[....] Starting enhanced syslogd: rsyslogd[ 13.406599] audit: type=1400 audit(1519637326.808:4): avc: denied { syslog } for pid=3640 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.15.222' (ECDSA) to the list of known hosts. 2018/02/26 09:28:57 fuzzer started 2018/02/26 09:28:58 dialing manager at 10.128.0.26:41707 2018/02/26 09:29:01 kcov=true, comps=false 2018/02/26 09:29:03 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rt_acct\x00') pread64(r0, &(0x7f0000fd7000)=""/8, 0x398, 0x0) 2018/02/26 09:29:03 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000072fee)='/dev/input/event#\x00', 0x0, 0x2) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f00008b1000)) write$evdev(r0, &(0x7f0000057fa0)=[{{}, 0x0, 0x100000001}, {}], 0x30) 2018/02/26 09:29:03 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000087000)=0x5, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f000039cfe4)={0xa, 0x2, 0x0, @empty}, 0x1c) listen(r2, 0x0) sendto$inet6(r0, &(0x7f000037c000), 0x0, 0x20000004, &(0x7f0000b23000)={0xa, 0x2, 0x0, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x0, 0xbb}}}, 0x1c) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000000)) sendto(r0, &(0x7f0000f1df23), 0xd3819432a973de7a, 0x0, &(0x7f000044dff0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff, 0xbb}}, 0x10) 2018/02/26 09:29:03 executing program 4: r0 = memfd_create(&(0x7f0000000000)='ppp1\x00', 0x0) ftruncate(r0, 0xffff) write(r0, &(0x7f00007fbffd)='H', 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) quotactl(0x0, &(0x7f0000001000)='./file0\x00', 0x0, &(0x7f0000000f7b)) 2018/02/26 09:29:03 executing program 5: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000054ff3)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) write$sndseq(r2, &(0x7f00000000c0)=[{0xfffffffffffffeff, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0x38) 2018/02/26 09:29:03 executing program 6: perf_event_open(&(0x7f0000aaa000)={0x0, 0x78}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00000cc000/0x4000)=nil) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(0xffffffffffffffff, 0x84, 0x1c, &(0x7f0000000100), &(0x7f0000000140)=0x4) madvise(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x3) 2018/02/26 09:29:03 executing program 1: r0 = gettid() exit(0x0) sched_getscheduler(r0) 2018/02/26 09:29:03 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000e09000)=@hopopts={0x0, 0x3, [], [@calipso={0x7, 0x8, {0x0, 0x0, 0x0, 0x0, []}}, @hao={0xc9, 0x10, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}]}, 0x28) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000bfd000)=@routing={0x0, 0x0, 0x0, 0x0, 0x0, []}, 0x8) syzkaller login: [ 29.978771] audit: type=1400 audit(1519637343.378:5): avc: denied { sys_admin } for pid=3854 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 30.006942] IPVS: Creating netns size=2536 id=1 [ 30.024453] audit: type=1400 audit(1519637343.428:6): avc: denied { net_admin } for pid=3856 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 30.079624] IPVS: Creating netns size=2536 id=2 [ 30.118666] IPVS: Creating netns size=2536 id=3 [ 30.162822] IPVS: Creating netns size=2536 id=4 [ 30.204503] IPVS: Creating netns size=2536 id=5 [ 30.263604] IPVS: Creating netns size=2536 id=6 [ 30.321852] IPVS: Creating netns size=2536 id=7 [ 30.381970] IPVS: Creating netns size=2536 id=8 [ 32.422617] audit: type=1400 audit(1519637345.828:7): avc: denied { sys_chroot } for pid=3856 comm="syz-executor3" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 32.745973] audit: type=1400 audit(1519637346.148:8): avc: denied { dac_override } for pid=5146 comm="syz-executor0" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 32.827731] TCP: request_sock_TCP: Possible SYN flooding on port 20030. Sending cookies. Check SNMP counters. 2018/02/26 09:29:06 executing program 0: r0 = socket(0x20000000000000a, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0xca, &(0x7f0000c2d000), 0x0) 2018/02/26 09:29:06 executing program 6: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) sendmsg$netlink(r0, &(0x7f000008e000)={0x0, 0x0, &(0x7f000070f000)=[{&(0x7f0000fd0e9c)={0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, "", []}, 0x10}], 0x1}, 0x0) 2018/02/26 09:29:06 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f000069c000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000b18000)={{0x5}}) 2018/02/26 09:29:06 executing program 5: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000054ff3)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) write$sndseq(r2, &(0x7f00000000c0)=[{0xfffffffffffffeff, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0x38) 2018/02/26 09:29:06 executing program 4: r0 = socket(0x18, 0x0, 0x1) connect(r0, &(0x7f0000000000)=@sco={0x1f, {0x1}}, 0x8) 2018/02/26 09:29:06 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000950000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r0, &(0x7f0000039fff)=""/1, 0x1) setsockopt$sock_int(r0, 0x1, 0x2a, &(0x7f000002e000), 0x4) write(r1, &(0x7f0000859f06), 0x0) 2018/02/26 09:29:06 executing program 2: capset(&(0x7f00001b4ff8)={0x19980330}, &(0x7f0000d6afe8)) r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f000013b000)=[{&(0x7f0000559f24)="580000001400192340834b80040d8c560206f8ff000400000000000000005800004824ca944f64009400050028825a003b7dbe907902008000f0fffefffffe03ed03fff5dd00000010000100000c0900fcff4d00040e05a5", 0x58}], 0x1) 2018/02/26 09:29:06 executing program 3: futex(&(0x7f000000cffc), 0x800000000005, 0x0, &(0x7f0000920000)={0x0, 0xfffffffffffffffc}, &(0x7f0000d58ffc), 0x3fffffd) [ 32.902156] audit: type=1400 audit(1519637346.308:9): avc: denied { net_raw } for pid=5204 comm="syz-executor2" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/02/26 09:29:06 executing program 4: mkdir(&(0x7f0000e29000)='./file0\x00', 0x0) creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f000011dff2)='./file0/file0\x00', &(0x7f0000917000)='./file0/file0\x00', &(0x7f0000467000)='xfs\x00', 0x1000, 0x0) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00002faff8)='./file0/file0\x00', &(0x7f0000239000)='\x00v\t', 0x260400, &(0x7f0000a06000)) 2018/02/26 09:29:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001b4ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}) 2018/02/26 09:29:06 executing program 7: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00002a4ff8)=@abs={0x1}, 0x8) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b"}, 0xc) 2018/02/26 09:29:06 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) ioctl$sock_netrom_SIOCADDRT(r0, 0x80089203, &(0x7f0000e46ffc)) 2018/02/26 09:29:06 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, &(0x7f0000000340)={0x0, r1+10000000}, &(0x7f0000000380), 0x8) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @tid}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x15) 2018/02/26 09:29:06 executing program 5: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000054ff3)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) write$sndseq(r2, &(0x7f00000000c0)=[{0xfffffffffffffeff, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0x38) 2018/02/26 09:29:06 executing program 6: r0 = socket(0x11, 0x803, 0x8000) bind$packet(r0, &(0x7f000098f000)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @random="06004ee72211"}, 0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000000)={0x0, @in={{0x2, 0xffffffffffffffff, @empty}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff]}, &(0x7f0000000140)=0x108) 2018/02/26 09:29:06 executing program 2: r0 = socket$inet6(0xa, 0x400000000002, 0x0) connect$inet6(r0, &(0x7f0000aa8fe4)={0xa, 0xffffffffffffffff, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff, 0xaa}, 0x4}, 0x1c) r1 = dup(r0) r2 = open(&(0x7f0000545ff8)='./file0\x00', 0x141042, 0x0) ftruncate(r2, 0xffff) sendfile(r1, r2, &(0x7f0000d83ff8), 0x8000fffffffe) 2018/02/26 09:29:06 executing program 1: mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r0 = eventfd2(0x0, 0x0) writev(r0, &(0x7f0000000fff)=[{&(0x7f0000006000)}], 0x1) 2018/02/26 09:29:06 executing program 5: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000054ff3)='/dev/snd/seq\x00', 0x0, 0x2) r2 = dup2(r1, r0) write$sndseq(r2, &(0x7f00000000c0)=[{0xfffffffffffffeff, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0x38) 2018/02/26 09:29:06 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4, &(0x7f0000f7b000)=0xfffffffffffffffe, 0x4) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000f72ffc)=0x621c, 0x4) sendto$inet6(r0, &(0x7f0000f72fcf), 0x0, 0x0, &(0x7f0000f5afe4)={0xa, 0x0, 0x0, @empty}, 0x1c) recvfrom$inet6(r0, &(0x7f000067df0a)=""/246, 0x11, 0x23fffd, 0x0, 0x0) [ 32.975552] capability: warning: `syz-executor2' uses 32-bit capabilities (legacy support in use) 2018/02/26 09:29:06 executing program 7: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00002a4ff8)=@abs={0x1}, 0x8) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b"}, 0xc) 2018/02/26 09:29:06 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000421000)='/dev/vga_arbiter\x00', 0x20000001, 0x0) write(r0, &(0x7f0000000000), 0xfffd) 2018/02/26 09:29:06 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x14, &(0x7f0000af8ffc)=0x43, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f000070f000)={@common='tunl0\x00', 0x0}) sendto$packet(r0, &(0x7f0000aa7000), 0x0, 0x0, &(0x7f0000fef000)={0x11, 0x10000000000800, r1, 0x1, 0x0, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa]}}, 0x14) 2018/02/26 09:29:06 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) ioctl$sock_netrom_SIOCADDRT(r0, 0x80089203, &(0x7f0000e46ffc)) 2018/02/26 09:29:06 executing program 2: sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000e46eb0)=[{&(0x7f0000620000)=@in6={0xa, 0xffffffffffffffff, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000bf2f90)=[{&(0x7f000080e000)="33f2aed82749e1139ac9f3cee19d9cba8e1d57d37dd7f0c91ef7642663c7e90cd0e2d7c251db4a269653b12479199d6abb94d03f9b3cad880bfbd79cd65d769a7bd8998d8058c6b8cfda224388442f1dce45f7d0d11d004adbe5449a2d5c", 0x5e}], 0x1, &(0x7f000066b000)=[]}], 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0xffffffffffffffff, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, {0x2000000000000011, 0x0, 0xffffff03, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in=@dev={0xac, 0x14}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}}]}, 0xa0}, 0x1}, 0x0) 2018/02/26 09:29:06 executing program 7: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00002a4ff8)=@abs={0x1}, 0x8) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b"}, 0xc) 2018/02/26 09:29:06 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000080)=0x5, 0x4) 2018/02/26 09:29:06 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000232000)={@syzn={0x73, 0x79, 0x7a, 0x0}, 0x0}) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f000008c000)=0x8, 0x4) sendto$packet(r0, &(0x7f0000238f6b)="990100008d06000000000000001000d7004f6f3bcb000000061b4453180900000006e3ad74cf3a7791029ddd52faffff", 0x30, 0x0, &(0x7f0000000000)={0x11, 0x800, r1, 0x1, 0x0, 0x6, @remote={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff, 0xbb}}, 0x14) 2018/02/26 09:29:06 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) ioctl$sock_netrom_SIOCADDRT(r0, 0x80089203, &(0x7f0000e46ffc)) 2018/02/26 09:29:06 executing program 7: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00002a4ff8)=@abs={0x1}, 0x8) bind$unix(r0, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b"}, 0xc) 2018/02/26 09:29:06 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f000014a000)='/dev/usbmon#\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) ioctl$sock_netrom_SIOCADDRT(r0, 0x80089203, &(0x7f0000e46ffc)) 2018/02/26 09:29:06 executing program 4: r0 = open$dir(&(0x7f00004cf000)='./file0\x00', 0x40, 0x0) ftruncate(r0, 0x0) 2018/02/26 09:29:06 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, &(0x7f0000000340)={0x0, r1+10000000}, &(0x7f0000000380), 0x8) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @tid}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x15) 2018/02/26 09:29:06 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2000001, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000ffc)=@srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, []}, 0x8) 2018/02/26 09:29:06 executing program 5: r0 = memfd_create(&(0x7f0000000fcd)=':)-\x00', 0x3) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x0, 0x4011, r0, 0x0) fcntl$addseals(r0, 0x409, 0xa) 2018/02/26 09:29:06 executing program 2: sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000e46eb0)=[{&(0x7f0000620000)=@in6={0xa, 0xffffffffffffffff, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000bf2f90)=[{&(0x7f000080e000)="33f2aed82749e1139ac9f3cee19d9cba8e1d57d37dd7f0c91ef7642663c7e90cd0e2d7c251db4a269653b12479199d6abb94d03f9b3cad880bfbd79cd65d769a7bd8998d8058c6b8cfda224388442f1dce45f7d0d11d004adbe5449a2d5c", 0x5e}], 0x1, &(0x7f000066b000)=[]}], 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0xffffffffffffffff, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, {0x2000000000000011, 0x0, 0xffffff03, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in=@dev={0xac, 0x14}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}}]}, 0xa0}, 0x1}, 0x0) 2018/02/26 09:29:06 executing program 6: r0 = socket(0x11, 0x803, 0x8000) bind$packet(r0, &(0x7f000098f000)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @random="06004ee72211"}, 0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000000)={0x0, @in={{0x2, 0xffffffffffffffff, @empty}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff]}, &(0x7f0000000140)=0x108) 2018/02/26 09:29:06 executing program 4: r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000fe9)='/selinux/validatetrans\x00', 0x1, 0x0) r1 = dup2(r0, r0) munmap(&(0x7f0000000000/0x2000)=nil, 0x2000) write$selinux_validatetrans(r1, &(0x7f0000000000)={'system_u:object_r:adjtime_t:s0', 0x20, 'system_u:object_r:getty_var_run_t:s0', 0x20, 0x0, 0x0, 0x20, 'unconfined\x00'}, 0x28) 2018/02/26 09:29:06 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000003ff4)={0x1}) epoll_wait(r1, &(0x7f0000fd6fb8)=[{}], 0x1, 0x0) 2018/02/26 09:29:06 executing program 7: mkdir(&(0x7f0000bdb000)='./file0\x00', 0x0) r0 = syz_fuse_mount(&(0x7f0000f24000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000015ff4)='./file0/bus\x00', 0x0) writev(r1, &(0x7f0000017000)=[{&(0x7f0000a0df7a)='?', 0x1}], 0x1) r2 = open(&(0x7f0000002000)='./file0/bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f00000ee000), 0x1) 2018/02/26 09:29:06 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@kern={0x10}, 0xc, &(0x7f0000002000)=[{&(0x7f0000b4efab)="5500000018007fafb7a41cb22da280000206000000a843096c37236939000900210908004b00ca8a9848a3090000006b7b31afdc1338d54400009b84136ef75afb83de4411006827c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000004000)=[]}, 0x0) 2018/02/26 09:29:06 executing program 7: mkdir(&(0x7f0000bdb000)='./file0\x00', 0x0) r0 = syz_fuse_mount(&(0x7f0000f24000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000015ff4)='./file0/bus\x00', 0x0) writev(r1, &(0x7f0000017000)=[{&(0x7f0000a0df7a)='?', 0x1}], 0x1) r2 = open(&(0x7f0000002000)='./file0/bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f00000ee000), 0x1) 2018/02/26 09:29:06 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0xffffffffffffffff, 0x0, @empty}, 0x1c) sendmsg(r0, &(0x7f0000001500)={&(0x7f0000000000)=@in6={0xa, 0x1, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}, 0x1c, &(0x7f0000000100)=[], 0x0, &(0x7f0000000140)=[]}, 0x0) 2018/02/26 09:29:06 executing program 3: mmap(&(0x7f0000000000/0xfd5000)=nil, 0xfd5000, 0x300000c, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x938000)=nil, 0x938000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000ff4)='/dev/rfkill\x00', 0x2, 0x0) write$evdev(r0, &(0x7f0000ef7f88)=[{}], 0x18) 2018/02/26 09:29:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) [ 33.210676] audit: type=1400 audit(1519637346.608:10): avc: denied { validate_trans } for pid=5292 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=security permissive=1 2018/02/26 09:29:06 executing program 7: mkdir(&(0x7f0000bdb000)='./file0\x00', 0x0) r0 = syz_fuse_mount(&(0x7f0000f24000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000015ff4)='./file0/bus\x00', 0x0) writev(r1, &(0x7f0000017000)=[{&(0x7f0000a0df7a)='?', 0x1}], 0x1) r2 = open(&(0x7f0000002000)='./file0/bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f00000ee000), 0x1) 2018/02/26 09:29:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0xf, &(0x7f0000f1d000)=0xfffffffffffffffb, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}, 0x4}, 0x1c) 2018/02/26 09:29:06 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000014000)={0x0, 0x0, &(0x7f0000003000)=[{&(0x7f0000004fdb)="240000001200fffffffefd956fa283b72400008000000000000000683540000004000300", 0x24}], 0x1}, 0x0) 2018/02/26 09:29:06 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffb) 2018/02/26 09:29:06 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, &(0x7f0000000340)={0x0, r1+10000000}, &(0x7f0000000380), 0x8) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @tid}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x15) 2018/02/26 09:29:06 executing program 2: sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000e46eb0)=[{&(0x7f0000620000)=@in6={0xa, 0xffffffffffffffff, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000bf2f90)=[{&(0x7f000080e000)="33f2aed82749e1139ac9f3cee19d9cba8e1d57d37dd7f0c91ef7642663c7e90cd0e2d7c251db4a269653b12479199d6abb94d03f9b3cad880bfbd79cd65d769a7bd8998d8058c6b8cfda224388442f1dce45f7d0d11d004adbe5449a2d5c", 0x5e}], 0x1, &(0x7f000066b000)=[]}], 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0xffffffffffffffff, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, {0x2000000000000011, 0x0, 0xffffff03, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in=@dev={0xac, 0x14}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}}]}, 0xa0}, 0x1}, 0x0) 2018/02/26 09:29:06 executing program 6: r0 = socket(0x11, 0x803, 0x8000) bind$packet(r0, &(0x7f000098f000)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @random="06004ee72211"}, 0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000000)={0x0, @in={{0x2, 0xffffffffffffffff, @empty}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff]}, &(0x7f0000000140)=0x108) 2018/02/26 09:29:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) 2018/02/26 09:29:06 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00002bd000)={@syzn={0x73, 0x79, 0x7a, 0x0}, &(0x7f000080f000)=@ethtool_cmd={0x48}}) 2018/02/26 09:29:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) 2018/02/26 09:29:06 executing program 7: mkdir(&(0x7f0000bdb000)='./file0\x00', 0x0) r0 = syz_fuse_mount(&(0x7f0000f24000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000015ff4)='./file0/bus\x00', 0x0) writev(r1, &(0x7f0000017000)=[{&(0x7f0000a0df7a)='?', 0x1}], 0x1) r2 = open(&(0x7f0000002000)='./file0/bus\x00', 0x0, 0x0) sendfile(r0, r2, &(0x7f00000ee000), 0x1) 2018/02/26 09:29:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) 2018/02/26 09:29:06 executing program 4: eventfd2(0x0, 0x0) 2018/02/26 09:29:06 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000a80000)={@local={0xfe, 0x80, [], 0xffffffffffffffff, 0xaa}}, 0x20) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000cd6000)={@remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}, 0x14) r2 = syz_open_procfs(0x0, &(0x7f0000787ff3)='net/anycast6\x00') preadv(r2, &(0x7f0000477ff0)=[{&(0x7f0000e56000)=""/122, 0x7a}], 0x1, 0x40000000004) 2018/02/26 09:29:06 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000ee3fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x401) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) r2 = gettid() socketpair$unix(0x1, 0x80000000000001, 0x0, &(0x7f0000e18ff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f000005b000)=0x3) fcntl$setown(r3, 0x8, r2) readv(r4, &(0x7f0000e8f000)=[{&(0x7f0000fb6f9c)=""/25, 0x19}], 0x1) fcntl$setsig(r3, 0xa, 0x12) readv(r4, &(0x7f0000fa4000)=[{&(0x7f0000fa4f72)=""/1, 0x1}], 0x1) dup2(r3, r4) write$evdev(r1, &(0x7f0000bee000)=[], 0x0) tkill(r2, 0x16) 2018/02/26 09:29:07 executing program 4: socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000204ff4)={0x4000000e}) ppoll(&(0x7f00004b0fc0)=[{r1}], 0x1, &(0x7f0000ff9000)={0x0, 0x989680}, &(0x7f0000ae8ff8), 0x8) 2018/02/26 09:29:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_opts(r0, 0x0, 0x20000000050, &(0x7f0000790ff0)=""/16, &(0x7f00004d1000)=0x10) 2018/02/26 09:29:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x4) getsockopt(r0, 0x6, 0x2, &(0x7f000028bf0c)=""/244, &(0x7f0000c19ffc)=0xf4) 2018/02/26 09:29:07 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000dc7fdb)=""/37, &(0x7f0000356ffc)=0x25) 2018/02/26 09:29:07 executing program 2: sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000e46eb0)=[{&(0x7f0000620000)=@in6={0xa, 0xffffffffffffffff, 0x0, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c, &(0x7f0000bf2f90)=[{&(0x7f000080e000)="33f2aed82749e1139ac9f3cee19d9cba8e1d57d37dd7f0c91ef7642663c7e90cd0e2d7c251db4a269653b12479199d6abb94d03f9b3cad880bfbd79cd65d769a7bd8998d8058c6b8cfda224388442f1dce45f7d0d11d004adbe5449a2d5c", 0x5e}], 0x1, &(0x7f000066b000)=[]}], 0x1, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f000080e000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0xffffffffffffffff, 0x0, @empty}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0xffffffffffffffff, 0x0, {0x2000000000000011, 0x0, 0xffffff03, 0x0, 0x0, 0x0, 0x0, @in=@remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}, @in=@dev={0xac, 0x14}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}}}]}, 0xa0}, 0x1}, 0x0) 2018/02/26 09:29:07 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) ppoll(&(0x7f00000002c0)=[{r0}], 0x1, &(0x7f0000000340)={0x0, r1+10000000}, &(0x7f0000000380), 0x8) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @tid}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) tkill(r2, 0x15) 2018/02/26 09:29:07 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000ee3fe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x401) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000013000)) r2 = gettid() socketpair$unix(0x1, 0x80000000000001, 0x0, &(0x7f0000e18ff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r3, 0x5452, &(0x7f000005b000)=0x3) fcntl$setown(r3, 0x8, r2) readv(r4, &(0x7f0000e8f000)=[{&(0x7f0000fb6f9c)=""/25, 0x19}], 0x1) fcntl$setsig(r3, 0xa, 0x12) readv(r4, &(0x7f0000fa4000)=[{&(0x7f0000fa4f72)=""/1, 0x1}], 0x1) dup2(r3, r4) write$evdev(r1, &(0x7f0000bee000)=[], 0x0) tkill(r2, 0x16) 2018/02/26 09:29:07 executing program 6: madvise(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x10) madvise(&(0x7f0000008000/0x3000)=nil, 0x3000, 0x10) 2018/02/26 09:29:07 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000290000)=0x1, 0x4) bind$inet(r0, &(0x7f000012e000)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x3, @empty}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0xffffffffffffffff, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmmsg(r0, &(0x7f00001c1000)=[{{&(0x7f0000874000)=@can={0x1d}, 0x10, &(0x7f0000dc4000)=[{&(0x7f00004e0f41)="7f", 0x1}], 0x1}}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000c7afe0)={@common='ip_vti0\x00', @ifru_addrs={0x2, 0x2, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f00007cc000)={0x2, 0x0, 0x0, 0x0, 0x1b, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, [@sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0xffffffffffffffff, @empty}, @in={0x2, 0xffffffffffffffff, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}, @sadb_x_sec_ctx={0x14, 0x18, 0x0, 0x0, 0x91, "76cbd5f680433059c2b551abea6d36bf507cea6489c34add75bcef1822ef862dab9094673d3270d0fb0e6c05dc68a1f1819ae9b0edde85c586dadc0c6678d0f8013d316eaf1ec51fa894fbff145df65233a0dc9bc66694bae49129ca8aa1b5b3efc96e363b4eeadf2f7c99d42b2dc9d4107cbd93e9ae2fbceef6e98f5a53aba6d069ab3e4d7e8277ed67a524c85e9c4c5d"}]}, 0xd8}, 0x1}, 0x0) write$selinux_context(r1, &(0x7f0000d30000)='system_u:object_r:sound_device_t:s0\x00', 0x24) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$key(r1, &(0x7f0000351000)={0x0, 0x0, &(0x7f0000886000)={&(0x7f0000dd7099)={0x2, 0x0, 0x0, 0x0, 0x56, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, []}, 0x98}, 0x1}, 0x40001) recvfrom$inet6(r1, &(0x7f000034e000)=""/239, 0xef, 0x100, &(0x7f0000276fe4)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}, 0x1c) shutdown(r1, 0x1) 2018/02/26 09:29:07 executing program 1: mmap(&(0x7f000053b000/0x2000)=nil, 0x2000, 0x1000004, 0x40000002871, 0xffffffffffffffff, 0x0) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f00000cc000/0x4000)=nil) mremap(&(0x7f000053c000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f00000cd000/0x2000)=nil) 2018/02/26 09:29:07 executing program 4: socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000204ff4)={0x4000000e}) ppoll(&(0x7f00004b0fc0)=[{r1}], 0x1, &(0x7f0000ff9000)={0x0, 0x989680}, &(0x7f0000ae8ff8), 0x8) 2018/02/26 09:29:07 executing program 1: r0 = add_key$keyring(&(0x7f00002d2000)='keyring\x00', &(0x7f00008d65c3)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000676ff8)='keyring\x00', &(0x7f000064b000)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000e5e000)='keyring\x00', &(0x7f00004a2000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) keyctl$link(0x8, r0, r2) 2018/02/26 09:29:07 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x9) close(r0) 2018/02/26 09:29:07 executing program 4: socketpair$unix(0x1, 0x40000000003, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000204ff4)={0x4000000e}) ppoll(&(0x7f00004b0fc0)=[{r1}], 0x1, &(0x7f0000ff9000)={0x0, 0x989680}, &(0x7f0000ae8ff8), 0x8) 2018/02/26 09:29:07 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) r1 = dup(r0) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000290000)=0x1, 0x4) bind$inet(r0, &(0x7f000012e000)={0x2, 0x3, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) connect$inet(r0, &(0x7f0000987000)={0x2, 0x3, @empty}, 0x10) sendto$inet(r1, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0xffffffffffffffff, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmmsg(r0, &(0x7f00001c1000)=[{{&(0x7f0000874000)=@can={0x1d}, 0x10, &(0x7f0000dc4000)=[{&(0x7f00004e0f41)="7f", 0x1}], 0x1}}], 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000c7afe0)={@common='ip_vti0\x00', @ifru_addrs={0x2, 0x2, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}}) sendmsg$key(r1, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f00007cc000)={0x2, 0x0, 0x0, 0x0, 0x1b, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, [@sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0xffffffffffffffff, @empty}, @in={0x2, 0xffffffffffffffff, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}, @sadb_x_sec_ctx={0x14, 0x18, 0x0, 0x0, 0x91, "76cbd5f680433059c2b551abea6d36bf507cea6489c34add75bcef1822ef862dab9094673d3270d0fb0e6c05dc68a1f1819ae9b0edde85c586dadc0c6678d0f8013d316eaf1ec51fa894fbff145df65233a0dc9bc66694bae49129ca8aa1b5b3efc96e363b4eeadf2f7c99d42b2dc9d4107cbd93e9ae2fbceef6e98f5a53aba6d069ab3e4d7e8277ed67a524c85e9c4c5d"}]}, 0xd8}, 0x1}, 0x0) write$selinux_context(r1, &(0x7f0000d30000)='system_u:object_r:sound_device_t:s0\x00', 0x24) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$key(r1, &(0x7f0000351000)={0x0, 0x0, &(0x7f0000886000)={&(0x7f0000dd7099)={0x2, 0x0, 0x0, 0x0, 0x56, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, []}, 0x98}, 0x1}, 0x40001) recvfrom$inet6(r1, &(0x7f000034e000)=""/239, 0xef, 0x100, &(0x7f0000276fe4)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}}, 0x1c) shutdown(r1, 0x1) 2018/02/26 09:29:07 executing program 0: r0 = syz_open_dev$tun(&(0x7f0000124ff3)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={@common='vcan0\x00', @ifru_map={0x2}}) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000001c0)="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", 0x14f) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000300)={0x1, &(0x7f0000000080)=[{}]}) 2018/02/26 09:29:07 executing program 1: r0 = add_key$keyring(&(0x7f00002d2000)='keyring\x00', &(0x7f00008d65c3)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000676ff8)='keyring\x00', &(0x7f000064b000)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r2 = add_key(&(0x7f0000e5e000)='keyring\x00', &(0x7f00004a2000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) keyctl$link(0x8, r0, r2) INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes [ 206.971654] random: crng init done [ 244.950953] INFO: task syz-executor5:5368 blocked for more than 120 seconds. [ 244.958201] Not tainted 4.9.84-ga9d0273 #52 [ 244.963471] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 244.971461] syz-executor5 D29808 5368 3867 0x20020004 [ 244.977331] ffff8801b39a4800 ffff8801bcbacfc0 ffff8801bcbad500 ffff8801b05e4800 [ 244.985681] ffff8801db221b98 ffff8801b05c7a68 ffffffff838a438b ffff8801b39a4800 [ 244.993677] ffffffff8114529a 00fffc0000000000 ffff8801db222468 ffff8801db222490 [ 245.001663] Call Trace: [ 245.004231] [] ? __schedule+0x67b/0x1ba0 [ 245.009913] [] ? __local_bh_enable_ip+0x6a/0xd0 [ 245.016219] [] schedule+0x7f/0x1b0 [ 245.021390] [] __lock_sock+0x13c/0x260 [ 245.026897] [] ? proto_unregister+0x370/0x370 [ 245.033029] [] ? prepare_to_wait_event+0x450/0x450 [ 245.039577] [] lock_sock_nested+0xf6/0x120 [ 245.045463] [] getorigdst+0xac/0x480 [ 245.050807] [] ? ipv4_print_tuple+0x30/0x30 [ 245.057704] [] ? __ww_mutex_lock+0x14a0/0x14a0 [ 245.063925] [] ? mutex_unlock+0x9/0x10 [ 245.069434] [] ? nf_sockopt_find.constprop.0+0x1a7/0x220 [ 245.076666] [] compat_nf_getsockopt+0xfd/0x130 [ 245.082906] [] compat_ip_getsockopt+0x17c/0x1d0 [ 245.089196] [] ? ip_getsockopt+0x1a0/0x1a0 [ 245.095073] [] ? check_preemption_disabled+0x3b/0x200 [ 245.101894] [] inet_csk_compat_getsockopt+0x95/0x120 [ 245.108622] [] ? ip_getsockopt+0x1a0/0x1a0 [ 245.114877] [] compat_tcp_getsockopt+0x3d/0x70 [ 245.121102] [] compat_sock_common_getsockopt+0xb2/0x140 [ 245.128086] [] ? tcp_getsockopt+0xd0/0xd0 [ 245.133888] [] compat_SyS_getsockopt+0x14f/0x2a0 [ 245.140264] [] ? sock_common_getsockopt+0xd0/0xd0 [ 245.146749] [] ? compat_SyS_setsockopt+0x290/0x290 [ 245.153310] [] ? compat_SyS_ioctl+0x8c/0x2050 [ 245.159429] [] ? do_fast_syscall_32+0xcf/0x870 [ 245.165648] [] ? compat_SyS_setsockopt+0x290/0x290 [ 245.172218] [] do_fast_syscall_32+0x2f5/0x870 [ 245.178334] [] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 245.185155] [] entry_SYSENTER_compat+0x90/0xa2 [ 245.191376] [ 245.191376] Showing all locks held in the system: [ 245.197677] 2 locks held by khungtaskd/514: [ 245.201995] #0: (rcu_read_lock){......}, at: [] watchdog+0x125/0xa70 [ 245.210690] #1: (tasklist_lock){.+.+..}, at: [] debug_show_all_locks+0x70/0x280 [ 245.220373] 1 lock held by rsyslogd/3643: [ 245.224503] #0: (&f->f_pos_lock){+.+.+.}, at: [] __fdget_pos+0x9f/0xc0 [ 245.233373] 2 locks held by getty/3772: [ 245.237319] #0: (&tty->ldisc_sem){++++++}, at: [] ldsem_down_read+0x32/0x40 [ 245.246731] #1: (&ldata->atomic_read_lock){+.+...}, at: [] n_tty_read+0x1f4/0x16c0 [ 245.256659] 1 lock held by syz-executor5/5368: [ 245.261226] #0: (sk_lock-AF_INET){+.+.+.}, at: [] compat_ip_getsockopt+0x166/0x1d0 [ 245.271139] [ 245.272736] ============================================= [ 245.272736] [ 245.280047] NMI backtrace for cpu 1 [ 245.283662] CPU: 1 PID: 514 Comm: khungtaskd Not tainted 4.9.84-ga9d0273 #52 [ 245.290817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.300141] ffff8801d874fd00 ffffffff81d956b9 0000000000000000 0000000000000001 [ 245.308117] 0000000000000001 0000000000000001 ffffffff810bb190 ffff8801d874fd38 [ 245.316104] ffffffff81da07dd 0000000000000001 0000000000000000 ffff8801b0598418 [ 245.324086] Call Trace: [ 245.326645] [] dump_stack+0xc1/0x128 [ 245.331980] [] ? irq_force_complete_move+0x390/0x390 [ 245.338702] [] nmi_cpu_backtrace+0xfd/0x120 [ 245.344643] [] ? irq_force_complete_move+0x390/0x390 [ 245.351385] [] nmi_trigger_cpumask_backtrace+0x117/0x190 [ 245.358451] [] arch_trigger_cpumask_backtrace+0x14/0x20 [ 245.365436] [] watchdog+0x6f0/0xa70 [ 245.370691] [] ? watchdog+0x125/0xa70 [ 245.376121] [] kthread+0x26d/0x300 [ 245.381279] [] ? reset_hung_task_detector+0x20/0x20 [ 245.387914] [] ? kthread_park+0xa0/0xa0 [ 245.393507] [] ? kthread_park+0xa0/0xa0 [ 245.399098] [] ? kthread_park+0xa0/0xa0 [ 245.404701] [] ret_from_fork+0x5c/0x70 [ 245.410371] Sending NMI from CPU 1 to CPUs 0: [ 245.414890] NMI backtrace for cpu 0 skipped: idling at pc 0xffffffff838b4076 [ 245.422608] Kernel panic - not syncing: hung_task: blocked tasks [ 245.428736] CPU: 1 PID: 514 Comm: khungtaskd Not tainted 4.9.84-ga9d0273 #52 [ 245.435888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 245.445222] ffff8801d874fcb8 ffffffff81d956b9 ffffffff83a8b2a0 ffff8801d874fd90 [ 245.453196] ffff8801b0598400 dffffc0000000000 ffffffff84409000 ffff8801d874fd80 [ 245.461177] ffffffff8142f571 0000000041b58ab3 ffffffff8418b2c0 ffffffff8142f3b5 [ 245.469151] Call Trace: [ 245.471710] [] dump_stack+0xc1/0x128 [ 245.477044] [] panic+0x1bc/0x3a8 [ 245.482030] [] ? percpu_up_read_preempt_enable.constprop.53+0xd7/0xd7 [ 245.490238] [] ? nmi_trigger_cpumask_backtrace+0x13b/0x190 [ 245.497481] [] ? nmi_trigger_cpumask_backtrace+0x145/0x190 [ 245.504725] [] watchdog+0x701/0xa70 [ 245.509969] [] ? watchdog+0x125/0xa70 [ 245.515386] [] kthread+0x26d/0x300 [ 245.520562] [] ? reset_hung_task_detector+0x20/0x20 [ 245.527199] [] ? kthread_park+0xa0/0xa0 [ 245.532791] [] ? kthread_park+0xa0/0xa0 [ 245.538392] [] ? kthread_park+0xa0/0xa0 [ 245.543995] [] ret_from_fork+0x5c/0x70 [ 245.550068] Dumping ftrace buffer: [ 245.553620] (ftrace buffer empty) [ 245.557301] Kernel Offset: disabled [ 245.560914] Rebooting in 86400 seconds..