[....] Starting enhanced syslogd: rsyslogd[ 17.126610] audit: type=1400 audit(1519313092.246:5): avc: denied { syslog } for pid=4053 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 22.692364] audit: type=1400 audit(1519313097.812:6): avc: denied { map } for pid=4193 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.21' (ECDSA) to the list of known hosts. 2018/02/22 15:25:04 fuzzer started [ 29.044655] audit: type=1400 audit(1519313104.164:7): avc: denied { map } for pid=4204 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/02/22 15:25:04 dialing manager at 10.128.0.26:42015 [ 35.084935] can: request_module (can-proto-0) failed. [ 35.094398] can: request_module (can-proto-0) failed. 2018/02/22 15:25:10 kcov=true, comps=true [ 35.674907] audit: type=1400 audit(1519313110.794:8): avc: denied { map } for pid=4204 comm="syz-fuzzer" path="/sys/kernel/debug/kcov" dev="debugfs" ino=1088 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2018/02/22 15:25:16 executing program 0: r0 = socket(0x10, 0x8000000003, 0x4) sendmsg$nl_xfrm(r0, &(0x7f00009d3000)={&(0x7f0000c15000)={0x10}, 0xc, &(0x7f0000ce5ff8)={&(0x7f0000abdefc)=@delsa={0x4c, 0x12, 0x515485708c54ddb, 0xffffffffffffffff, 0xffffffffffffffff, {@in=@broadcast=0xffffffff}, [@sec_ctx={0x24, 0x8, {0x1d, 0x8, 0x0, 0x0, 0x15, "69cc8910cf7a5164ef891111a0edabf37c1fd93a0d"}}]}, 0x4c}, 0x1}, 0x0) 2018/02/22 15:25:16 executing program 7: r0 = socket$inet6(0xa, 0x2000000000001, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}, 0x113}, 0x1c) bind$inet6(r0, &(0x7f0000402000)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/02/22 15:25:16 executing program 1: pipe2(&(0x7f0000864ff8)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000bc8000)={0xaa}) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00003b3000)='./file0\x00') mount(&(0x7f0000e07000)='./file0\x00', &(0x7f0000d14ffc)='./file0\x00', &(0x7f00009cf000)='ramfs\x00', 0x0, &(0x7f000081f000)) link(&(0x7f0000f3bff8)='./file0\x00', &(0x7f00006b3ff0)='./control/file0\x00') dup2(r0, r1) 2018/02/22 15:25:16 executing program 2: chroot(&(0x7f000009a000)='./file0\x00') mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000edaff8)='./file0\x00', &(0x7f0000d9fffa)='msdos\x00', 0x0, 0x0) open(&(0x7f0000001640)='../file0\x00', 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) open(&(0x7f0000003000)='./file0\x00', 0x0, 0x80) openat$dir(0xffffffffffffff9c, &(0x7f0000003080)='../file0\x00', 0x2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) lstat(&(0x7f0000003240)='..', &(0x7f0000003280)) pipe(&(0x7f0000003f00)) openat$dir(0xffffffffffffff9c, &(0x7f0000003f80)='..', 0x4800, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) accept4$vsock_stream(0xffffffffffffff9c, &(0x7f0000003fc0)={0x28, 0x0, 0x0, @host=0x2}, 0x10, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000006980)) 2018/02/22 15:25:16 executing program 3: perf_event_open(&(0x7f000025c000)={0x0, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f00001ab000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f0000000140)) times(&(0x7f0000000040)) syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00007c3000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f00001dd000)={0x1, 0x0, [{0x40000021, 0x0, 0x9}]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 2018/02/22 15:25:16 executing program 4: r0 = socket$inet6(0xa, 0x800000806, 0x0) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0xffffffffffffffff, 0x0, @empty}, 0x1c) 2018/02/22 15:25:16 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x200004b564d03, 0x0, 0x105}]}) 2018/02/22 15:25:16 executing program 6: perf_event_open(&(0x7f0000aaa000)={0x2, 0x78, 0x47, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000fd5fd8)={@common='lo\x00', &(0x7f0000fbbfec)=@ethtool_sset_info={0x37, 0x0, 0x100, []}}) [ 41.217350] audit: type=1400 audit(1519313116.337:9): avc: denied { map } for pid=4204 comm="syz-fuzzer" path="/root/syzkaller-shm028988124" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 41.280587] audit: type=1400 audit(1519313116.400:10): avc: denied { sys_admin } for pid=4247 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 41.293326] IPVS: ftp: loaded support on port[0] = 21 [ 41.376008] audit: type=1400 audit(1519313116.495:11): avc: denied { net_admin } for pid=4252 comm="syz-executor7" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 41.377865] IPVS: ftp: loaded support on port[0] = 21 [ 41.441657] IPVS: ftp: loaded support on port[0] = 21 [ 41.487827] IPVS: ftp: loaded support on port[0] = 21 [ 41.542780] IPVS: ftp: loaded support on port[0] = 21 [ 41.615464] IPVS: ftp: loaded support on port[0] = 21 [ 41.694142] IPVS: ftp: loaded support on port[0] = 21 [ 41.819902] IPVS: ftp: loaded support on port[0] = 21 [ 42.738960] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 42.765628] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 42.878661] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 42.936304] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 43.144616] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 43.155537] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 43.366229] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 43.430317] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 45.323231] audit: type=1400 audit(1519313120.441:12): avc: denied { sys_chroot } for pid=4252 comm="syz-executor7" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/02/22 15:25:20 executing program 7: sysfs$2(0x2, 0x2, &(0x7f000049df35)=""/203) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) r1 = socket$can_bcm(0x1d, 0x2, 0x2) fcntl$dupfd(r0, 0x406, r1) [ 45.686909] audit: type=1400 audit(1519313120.806:13): avc: denied { dac_read_search } for pid=5251 comm="syz-executor1" capability=2 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 45.711844] audit: type=1400 audit(1519313120.806:14): avc: denied { dac_override } for pid=5251 comm="syz-executor1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 45.736377] audit: type=1400 audit(1519313120.806:15): avc: denied { name_connect } for pid=5279 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 2018/02/22 15:25:21 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000040)={0x80, {{0x2, 0x1, @loopback=0x7f000001}}, {{0x2, 0x2, @multicast1=0xe0000001}}}, 0x118) r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={0x0, @in6={{0xa, 0x0, 0x401, @loopback={0x0, 0x1}, 0x2}}, [0x1, 0x400, 0xffffffffbac0b85e, 0x2, 0x7, 0x3, 0x400, 0x4, 0x2, 0x8, 0x400, 0x0, 0xd8, 0x3, 0x4]}, &(0x7f00000002c0)=0x108) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000340)={r2, 0x10, &(0x7f0000000300)=[@in={0x2, 0x1, @multicast1=0xe0000001}]}, &(0x7f0000000380)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000300)={r2, 0x8, 0x80000001}, 0x8) sync() writev(r1, &(0x7f0000000000)=[{&(0x7f0000000000)="379fee3d", 0x4}], 0x1) fchdir(r1) 2018/02/22 15:25:21 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00009b2fd8)={@syzn={0x73, 0x79, 0x7a, 0x0}, 0x0}) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f000008c000)=0x8, 0x4) sendto$packet(r0, &(0x7f0000fd4fe8)="2d0a0000007c000002005ca73d9fe3b5039bab00973a2da5", 0x18, 0x0, &(0x7f0000d7dfec)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @empty}, 0x14) sendto$packet(r0, &(0x7f0000000000)="dd82123ae67c9711de50a7aa93312a16", 0x10, 0x810, &(0x7f0000000040)={0x11, 0x1, r1, 0x1, 0xa5, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) 2018/02/22 15:25:21 executing program 1: open(&(0x7f0000001480)='./file0\x00', 0x800, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000014c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000001500)=0x10) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000010, 0x1000000000803, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000058ffd8)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00009cc000)={&(0x7f00002e5000)={0x10}, 0xc, &(0x7f000004c000)={&(0x7f0000efb000)=@newneigh={0x30, 0x1c, 0x301, 0xffffffffffffffff, 0xffffffffffffffff, {0xa, 0x0, 0x0, r1, 0x0, 0xb}, [@NDA_DST_IPV6={0x14, 0x1, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}]}, 0x30}, 0x1}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f17000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r2, 0x80000080045432, &(0x7f0000000000)) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 2018/02/22 15:25:21 executing program 2: r0 = socket(0x2, 0x1, 0x0) r1 = epoll_create1(0x80003) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r1, &(0x7f0000000040)) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2002, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000080)) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000007ffc), 0x4) socket$inet6_dccp(0xa, 0x6, 0x0) 2018/02/22 15:25:21 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000062ffa8)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x9) sendmmsg(r1, &(0x7f0000825de4)=[{{&(0x7f0000b41fe0)=@pptp={0x18, 0x2, {0x0, @rand_addr}}, 0x20, &(0x7f0000b13f90)=[]}}], 0x1, 0x0) sendfile(r1, r2, &(0x7f00004b4000), 0x8) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) 2018/02/22 15:25:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x200004b564d03, 0x0, 0x105}]}) 2018/02/22 15:25:21 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9f1, 0x40000) flock(r1, 0x8) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r1, 0x40046411, &(0x7f0000000040)=0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00', 0x0}) preadv(r1, &(0x7f0000001600)=[{&(0x7f00000000c0)=""/137, 0x89}, {&(0x7f0000000180)=""/57, 0x39}, {&(0x7f00000001c0)=""/96, 0x60}, {&(0x7f0000000240)=""/244, 0xf4}, {&(0x7f0000000340)=""/183, 0xb7}, {&(0x7f0000000400)=""/159, 0x9f}, {&(0x7f00000004c0)=""/55, 0x37}, {&(0x7f0000000500)=""/142, 0x8e}, {&(0x7f00000005c0)=""/19, 0x13}, {&(0x7f0000000600)=""/4096, 0x1000}], 0xa, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000000c0)={@multicast1=0xe0000001, @remote={0xac, 0x14, 0x0, 0xbb}, r2}, 0xc) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000bd7000)={&(0x7f00005a9000)=@newsa={0xf0, 0x10, 0x713, 0xffffffffffffffff, 0xffffffffffffffff, {{@in=@rand_addr, @in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, {@in6=@mcast1={0xff, 0x1, [], 0x1}, 0xffffffffffffffff, 0x33}, @in=@broadcast=0xffffffff, {}, {}, {}, 0xffffffffffffffff, 0xffffffffffffffff, 0x2}, []}, 0xf0}, 0x1}, 0x0) 2018/02/22 15:25:21 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0xffffffffffffffff}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r3, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0xfffffffffffffffd, @time, {}, {}, @time=@time={0x77359400}}], 0x334) setsockopt$inet_mreq(r3, 0x0, 0x24, &(0x7f0000000100)={@multicast1=0xe0000001, @remote={0xac, 0x14, 0x0, 0xbb}}, 0x8) ftruncate(r3, 0x0) dup2(r1, r1) dup2(r0, r2) 2018/02/22 15:25:21 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000ad7000)='/dev/audio\x00', 0x0, 0x0) close(r1) accept$inet6(r1, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, @empty}, &(0x7f0000000040)=0x1c) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000011c0)={0x0, 0x0, []}) r2 = socket$can_raw(0x1d, 0x3, 0x1) fcntl$setflags(r2, 0x2, 0x1) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) [ 45.928236] audit: type=1400 audit(1519313121.047:16): avc: denied { net_raw } for pid=5302 comm="syz-executor7" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/02/22 15:25:21 executing program 3: r0 = socket(0x1e, 0x1000000000005, 0x0) sendmsg(r0, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, &(0x7f000045d000)=[], 0x0, &(0x7f000016cf61)=[]}, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) r3 = syz_open_dev$vcsn(&(0x7f0000001080)='/dev/vcs#\x00', 0xfff, 0x4000) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000010c0)={0x0, r3, 0x3, 0x1}, 0x14) clock_gettime(0x0, &(0x7f00000010c0)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f00000011c0)={&(0x7f0000001080)={0x1d}, 0x10, &(0x7f0000001180)={&(0x7f0000001100)={0xe2d40554653e4192, 0x20b, 0x3, {0x77359400}, {r4, r5/1000+10000}, {0x1, 0xfff, 0x10000, 0x7fffffff}, 0x1, @can={{0x0, 0x9, 0x2, 0x5}, 0x2, 0x2, 0x0, 0x0, "007cf4c877d16de3"}}, 0x48}, 0x1, 0x0, 0x0, 0x24008044}, 0x4040010) ppoll(&(0x7f0000000080)=[{r0}], 0x1, &(0x7f0000000100)={r1, r2+10000000}, &(0x7f0000000140), 0x8) 2018/02/22 15:25:21 executing program 6: r0 = socket(0x2000000000000010, 0x1000000000803, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000040)={0x6000, 0x1000, 0x33, 0xcb, 0x6}) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000058ffd8)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00009cc000)={&(0x7f00002e5000)={0x10}, 0xc, &(0x7f000004c000)={&(0x7f0000efb000)=@newneigh={0x30, 0x1c, 0x301, 0xffffffffffffffff, 0xffffffffffffffff, {0xa, 0x0, 0x0, r2, 0x0, 0xb}, [@NDA_DST_IPV6={0x14, 0x1, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}]}, 0x30}, 0x1}, 0x0) 2018/02/22 15:25:21 executing program 1: open(&(0x7f0000001480)='./file0\x00', 0x800, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f00000014c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000001500)=0x10) perf_event_open(&(0x7f000001d000)={0x5, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000010, 0x1000000000803, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f000058ffd8)={'vcan0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f00009cc000)={&(0x7f00002e5000)={0x10}, 0xc, &(0x7f000004c000)={&(0x7f0000efb000)=@newneigh={0x30, 0x1c, 0x301, 0xffffffffffffffff, 0xffffffffffffffff, {0xa, 0x0, 0x0, r1, 0x0, 0xb}, [@NDA_DST_IPV6={0x14, 0x1, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}]}, 0x30}, 0x1}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f17000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r2, 0x80000080045432, &(0x7f0000000000)) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) 2018/02/22 15:25:21 executing program 4: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x40, 0x6000) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000040)={@empty, @broadcast}, &(0x7f0000000080)=0xc) r1 = socket(0x40000000015, 0x5, 0x0) bind$inet(r1, &(0x7f0000fc4ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r2 = socket(0x140000000015, 0x5, 0x0) bind$inet(r2, &(0x7f0000003ff0)={0x2, 0x0, @loopback=0x7f000001}, 0x10) 2018/02/22 15:25:21 executing program 7: keyctl$set_reqkey_keyring(0xe, 0x2) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000018ffb)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000014000)='$\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xffff, 0x8000) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000040)=""/140) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x1, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r1, 0xae04) 2018/02/22 15:25:21 executing program 2: r0 = socket(0x2, 0x80000000000001, 0x0) r1 = dup3(r0, r0, 0x80000) setsockopt(r1, 0x6, 0x20, &(0x7f00005b3000)="020000126c3b172917e25462fa01a15eb90d2cf653f13cc379ede465f40f4a9500000000000000f6f0b30000800099b397e69501f03d3b3d54436fc71cbcdc6e30ac10369300aff67d186348320700c0a94c470502e90000009398fc74e81b105fd02f9b14732017e2466a9fc43aea71263335960415800020ffffffff7fffffff00020006d1b0e6ebcb12c7290771363e9700004a4c939f5c0c14f1659ce8c8bed2e97e60a3649f2eea0c8263f845802ad72fa698807ef14a6a1813e900bf1d113b514dbdc05ea1309163d6a40de8391f2e98a4bbfbcbea", 0xd8) setsockopt$inet6_opts(r1, 0x29, 0x0, &(0x7f0000000000)=@hopopts={0xeb, 0x0, [], [@enc_lim={0x4, 0x1, 0x7fff}]}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x2, @local={0xac, 0x14, 0x0, 0xaa}}, 0x10) sendmmsg$inet_sctp(r0, &(0x7f00002f0000)=[{&(0x7f00003deff0)=@in={0x2, 0x0, @empty}, 0x10, &(0x7f000085a000)=[]}], 0x1, 0x20008843) shutdown(r0, 0x2) 2018/02/22 15:25:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x200004b564d03, 0x0, 0x105}]}) 2018/02/22 15:25:21 executing program 0: r0 = getpid() perf_event_open(&(0x7f000025c000)={0x2, 0x36, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000e8000)='/dev/cuse\x00', 0x2, 0x0) write$fuse(r1, &(0x7f00009eb000)={0x30, 0x6, 0x0, @fuse_notify_retrieve_out={0x0, 0x0, 0x7}}, 0x30) 2018/02/22 15:25:21 executing program 6: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f000089ff0a)=""/246) ioctl$EVIOCGREP(r0, 0x40107446, &(0x7f00000000c0)=""/174) 2018/02/22 15:25:21 executing program 2: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x0, 0xffffffffffffff6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/02/22 15:25:21 executing program 4: r0 = socket$inet_sctp(0x2, 0x8000000005, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000005000)={'filter\x00', 0x7, 0x4, 0xfffffffffffffd49, 0x200, 0x200, 0x2e8, 0x2e8, 0x2e8, 0x2e8, 0x4, &(0x7f0000002000), {[{{@uncond, 0xc0, 0xe8}, @mangle={0x0, 'mangle\x00', 0x0, {@empty, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @dev={0xac, 0x14, 0x0, 0xf}, @empty, 0x1, 0x1}}}, {{@uncond, 0xc0, 0xf0}, @unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@arp={@rand_addr, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, 0x0, 0x0, @mac=@remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff, 0xbb}, {}, @mac=@random="43919d14562f", {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @generic="e1acce5be67d8edf0bd9a24f02d5e16c", @common='gre0\x00'}, 0xc0, 0xffffffffffffff31}, @unspec=@NFQUEUE1={0x0, 'NFQUEUE\x00', 0x1, {0x0, 0xabf}}}], {{[], 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x7ac9ac0782015c94) pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x84800) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r1, 0x40405515, &(0x7f0000000040)={0x1, 0x0, 0x4, 0xffffffff00000000, "59d4627749b82b7bcdd9b53668bab686f905e9f4038d8d2eda956bb182041d2a59aa430a960270493c05f415", 0x7}) syz_open_pts(r2, 0x0) 2018/02/22 15:25:21 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000fafff7)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x200004b564d03, 0x0, 0x105}]}) 2018/02/22 15:25:21 executing program 0: r0 = socket(0x3, 0xf, 0xffffffffffffffff) sendmsg$nfc_llcp(r0, &(0x7f000094d000)={&(0x7f00003d6000)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "ec6abb25fa5d807ece91c13fded2bfaabcd02a9de05ef145b1d800c80c2958bdf092d02ba9ef48c7bcb98680608119b75ab4cb01af1fb547611fb6f35ee9b8"}, 0x60, &(0x7f0000c55000)=[], 0x0, &(0x7f0000a8e000)={0x10}, 0x10}, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x101001, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f0000000040)={0x0, 0x3f, 0x9, 0x7ff}) fcntl$setlease(r0, 0x400, 0x1) 2018/02/22 15:25:21 executing program 3: r0 = socket$inet(0xa, 0x801, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0xe, 0x4, 0x3e0, 0xffffffff, 0x290, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x348, 0x348, 0x348, 0xffffffff, 0x4, &(0x7f0000003fc0), {[{{@uncond, 0x0, 0x70, 0x98, 0x0, {}, []}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x290}}, {{@uncond, 0x0, 0x1c8, 0x1f8, 0x0, {}, [@common=@inet=@hashlimit3={0x158, 'hashlimit\x00', 0x3, {'bcsf0\x00', {0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffffffffdad, 0x800}}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1}}, {{@ip={@dev={0xac, 0x14}, @dev={0xac, 0x14}, 0x0, 0x0, @syzn={0x73, 0x79, 0x7a}, @syzn={0x73, 0x79, 0x7a}}, 0x0, 0x70, 0xb8, 0x0, {}, []}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}, @common='vcan0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x440) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000134000)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) connect$inet(r1, &(0x7f00000dcff0)={0x2, 0x3, @loopback=0x7f000001}, 0x10) 2018/02/22 15:25:21 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f000011bfe4)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000e0cfbe)={0x2, 0xf, 0x0, 0x0, 0x10, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0xffffffffffffffff, @multicast1=0xe0000001}}, @sadb_x_policy={0x8, 0x12, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in6=@dev={0xfe, 0x80}, @in=@dev={0xac, 0x14}}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0xffffffffffffffff, @rand_addr}}]}, 0x80}, 0x1}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000080)={{{@in=@rand_addr, @in6=@remote, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000000180)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={r1, r2, r3}, 0xc) 2018/02/22 15:25:21 executing program 2: r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x0, 0x0, &(0x7f0000664fc0)) mq_timedreceive(r0, &(0x7f000009d000)=""/224, 0xe0, 0x0, &(0x7f0000e6eff8)={0x77359400}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)={0x3, 0x0, [{0x5, 0x0, 0x0, 0x0, @msi={0x7, 0x9, 0x2}}, {0x3, 0x1, 0x0, 0x0, @sint={0x8, 0x4}}, {0x3, 0x1, 0x0, 0x0, @sint={0x9}}]}) mq_timedreceive(r0, &(0x7f0000a2e000)=""/40, 0x28, 0x0, &(0x7f0000b6bff0)) [ 46.210857] kasan: CONFIG_KASAN_INLINE enabled [ 46.215601] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 46.220175] QAT: Invalid ioctl [ 46.223038] general protection fault: 0000 [#1] SMP KASAN [ 46.223047] Dumping ftrace buffer: [ 46.235342] (ftrace buffer empty) [ 46.239028] Modules linked in: [ 46.242197] CPU: 0 PID: 5366 Comm: syz-executor3 Not tainted 4.16.0-rc2+ #323 [ 46.249440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 46.258779] RIP: 0010:ipt_do_table+0x12ee/0x1950 [ 46.263507] RSP: 0018:ffff8801b7a36da0 EFLAGS: 00010246 [ 46.268842] RAX: 0000000000000000 RBX: ffff8801b6a7a610 RCX: ffffffff84b795fd [ 46.276085] RDX: 000000000000095e RSI: 0000000000000000 RDI: ffff8801b6a7a3da [ 46.283330] RBP: ffff8801b7a36fa8 R08: 0000000000000000 R09: 0000000000000001 [ 46.290574] R10: 0000000000000000 R11: 0000000000000003 R12: 0000000000000000 [ 46.297817] R13: dffffc0000000000 R14: ffff8801b6a7a380 R15: ffff8801b7a36f20 [ 46.305066] FS: 00007fac1d37b700(0000) GS:ffff8801db400000(0000) knlGS:0000000000000000 [ 46.313264] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 46.319120] CR2: 0000001b9bc22000 CR3: 00000001b89c1003 CR4: 00000000001606f0 [ 46.326367] DR0: 0000000020000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 46.333610] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 46.340856] Call Trace: [ 46.343431] ? nf_nat_setup_info+0xe00/0xe00 [ 46.348095] ? do_add_counters+0x550/0x550 [ 46.352304] ? nf_nat_ipv4_in_range+0xf0/0xf0 [ 46.356788] iptable_filter_hook+0x65/0x80 [ 46.361785] nf_hook_slow+0xba/0x1a0 [ 46.365478] __ip_local_out+0x4c1/0xa30 [ 46.369428] ? ip_finish_output+0xd10/0xd10 [ 46.373726] ? __sk_dst_check+0x1a5/0x380 [ 46.377851] ? __ip_flush_pending_frames.isra.41+0x2b0/0x2b0 [ 46.383624] ? __lock_is_held+0xb6/0x140 [ 46.387664] ip_local_out+0x2d/0x160 [ 46.391355] ip_queue_xmit+0x8c0/0x18e0 [ 46.395310] ? ip_build_and_send_pkt+0xc30/0xc30 [ 46.400042] ? refcount_dec_if_one+0x20/0x20 [ 46.405125] ? __lock_is_held+0xb6/0x140 [ 46.409160] ? __tcp_v4_send_check+0x1be/0x360 [ 46.413715] ? tcp_options_write+0x228/0x940 [ 46.418099] tcp_transmit_skb+0x1b12/0x38b0 [ 46.422399] ? memset+0x31/0x40 [ 46.425654] ? __tcp_select_window+0x900/0x900 [ 46.430224] ? check_noncircular+0x20/0x20 [ 46.434437] ? pvclock_read_flags+0x160/0x160 [ 46.438909] ? tcp_init_transfer+0x3e0/0x3e0 [ 46.443300] ? tcp_rbtree_insert+0x135/0x190 [ 46.447685] tcp_connect+0x2d1e/0x40f0 [ 46.451558] ? tcp_push_one+0x100/0x100 [ 46.455507] ? print_irqtrace_events+0x270/0x270 [ 46.460241] ? secure_tcp_seq+0x9f/0x150 [ 46.464281] ? lock_downgrade+0x980/0x980 [ 46.468409] ? pvclock_read_flags+0x160/0x160 [ 46.472878] ? mark_held_locks+0xaf/0x100 [ 46.477010] ? ktime_get_with_offset+0x188/0x420 [ 46.481748] ? kvm_clock_get_cycles+0x25/0x30 [ 46.486220] ? do_gettimeofday+0x190/0x190 [ 46.490431] ? tcp_set_state+0x201/0x830 [ 46.494466] ? tcp_fastopen_defer_connect+0x163/0x4a0 [ 46.499634] ? siphash_1u64+0x18/0x270 [ 46.503497] ? secure_tcp_ts_off+0x98/0x170 [ 46.507794] ? xfrm_lookup_route+0x4f/0x1a0 [ 46.512102] ? dst_release+0x3a/0x90 [ 46.515806] tcp_v4_connect+0x15ef/0x1e70 [ 46.519938] ? tcp_v4_inbound_md5_hash+0x510/0x510 [ 46.524844] ? print_irqtrace_events+0x270/0x270 [ 46.529574] ? find_held_lock+0x35/0x1d0 [ 46.533610] __inet_stream_connect+0x2d4/0xf00 [ 46.538166] ? lock_acquire+0x1d5/0x580 [ 46.542121] ? lock_sock_nested+0xa3/0x110 [ 46.546326] ? lock_acquire+0x1d5/0x580 [ 46.550274] ? inet_bind+0x930/0x930 [ 46.553968] ? mark_held_locks+0xaf/0x100 [ 46.558090] ? do_raw_spin_trylock+0x190/0x190 [ 46.562649] ? __local_bh_enable_ip+0x121/0x230 [ 46.567293] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 46.572284] ? lock_sock_nested+0x91/0x110 [ 46.576489] ? trace_hardirqs_on+0xd/0x10 [ 46.580611] ? __local_bh_enable_ip+0x121/0x230 [ 46.585517] inet_stream_connect+0x58/0xa0 [ 46.589729] SYSC_connect+0x213/0x4a0 [ 46.593500] ? SYSC_bind+0x290/0x410 [ 46.597189] ? SYSC_bind+0x410/0x410 [ 46.600881] ? get_unused_fd_flags+0x121/0x190 [ 46.605441] ? SyS_futex+0x269/0x390 [ 46.609127] ? fd_install+0x4d/0x60 [ 46.612730] ? do_futex+0x22a0/0x22a0 [ 46.616503] ? SyS_socket+0x12d/0x1d0 [ 46.620279] ? move_addr_to_kernel+0x60/0x60 [ 46.625111] ? SyS_accept+0x30/0x30 [ 46.628710] SyS_connect+0x24/0x30 [ 46.632229] do_syscall_64+0x280/0x940 [ 46.636091] ? __do_page_fault+0xc90/0xc90 [ 46.640300] ? finish_task_switch+0x1c0/0x860 [ 46.644768] ? finish_task_switch+0x181/0x860 [ 46.649238] ? syscall_return_slowpath+0x550/0x550 [ 46.654147] ? syscall_return_slowpath+0x2ac/0x550 [ 46.659069] ? prepare_exit_to_usermode+0x350/0x350 [ 46.664067] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 46.669410] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 46.674234] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 46.680203] RIP: 0033:0x453da9 [ 46.683374] RSP: 002b:00007fac1d37ac68 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 46.691057] RAX: ffffffffffffffda RBX: 00007fac1d37b6d4 RCX: 0000000000453da9 [ 46.698299] RDX: 0000000000000010 RSI: 00000000200dcff0 RDI: 0000000000000014 [ 46.705543] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 46.712788] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 46.720032] R13: 0000000000000059 R14: 00000000006f08f8 R15: 0000000000000000 [ 46.727287] Code: 46 52 02 75 41 e8 d3 75 b9 fc 8b 85 80 fe ff ff 8d 70 01 89 b5 00 ff ff ff 48 8b b5 88 fe ff ff 4c 8d 24 c6 4c 89 e0 48 c1 e8 03 <42> 80 3c 28 00 0f 85 e8 01 00 00 8b 85 00 ff ff ff 4d 89 34 24 [ 46.746398] RIP: ipt_do_table+0x12ee/0x1950 RSP: ffff8801b7a36da0 [ 46.752656] ---[ end trace ff2cbe02c65fe331 ]--- [ 46.757405] Kernel panic - not syncing: Fatal exception in interrupt [ 46.764399] Dumping ftrace buffer: [ 46.767910] (ftrace buffer empty) [ 46.771591] Kernel Offset: disabled [ 46.775188] Rebooting in 86400 seconds..