 10.128.0.26:39751 [ 29.990679] can: request_module (can-proto-0) failed. [ 29.999689] can: request_module (can-proto-0) failed. 2018/02/21 08:53:04 kcov=true, comps=true [ 30.443421] audit: type=1400 audit(1519203184.938:8): avc: denied { map } for pid=4158 comm="syz-fuzzer" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1092 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2018/02/21 08:53:07 executing program 3: 2018/02/21 08:53:07 executing program 0: 2018/02/21 08:53:07 executing program 1: 2018/02/21 08:53:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x5, 0x201a7fd7, 0xa, 0xa, 0xffffffc0}], {0x95}}, &(0x7f0000000000)="47504cc000", 0x8, 0x1ac, &(0x7f00001a7f05)=""/251}, 0x48) 2018/02/21 08:53:07 executing program 7: syz_emit_ethernet(0x4a, &(0x7f0000f3f000)={@local={[0xaa, 0xaa, 0xaa, 0xaa], 0x0, 0xaa}, @empty, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x3c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}, {[@lsrr={0x83, 0x7, 0x8, [@remote={0xac, 0x14, 0x0, 0xbb}]}, @ssrr={0x89, 0x3, 0x0, []}]}}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @multicast2=0xe0000002, @multicast2=0xe0000002, {[]}}}}}}}, &(0x7f0000000000)={0x0, 0x1, [0x0]}) [ 32.700977] audit: type=1400 audit(1519203187.195:9): avc: denied { map } for pid=4158 comm="syz-fuzzer" path="/root/syzkaller-shm358532644" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 2018/02/21 08:53:07 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0xa, 0xffffffc0}], {0x95}}, &(0x7f0000000000)="47504cc000", 0x8, 0x1ac, &(0x7f00001a7f05)=""/251}, 0x48) 2018/02/21 08:53:07 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x0, 0xd0, 0x0, 0xffffffff, 0xffffffff, 0x270, 0x270, 0x270, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, []}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x1a0}}, {{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, []}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, []}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x3a0) 2018/02/21 08:53:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, &(0x7f0000a56000), 0xfffffffffffffe0c, 0x20000004, &(0x7f00004b2fe4)={0xa, 0x2, 0x0, @empty}, 0x1c) recvmsg(r0, &(0x7f00003adfc8)={&(0x7f00006e8fe0)=@pptp={0x0, 0x0, {0x0, @remote}}, 0x20, &(0x7f0000ba0f90)=[{&(0x7f00007a1f23)=""/221, 0xdd}], 0x1, &(0x7f0000635fd0)=""/101, 0x65}, 0x0) recvmsg(r0, &(0x7f0000000480)={&(0x7f0000000180)=@pppoe={0x0, 0x0, {0x0, @empty, @syzn}}, 0x1e, &(0x7f0000000380)=[], 0x0, &(0x7f00000003c0)=""/134, 0x86, 0x1}, 0x2) r2 = accept4(r1, &(0x7f0000218fa8)=@alg, &(0x7f0000b0fffc)=0x58, 0x0) sendmsg$nl_crypto(r2, &(0x7f0000484fc8)={&(0x7f0000816000)={0x10}, 0xc, &(0x7f0000c37000)={&(0x7f0000fa3000)=@get={0xe0, 0x13, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, {{'cbc-aes-aesni\x00'}}, []}, 0x10176}, 0x1}, 0x0) [ 32.771867] audit: type=1400 audit(1519203187.266:10): avc: denied { sys_admin } for pid=4202 comm="syz-executor3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 32.820685] IPVS: ftp: loaded support on port[0] = 21 [ 32.886612] audit: type=1400 audit(1519203187.380:11): avc: denied { net_admin } for pid=4208 comm="syz-executor0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 32.888645] IPVS: ftp: loaded support on port[0] = 21 [ 32.949668] IPVS: ftp: loaded support on port[0] = 21 [ 32.997164] IPVS: ftp: loaded support on port[0] = 21 [ 33.060937] IPVS: ftp: loaded support on port[0] = 21 [ 33.137437] IPVS: ftp: loaded support on port[0] = 21 [ 33.239009] IPVS: ftp: loaded support on port[0] = 21 [ 33.333387] IPVS: ftp: loaded support on port[0] = 21 [ 34.056453] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.246731] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.311539] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.459539] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.482172] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.692738] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.829879] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.847360] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready 2018/02/21 08:53:11 executing program 0: [ 36.628047] audit: type=1400 audit(1519203191.122:12): avc: denied { sys_chroot } for pid=4208 comm="syz-executor0" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/02/21 08:53:11 executing program 0: 2018/02/21 08:53:11 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt(r0, 0x8, 0x2, &(0x7f0000000000)="01ee75ae4668ce163da709d81d6bbb739be533cb415fcbf27121614e748eee8cd7949f2bd8cab0e686b293778a087f60209e3edda0ce8ec0fbe6d41ec9db0f39aff32ca61012a1f4245e459923239b786f7d302f3bea03cc2f84531a7699327170f26609c2e139c701f267c480c1", 0x6e) socket$nl_generic(0x10, 0x3, 0x10) 2018/02/21 08:53:11 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000000), &(0x7f0000470ffc)=0xcd) r1 = socket(0x7, 0x3, 0x9) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x3ab5, 0x8203, 0xfffffffffffffffe, 0xc83d, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={r2, 0x800, 0x20}, &(0x7f0000000040)=0xc) r4 = socket$inet(0xa, 0x801, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000037000)=@filter={'filter\x00', 0xe, 0x4, 0x2a8, 0xffffffff, 0x178, 0x98, 0x98, 0xffffffff, 0xffffffff, 0x210, 0x210, 0x210, 0xffffffff, 0x4, &(0x7f0000037fc0), {[{{@uncond, 0x0, 0x70, 0x98, 0x0, {}, []}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@unspec=@limit={0x48, 'limit\x00', 0x0, {0xffffffffffffffff, 0xfffffffffffffffb}}]}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @multicast2=0xe0000002, 0x0, 0x0, @syzn={0x73, 0x79, 0x7a}, @generic="234da367fbe1ec77978836977b337ee2"}, 0x0, 0x70, 0x98, 0x0, {}, []}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x308) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000000c0)={0x0}) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@loopback=0x7f000001, @broadcast=0xffffffff, 0x0, 0x3, [@broadcast=0xffffffff, @rand_addr=0x100000001, @multicast1=0xe0000001]}, 0x1c) ioctl$DRM_IOCTL_SET_SAREA_CTX(r5, 0x4010641c, &(0x7f0000000200)={r6, &(0x7f0000000100)=""/243}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000080)={r3, @in={{0x2, 0x2, @dev={0xac, 0x14, 0x0, 0x14}}}, 0x1000, 0x1, 0x4, 0x3, 0x64}, &(0x7f0000000140)=0xa0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000180)={@empty, @broadcast=0xffffffff, 0x0, 0x3, [@rand_addr=0x401, @multicast2=0xe0000002, @multicast1=0xe0000001]}, 0x1c) recvfrom$ax25(r1, &(0x7f00000001c0)=""/252, 0xfc, 0x10001, &(0x7f00000002c0)={0x3, {"72681cad834693"}, 0x1f}, 0x10) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000340)={0x4, &(0x7f0000000300)=[{0x1, 0xf0e, 0xce2, 0x1}, {0x0, 0x9, 0x7, 0x3}, {0x7, 0x8, 0xffff, 0x1}, {0x1fb5, 0x9, 0xff, 0x101}]}, 0x10) pipe(&(0x7f0000000380)={0x0, 0x0}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r7, 0x6, 0x21, &(0x7f00000003c0)="32b0955d1bb4ae4dad51aa17e2121063", 0x10) [ 36.755184] audit: type=1400 audit(1519203191.249:13): avc: denied { create } for pid=5155 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 36.824820] TCP: request_sock_TCPv6: Possible SYN flooding on port 20018. Sending cookies. Check SNMP counters. [ 36.858413] xt_limit: Overflow, try lower: 4294967295/4294967291 2018/02/21 08:53:11 executing program 0: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0xffffffffffffffff, 0x0, @empty, 0x4}, {0xa, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}}, 0x7b) r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, @remote}, &(0x7f0000000040)=0x1c, 0x80000) splice(r0, &(0x7f0000000080), r0, &(0x7f00000000c0), 0x1ff, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000000c0)=@security={'security\x00', 0xe, 0x4, 0x518, 0xffffffff, 0x250, 0x250, 0x250, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000000080), {[{{@ipv6={@mcast1={0xff, 0x1, [], 0x1}, @local={0xfe, 0x80, [], 0x0, 0xaa}, [0xffffff00, 0xffffffff, 0xffffffff, 0xff000000], [0x0, 0xff, 0x0, 0xff000000], @generic="f8c755cff1890fe5ca064e9ef582fc9d", @common='ifb0\x00', {}, {0xff}, 0xbf, 0xffff, 0x7, 0x43c7013764d9576c}, 0x0, 0x228, 0x250, 0x0, {}, [@common=@inet=@policy={0x158, 'policy\x00', 0x0, {[{@ipv4=@dev={0xac, 0x14, 0x0, 0xe}, [0xff0000ff, 0xffffffff, 0xffffffff], @ipv4=@rand_addr=0x1000000, [0xffffffff, 0xc4f8d598c7116815, 0xff000000, 0xffffff00], 0x3, 0x2, 0xff, 0x0, 0x0, 0x1}, {@ipv6=@loopback={0x0, 0x1}, [0x0, 0xff, 0x0, 0xf14c543ad876e0], @ipv4=@broadcast=0xffffffff, [0xffffffff, 0xffffffff, 0xffffffff, 0xffffff00], 0x3, 0x5, 0x2, 0x0, 0x8, 0x11}, {@ipv4=@empty, [0xffffffff, 0xffffff00, 0xffffffff, 0xffffffff], @ipv4=@multicast1=0xe0000001, [0xffffffff, 0xffffffff, 0xffffffff, 0xff], 0x2, 0x0, 0x32, 0x1, 0xc, 0x1b}, {@ipv6=@empty, [0xff, 0xffffffff], @ipv4=@empty, [0xffffffff, 0xff, 0x0, 0xff], 0x0, 0x4, 0x0, 0x0, 0x1e, 0x4}], 0xf, 0x1}}, @common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x5, 0x7, 0x101, 0x1}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x4, 0xa3, 0x2}}}, {{@uncond, 0x0, 0x100, 0x128, 0x0, {}, [@common=@srh={0x30, 'srh\x00', 0x0, {0x32, 0x7, 0x8000, 0x200, 0x7, 0x640, 0x11}}, @common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xf, 0x40, 0xe6e0}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@ipv6={@ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, @empty, [0xffffff00, 0xffffffff, 0xffffffff], [0xffffffff, 0xffffffff, 0xff, 0xff], @generic="df8ae5ca5b37d50549e3ab590746d45b", @common='gretap0\x00', {}, {0xff}, 0xbb, 0x9, 0x2, 0x29}, 0x0, 0xa8, 0xd0, 0x0, {}, []}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x800}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x578) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000002000)=@framed={{0x18}, [@jmp={0xf, 0x0, 0xc, 0x0, 0x0, 0x0, 0xffffffffffffffff}], {0x95}}, &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f000000a000)=""/195}, 0x48) [ 36.907916] xt_limit: Overflow, try lower: 4294967295/4294967291 2018/02/21 08:53:11 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = socket$inet6(0xa, 0x5, 0x80000002) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000001380)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000000)={0x0, 0xf6a4, 0x0, []}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={r2, @in6={{0xa, 0x0, 0x1, @empty, 0x7}}, 0xfffffffffffffe00, 0x4, 0x930, 0x7, 0x400}, &(0x7f0000000140)=0xa0) r3 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r3, &(0x7f000004a000)={0x10, 0x0, 0xffffffffffffffff, 0x8000100}, 0xc) [ 36.975473] audit: type=1400 audit(1519203191.470:14): avc: denied { prog_load } for pid=5205 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 37.028337] audit: type=1400 audit(1519203191.500:15): avc: denied { bind } for pid=5214 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 37.105435] audit: type=1400 audit(1519203191.573:16): avc: denied { map_create } for pid=5226 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 37.128154] audit: type=1400 audit(1519203191.583:17): avc: denied { prog_run } for pid=5226 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 2018/02/21 08:53:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000023000)={&(0x7f0000024000)={0x10}, 0xc, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x20, 0x23, 0xaff, 0xffffffffffffffff, 0xffffffffffffffff, {0x3}, [@nested={0xc, 0x1, [@typed={0x8, 0x1, @binary}]}]}, 0x20}, 0x1}, 0x0) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000000)=0x6, 0x2) 2018/02/21 08:53:11 executing program 1: r0 = socket(0x1e, 0x1, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000000)=@req={0x4c, 0x1f, 0x2, 0xffffffff}, 0x30a) listen(r0, 0x0) sendmsg(r0, &(0x7f0000030000)={&(0x7f00004f5000)=@generic={0x10000000001e, "0100000900000000000000000226cc573c080000003724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff01000300000004af50d50700000000000000e3ad316a1983000000001d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, &(0x7f0000447ff0)=[], 0x0, &(0x7f0000c50000)=[]}, 0x0) accept4$inet(r0, &(0x7f000076aff0)={0x0, 0xffffffffffffffff, @loopback}, &(0x7f000042cffc)=0x10, 0x0) getsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000), &(0x7f0000000080)=0x4) 2018/02/21 08:53:11 executing program 4: r0 = socket(0x2, 0x3, 0x1) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)) r1 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000003c0)=0x0) r3 = getuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r4 = getgid() sendmsg$unix(r0, &(0x7f0000000480)={&(0x7f0000000000)=@abs={0x1, 0x0, 0x0}, 0x8, &(0x7f0000000340)=[{&(0x7f0000000040)="75139da35fdced213b0a105425bd6b92080738f2181c", 0x16}, {&(0x7f0000000100)="5ec1f8ef8c0606a43230f7bb3f326a4c0ce9e38197849d319de889c2e8ac8a8a31678c2ec68c93505aa2d790e02faf47490c310802dfd29759fdb008ccf03e9d4d278e84b47405b39adb6b2c24e3c39c4081d8ec7ad3181ef4db3653b412bacf28f91b37b5b3ff42a8f3b2939166a8c5a8d639766584713a94e7b8609776cd2610dc390af5353cb551a402ba44fea151576975d833d2e6f3841944f8e045651d41b50a56b0701a898517ba2e16450895e8121112dc178e7602c7c49700c260df6ad29e1896930feddc43188e2f6f57e18b", 0xd1}, {&(0x7f0000000200)="b812effacb2b1c434ed60855a9da14bd1ba5717f8292d8b0b1ec815fece06155e937fee03feaacce7346ffa54dce4326ee620f79495080e91bc2a183d8f04f3eb0290d8384e5fc4cc453edc34e6b80ed4994fd01cf9b658e77549b", 0x5b}, {&(0x7f0000000280)="5169c20bf5c11becef9d00ef99b6a79a5da010a5b89b77da61f1781020c41ba80b668bf2c19184a696b0c703792271954ad527d044a47e7341dd064abadb3097f03a25a2715e209281620e65ddcb627861c951101ee649e0c79158714e255aff96bd69f245c96e3b3ed21dfa47c3d5403adff3b1cc177eded57d9e405825e95f1ff088feebd6e0bb2f2e671ff47c8f87e0b3e9e3c0762402a4aec9eaadf253f08420585ff6e0f08ef897930e1ed9e3076a95acdfde7404a039516546ab", 0xbd}, {&(0x7f0000000080)}], 0x5, &(0x7f0000000400)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @rights={0x38, 0x1, 0x1, [r0, r1, r0, r0, r1, r1, r1, r0, r0, r1]}], 0x58, 0x10}, 0x4) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)) 2018/02/21 08:53:11 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x2, 0x1, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x6}, {0xa, 0x3, 0x20, @remote={0xfe, 0x80, [], 0x0, 0xbb}, 0x7f}, 0x799c, [0x4, 0x6, 0x0, 0x0, 0x10001, 0x0, 0x9]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xcb, &(0x7f0000000100)=0x1, 0x4) 2018/02/21 08:53:11 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x201a7f1b, 0x5, 0x201a7fd7, 0xa, 0xa, 0xffffffc0}], {0x95}}, &(0x7f0000000000)="47504cc000", 0x8, 0x1ac, &(0x7f00001a7f05)=""/251}, 0x48) 2018/02/21 08:53:11 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0x0, 0xd0, 0x0, 0xffffffff, 0xffffffff, 0x270, 0x270, 0x270, 0xffffffff, 0x4, &(0x7f0000000000), {[{{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, []}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x1a0}}, {{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, []}, @REJECT={0x28, 'REJECT\x00'}}, {{@uncond, 0x0, 0xa8, 0xd0, 0x0, {}, []}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x3a0) 2018/02/21 08:53:11 executing program 7: r0 = socket$inet6(0xa, 0x800000806, 0x0) r1 = socket(0xa, 0x1, 0x83d) recvfrom$llc(r1, &(0x7f0000000000)=""/4096, 0x1000, 0x100, &(0x7f0000001000)={0x1a, 0x1d, 0xfff, 0xfffffffffffffff8, 0x7fff, 0x1, @random="77afe90d2e62"}, 0x10) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f00001dbee8)="0022040000ffffe0fffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000bdfe60ed7449b842f3e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d41991ac25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c182bc97ffb4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) 2018/02/21 08:53:11 executing program 5: r0 = socket$inet6(0xa, 0x200000002, 0x0) connect$inet6(r0, &(0x7f0000b7efe4)={0xa, 0xffffffffffffffff, 0x0, @mcast2={0xff, 0x2, [], 0x1}, 0xffffffffffffff7f}, 0x1c) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000a33000)={@rand_addr, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x8) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000000)={0x0, 0x0}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x0, 0x9, 0x31a, 0x0, 0x5f}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000000c0)={r2, 0x1, 0x81, 0x4, 0x8001, 0x7}, 0x14) [ 37.273071] audit: type=1400 audit(1519203191.767:18): avc: denied { net_raw } for pid=5263 comm="syz-executor4" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 37.277334] Bearer <> rejected, not supported in standalone mode [ 37.304296] kasan: CONFIG_KASAN_INLINE enabled [ 37.308995] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 37.316371] general protection fault: 0000 [#1] SMP KASAN [ 37.321885] Dumping ftrace buffer: [ 37.325398] (ftrace buffer empty) [ 37.329080] Modules linked in: [ 37.332247] CPU: 0 PID: 4460 Comm: kworker/0:2 Not tainted 4.16.0-rc2+ #235 [ 37.339313] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.348649] Workqueue: ipv6_addrconf addrconf_dad_work [ 37.353906] RIP: 0010:ip6t_do_table+0x132d/0x1a30 [ 37.358717] RSP: 0018:ffff8801ac436d40 EFLAGS: 00010246 [ 37.364050] RAX: 0000000000000000 RBX: ffff8801c98c01e0 RCX: ffffffff84dc2921 [ 37.371292] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8801c98c00ce [ 37.378531] RBP: ffff8801ac436f88 R08: 0000000000000000 R09: 0000000000000001 [ 37.385770] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001 [ 37.393014] R13: 0000000000000000 R14: dffffc0000000000 R15: ffff8801c98c0040 [ 37.400256] FS: 0000000000000000(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000 [ 37.408450] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 37.414301] CR2: 00000000004c9da0 CR3: 0000000006a22006 CR4: 00000000001606f0 [ 37.421544] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 37.428783] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 37.436022] Call Trace: [ 37.438582] ? ip6t_error+0x60/0x60 [ 37.442185] ? mld_sendpack+0x617/0xe70 [ 37.446140] ? ip6t_error+0x60/0x60 [ 37.449739] ? ip6table_mangle_hook+0x117/0x920 [ 37.454382] ? check_noncircular+0x20/0x20 [ 37.458589] ? ip6table_mangle_net_exit+0xa0/0xa0 [ 37.463401] ? igmp6_mcf_seq_next+0x660/0x660 [ 37.467868] ? find_held_lock+0x35/0x1d0 [ 37.471904] ? ip6table_nat_fn+0x40/0x40 [ 37.475941] ip6table_filter_hook+0x65/0x80 [ 37.480236] nf_hook_slow+0xba/0x1a0 [ 37.483926] nf_hook.constprop.37+0x3f6/0x830 [ 37.488396] ? igmp6_mcf_seq_next+0x660/0x660 [ 37.492863] ? trace_hardirqs_on+0xd/0x10 [ 37.496990] ? __local_bh_enable_ip+0x121/0x230 [ 37.501633] ? _raw_spin_unlock_bh+0x30/0x40 [ 37.506017] ? rt6_uncached_list_add+0x1b7/0x240 [ 37.510748] ? rt6_fill_node+0x18b0/0x18b0 [ 37.514961] ? icmp6_dst_alloc+0x475/0x660 [ 37.519170] ? ip6_mc_leave_src+0x1d0/0x1d0 [ 37.523466] ? icmpv6_flow_init+0x1f6/0x270 [ 37.527764] mld_sendpack+0x6c2/0xe70 [ 37.531542] ? nf_hook.constprop.37+0x830/0x830 [ 37.536187] ? mark_held_locks+0xaf/0x100 [ 37.540314] ? trace_hardirqs_on+0xd/0x10 [ 37.544433] ? __local_bh_enable_ip+0x121/0x230 [ 37.549077] mld_send_initial_cr.part.25+0x103/0x150 [ 37.554154] ipv6_mc_dad_complete+0x99/0x130 [ 37.558538] addrconf_dad_completed+0x78b/0xb90 [ 37.563182] ? addrconf_verify_work+0x20/0x20 [ 37.567648] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 37.572633] ? addrconf_dad_work+0x849/0x1320 [ 37.577102] addrconf_dad_work+0x3d6/0x1320 [ 37.581395] ? addrconf_dad_work+0x3d6/0x1320 [ 37.585862] ? addrconf_ifdown+0x14f0/0x14f0 [ 37.590248] ? __lock_is_held+0xb6/0x140 [ 37.594288] process_one_work+0xbbf/0x1af0 [ 37.598492] ? process_one_work+0xbbf/0x1af0 [ 37.602884] ? pwq_dec_nr_in_flight+0x450/0x450 [ 37.607528] ? __schedule+0x90d/0x2070 [ 37.611390] ? __lock_acquire+0x664/0x3e00 [ 37.615598] ? check_noncircular+0x20/0x20 [ 37.619808] ? check_noncircular+0x20/0x20 [ 37.624025] ? lock_acquire+0x1d5/0x580 [ 37.627970] ? lock_acquire+0x1d5/0x580 [ 37.631924] ? worker_thread+0x4a3/0x1990 [ 37.636043] ? lock_downgrade+0x980/0x980 [ 37.640162] ? lock_release+0xa40/0xa40 [ 37.644112] ? check_noncircular+0x20/0x20 [ 37.648316] ? do_raw_spin_trylock+0x190/0x190 [ 37.652882] worker_thread+0x223/0x1990 [ 37.656828] ? finish_task_switch+0x1c0/0x860 [ 37.661305] ? process_one_work+0x1af0/0x1af0 [ 37.665774] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 37.670849] ? trace_hardirqs_on+0xd/0x10 [ 37.674972] ? mmdrop+0x18/0x30 [ 37.678395] ? finish_task_switch+0x279/0x860 [ 37.682868] ? copy_overflow+0x20/0x20 [ 37.686737] ? __schedule+0x90d/0x2070 [ 37.690604] ? check_noncircular+0x20/0x20 [ 37.694809] ? find_held_lock+0x35/0x1d0 [ 37.698846] ? find_held_lock+0x35/0x1d0 [ 37.702886] ? find_held_lock+0x35/0x1d0 [ 37.706924] ? complete+0x62/0x80 [ 37.710354] ? __schedule+0x2070/0x2070 [ 37.714302] ? do_wait_intr_irq+0x3e0/0x3e0 [ 37.718597] ? __lockdep_init_map+0xe4/0x650 [ 37.722979] ? do_raw_spin_trylock+0x190/0x190 [ 37.727534] ? lockdep_init_map+0x9/0x10 [ 37.731572] ? _raw_spin_unlock_irqrestore+0x31/0xba [ 37.736735] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 37.741724] ? trace_hardirqs_on+0xd/0x10 [ 37.745846] ? __kthread_parkme+0x175/0x240 [ 37.750153] kthread+0x33c/0x400 [ 37.753493] ? process_one_work+0x1af0/0x1af0 [ 37.757958] ? kthread_stop+0x7a0/0x7a0 [ 37.761909] ret_from_fork+0x3a/0x50 [ 37.765599] Code: 41 f6 87 83 00 00 00 04 75 37 e8 af e2 94 fc 8b 85 14 fe ff ff 48 8b b5 50 fe ff ff 4c 8d 2c c6 44 8d 60 01 4c 89 e8 48 c1 e8 03 <42> 80 3c 30 00 0f 85 26 03 00 00 4d 89 7d 00 44 89 a5 14 fe ff [ 37.784694] RIP: ip6t_do_table+0x132d/0x1a30 RSP: ffff8801ac436d40 [ 37.791041] ---[ end trace 42b9a42a20e2241e ]--- [ 37.791424] kasan: CONFIG_KASAN_INLINE enabled [ 37.795791] Kernel panic - not syncing: Fatal exception in interrupt [ 37.800366] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 37.807251] Dumping ftrace buffer: [ 37.807254] (ftrace buffer empty) [ 37.807257] Kernel Offset: disabled [ 37.825373] Rebooting in 86400 seconds..