{&(0x7f0000000d40)=""/94, 0x5e}, {&(0x7f0000000dc0)=""/5, 0x5}, {&(0x7f0000000e00)=""/143, 0x8f}, {&(0x7f0000000ec0)=""/250, 0xfa}], 0x5, &(0x7f0000001040)=""/147, 0x93, 0x8102}, 0x5}, {{&(0x7f0000001100)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000003700)=[{&(0x7f0000001180)=""/209, 0xd1}, {&(0x7f0000001280)=""/4096, 0x1000}, {&(0x7f0000002280)=""/239, 0xef}, {&(0x7f0000002380)=""/236, 0xec}, {&(0x7f0000002480)=""/2, 0x2}, {&(0x7f00000024c0)=""/87, 0x57}, {&(0x7f0000002540)=""/140, 0x8c}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000003600)=""/200, 0xc8}], 0x9, &(0x7f00000037c0)=""/118, 0x76, 0x6bac}, 0x80000001}], 0x5, 0x12000, &(0x7f0000003980)) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r0, 0x80045301, &(0x7f00000000c0)) [ 111.006245] sctp: [Deprecated]: syz-executor2 (pid 7919) Use of struct sctp_assoc_value in delayed_ack socket option. [ 111.006245] Use struct sctp_sack_info instead 2018/04/22 09:00:55 executing program 4: pipe(&(0x7f0000035ff8)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f00005dfffa)='./bus\x00', 0x0) dup3(r1, r0, 0x0) poll(&(0x7f0000000100), 0x200000000000020d, 0x1) [ 111.103822] sctp: [Deprecated]: syz-executor2 (pid 7946) Use of struct sctp_assoc_value in delayed_ack socket option. [ 111.103822] Use struct sctp_sack_info instead [ 111.147258] FAULT_INJECTION: forcing a failure. [ 111.147258] name failslab, interval 1, probability 0, space 0, times 0 [ 111.158670] CPU: 1 PID: 7945 Comm: syz-executor3 Not tainted 4.16.0+ #85 [ 111.165532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.174911] Call Trace: [ 111.177552] dump_stack+0x185/0x1d0 [ 111.181237] should_fail+0x87b/0xab0 [ 111.185055] should_failslab+0x279/0x2a0 [ 111.189190] __kmalloc+0xc2/0x350 [ 111.192691] ? mpi_alloc+0x58/0x290 2018/04/22 09:00:55 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000b92000)='smaps\x00') mlock(&(0x7f0000d09000/0x3000)=nil, 0x3000) readv(r0, &(0x7f00009a5f80)=[{&(0x7f0000214000)=""/4096, 0x12b0}], 0x1) readv(r0, &(0x7f0000dc8ff8)=[{&(0x7f0000000000)=""/4096, 0x1000}], 0x1) [ 111.196368] mpi_alloc+0x58/0x290 [ 111.199954] ? dh_compute_value+0x3f/0x5f0 [ 111.204235] dh_compute_value+0x8b/0x5f0 [ 111.208380] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 111.213905] ? dh_set_secret+0x620/0x620 [ 111.218036] ? dh_set_secret+0x620/0x620 [ 111.222172] __keyctl_dh_compute+0x158a/0x1ef0 [ 111.226853] keyctl_dh_compute+0x22e/0x260 [ 111.231139] ? SyS_keyctl+0x76/0xa0 [ 111.234802] SYSC_keyctl+0xd31/0x1830 [ 111.238706] ? syscall_return_slowpath+0xe9/0x700 [ 111.243610] ? fput+0x25c/0x2e0 [ 111.246970] ? SYSC_write+0x2f0/0x360 [ 111.250850] SyS_keyctl+0x76/0xa0 [ 111.254390] do_syscall_64+0x309/0x430 [ 111.258327] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 111.263304] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 111.268801] RIP: 0033:0x455389 [ 111.272029] RSP: 002b:00007f2125a61c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 111.279779] RAX: ffffffffffffffda RBX: 00007f2125a626d4 RCX: 0000000000455389 [ 111.287076] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 111.294366] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 111.301657] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 111.308951] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000010 [ 111.363245] device bridge0 left promiscuous mode 2018/04/22 09:00:55 executing program 7: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000949fe8)={0xaa}) r1 = memfd_create(&(0x7f000003affa)="706f73fb00000000000000566f6573737b0000", 0x0) pwrite64(r1, &(0x7f0000000000)="c7", 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r1, 0x0) socketpair(0x2, 0x5, 0x0, &(0x7f0000000040)) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000000ff5)={&(0x7f0000011000/0x3000)=nil, 0x3000}) 2018/04/22 09:00:55 executing program 5: unshare(0x118000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0xe62000)=nil, 0xe62000, 0x1000004, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000400)=""/213, &(0x7f0000000040)=0xd5) 2018/04/22 09:00:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x6, 0x8000) r1 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0x7, 0x8, 0x7ff, 0x3ff, 0x0, 0x7f, 0x1000, 0x2, 0x3, 0x7, 0x5, 0x3, 0xf9, 0x1, 0x2, 0x5, 0x6, 0x2, 0xfffffffffffffffa, 0x80000000, 0xf8, 0x4, 0x8, 0x1, 0x3, 0x0, 0x4, 0xc000000000000000, 0x1, 0x4, 0x2, 0x9, 0x7f, 0xf18, 0xffffffffffffff24, 0x3ff, 0x0, 0x0, 0x6, @perf_bp={&(0x7f0000000100), 0x1}, 0x202, 0x80000000, 0x4, 0x4, 0x4, 0x2, 0x9}, r1, 0x3, r0, 0x1) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000000c0)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, &(0x7f0000c97ff8)) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f000096a000)={0x0, 0x0, &(0x7f0000570000)=""/79, &(0x7f0000000f72)=""/142, &(0x7f00000004c0)=""/231}) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000c7f000)='./file0\x00', &(0x7f0000df9000)='nfs4\x00', 0x0, &(0x7f0000590ffe)='v4') 2018/04/22 09:00:55 executing program 3 (fault-call:5 fault-nth:17): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:00:55 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000640)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="c6c626a455993d9b9b39b660b95fa2934d121e2e75fa0264e682470bc5160848d3cdf69ec95141e25232194ed968a12ace03b4d17a14e7a89f05fba4d846d0d76d2ea7fd5fdbabbbe4e0eeff437d9dca7373f30bbdbd3dd4a990ebf1b18c4cc88c5fd465fdd13cf30e2b8a5d95e3896d79", 0x71) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000100)={@broadcast, @broadcast, 0x0}, &(0x7f0000000140)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'bond_slave_1\x00', r1}) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-avx\x00'}, 0x58) 2018/04/22 09:00:55 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x1, 0x0) sendmsg$rds(r1, &(0x7f0000003400)={&(0x7f0000000480)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000000500)=[{&(0x7f00000004c0)=""/16, 0x10}], 0x1, &(0x7f0000003280)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000540)=""/78, 0x4e}, &(0x7f00000005c0), 0x40}}, @rdma_args={0x48, 0x114, 0x1, {{0xcf, 0x4}, {&(0x7f0000000600)=""/157, 0x9d}, &(0x7f0000002bc0)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/198, 0xc6}, {&(0x7f00000017c0)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/104, 0x68}, {&(0x7f0000002840)=""/57, 0x39}, {&(0x7f0000002880)=""/154, 0x9a}, {&(0x7f0000002940)=""/154, 0x9a}, {&(0x7f0000002a00)=""/152, 0x98}, {&(0x7f0000002ac0)=""/227, 0xe3}], 0x9, 0x10, 0x5}}, @rdma_args={0x48, 0x114, 0x1, {{0xb6b, 0x6}, {&(0x7f0000002c80)=""/175, 0xaf}, &(0x7f0000003100)=[{&(0x7f0000002d40)=""/72, 0x48}, {&(0x7f0000002dc0)=""/89, 0x59}, {&(0x7f0000002e40)=""/21, 0x15}, {&(0x7f0000002e80)=""/12, 0xc}, {&(0x7f0000002ec0)=""/146, 0x92}, {&(0x7f0000002f80)=""/90, 0x5a}, {&(0x7f0000003000)=""/178, 0xb2}, {&(0x7f00000030c0)=""/6, 0x6}], 0x8, 0x24, 0x9}}, @rdma_dest={0x18, 0x114, 0x2, {0xb, 0x100}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000003180)=""/19, 0x13}, &(0x7f00000031c0), 0x40}}, @fadd={0x58, 0x114, 0x6, {{0xf0a}, &(0x7f0000003200)=0x8, &(0x7f0000003240)=0x8, 0x0, 0xfffffffffffffff9, 0x3, 0x7ff, 0x1, 0x3f}}], 0x160}, 0x50) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000300)="0a0775b0", 0x4) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000200)={r0}) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000240)=@assoc_value={0x0, 0x3}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r2, 0x84, 0x7b, &(0x7f00000002c0)={r3, 0x1}, 0x8) r4 = accept$alg(r0, 0x0, 0x0) r5 = dup(r4) accept$unix(r5, &(0x7f0000000140)=@abs, &(0x7f00000001c0)=0x6e) ioctl$TIOCGLCKTRMIOS(r5, 0x5456, &(0x7f0000000100)={0xff, 0x4, 0xc6, 0x101, 0x2, 0x5, 0x4, 0x4, 0x5, 0x7fffffff, 0x7f, 0x2}) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x200000, 0x0) r6 = shmget(0x2, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r5, 0x80045300, &(0x7f0000000400)) shmat(r6, &(0x7f0000ffc000/0x4000)=nil, 0x1000) sendmmsg(r4, &(0x7f00000063c0)=[{{&(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa}}}, 0x3a, &(0x7f0000000080), 0x5}}, {{&(0x7f0000000000)=@nl=@proc={0x10}, 0xc, &(0x7f00000020c0), 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="10000000000001170100000400000000b0aff0a14cc1cc9b807b65c8126725a6f08a1bf5d05a1d6aefb194f6e9ca3fd730bcfd16829da3640c8a2c9dea4352a1576800fc4c30a137ca47308c4af3f9d44d22ef0c8cdfaaf1ca5c6140b8d8f9bbc18c35e7701843aec6f6a5328ff3a94906bbc18f768b7ad91b4d75d08322dbfb5d6720e5e94230cae42146f1faccd01e10dc447f1025f4579666102e521dcb582677413495b9f4311c0ebcaf8e161beaf1343e8c65cac910436cc961ea"], 0x10}}], 0x2, 0x0) 2018/04/22 09:00:55 executing program 4: setrlimit(0x7, &(0x7f0000000000)={0x3ff, 0x88}) pipe2(&(0x7f0000000040), 0x0) 2018/04/22 09:00:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000000100)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETA(r0, 0x5402, &(0x7f0000d1efec)={0x0, 0x0, 0xfffffffffffffffb}) [ 111.734970] FAULT_INJECTION: forcing a failure. [ 111.734970] name failslab, interval 1, probability 0, space 0, times 0 [ 111.746407] CPU: 1 PID: 7971 Comm: syz-executor3 Not tainted 4.16.0+ #85 [ 111.753280] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.762668] Call Trace: [ 111.765314] dump_stack+0x185/0x1d0 [ 111.769002] should_fail+0x87b/0xab0 [ 111.772828] should_failslab+0x279/0x2a0 [ 111.776992] __kmalloc+0xc2/0x350 [ 111.780546] ? dh_compute_value+0x347/0x5f0 [ 111.784915] ? mpi_alloc_limb_space+0x6f/0xb0 [ 111.789459] mpi_alloc_limb_space+0x6f/0xb0 [ 111.793831] mpi_powm+0x233/0x56f0 [ 111.797449] ? __msan_poison_alloca+0x15c/0x1d0 [ 111.802199] ? trace_kmalloc+0xa3/0x2b0 [ 111.806219] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 111.811628] ? kmsan_set_origin+0x9e/0x160 [ 111.815916] ? mpi_alloc+0x1ad/0x290 [ 111.819675] dh_compute_value+0x347/0x5f0 [ 111.823910] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 111.829435] ? dh_set_secret+0x620/0x620 2018/04/22 09:00:55 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x7fffffff, 0x200) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000180)=""/76) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}}}, 0x108) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000280)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) close(r0) getsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000200), &(0x7f0000000240)=0x4) [ 111.833576] __keyctl_dh_compute+0x158a/0x1ef0 [ 111.838244] keyctl_dh_compute+0x22e/0x260 [ 111.842531] ? SyS_keyctl+0x76/0xa0 [ 111.846185] SYSC_keyctl+0xd31/0x1830 [ 111.850082] ? syscall_return_slowpath+0xe9/0x700 [ 111.854989] ? fput+0x25c/0x2e0 [ 111.858351] ? SYSC_write+0x2f0/0x360 [ 111.862226] SyS_keyctl+0x76/0xa0 [ 111.865779] do_syscall_64+0x309/0x430 [ 111.869720] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 111.874702] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 111.879920] RIP: 0033:0x455389 2018/04/22 09:00:55 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = semget(0x1, 0x6, 0x80) semctl$SETVAL(r1, 0x4, 0x10, &(0x7f0000000040)=0x80000000) sendmsg$nl_xfrm(r0, &(0x7f0000000400)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f00000002c0)=@updpolicy={0xb8, 0x19, 0x213, 0x0, 0x0, {{@in=@loopback=0x7f00000e, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}, 0x1}, 0x0) 2018/04/22 09:00:55 executing program 7: r0 = socket$inet_sctp(0x2, 0x5, 0x84) socketpair$inet6(0xa, 0xf, 0x3, &(0x7f0000000000)) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x6, &(0x7f0000001500)={0x0, @in={{0x2, 0x0, @rand_addr}}}, &(0x7f00000001c0)=0xa0) [ 111.883127] RSP: 002b:00007f2125a61c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 111.890876] RAX: ffffffffffffffda RBX: 00007f2125a626d4 RCX: 0000000000455389 [ 111.898173] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 111.905465] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 111.912753] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 111.920059] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000011 2018/04/22 09:00:56 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x8001fc, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x40085112, &(0x7f0000000080)={{0x81, 0x100040000000003}}) 2018/04/22 09:00:56 executing program 3 (fault-call:5 fault-nth:18): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:00:56 executing program 1: add_key(&(0x7f0000015000)='logon"', &(0x7f0000000000)={0x73, 0x79, 0x7a}, &(0x7f0000014000)='m', 0x1, 0xffffffffffffffff) 2018/04/22 09:00:56 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) munlockall() setsockopt$inet_int(r0, 0x0, 0x40000000000000ca, &(0x7f0000000080), 0x1d98) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000040)={{0x1, 0x3, 0x4, 0x3, 0x4}}) 2018/04/22 09:00:56 executing program 7: r0 = socket$inet6(0xa, 0x802, 0x0) connect$inet6(r0, &(0x7f0000ff6fe4)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x3}, 0x1c) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.net\x00', 0x200002, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x0) unlink(&(0x7f0000000000)='./file1\x00') ioctl$KDGKBMETA(r2, 0x4b62, &(0x7f0000000080)) recvmsg(0xffffffffffffffff, &(0x7f000070bfc8)={&(0x7f00001d6ff8)=@sco, 0x8, &(0x7f00000a4fb0), 0x0, &(0x7f0000b30000)}, 0x0) r3 = dup3(r2, r1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x34123610) ftruncate(r2, 0x3) write$cgroup_subtree(r3, &(0x7f00000002c0), 0xa871f499) sendto$inet6(r0, &(0x7f0000000200), 0xffffffffffffffe8, 0x0, &(0x7f0000000200)={0xa, 0x4e27, 0x0, @dev={0xfe, 0x80}}, 0x1b) 2018/04/22 09:00:56 executing program 2: capset(&(0x7f0000be6ff8)={0x19980330}, &(0x7f000032e000)) creat(&(0x7f0000891ff8)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x40) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f0000d9ffec)="0000000201000000000000010400000000000000", 0x14, 0x0) 2018/04/22 09:00:56 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0/file0\x00', 0x40, 0x0) accept4$unix(r0, &(0x7f0000000080), &(0x7f0000000100)=0x6e, 0x80000) r1 = socket(0x2, 0x3, 0x40000000000000ff) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)="6272696467653000000000e000", 0x10) r2 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x5, 0x20000) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000180)='vlan0\x00', 0x10) sendto$unix(r1, &(0x7f00000004c0)="ee087d8955854a71cb4fef74e9601927e79436d5e4218a286737134367585e5b67add9b477e765b4346960e8e1ec9d607cb9874491299c50", 0x38, 0x0, &(0x7f0000000540)=@file={0x0, './file0/file0\x00'}, 0x6e) 2018/04/22 09:00:56 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000e40fee)='/dev/loop-control\x00', 0x0, 0x0) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000580)={0x4, 0x0, [{0x0, 0xa0, &(0x7f0000000400)=""/160}, {0x1, 0x20, &(0x7f0000000380)=""/32}, {0x1, 0x42, &(0x7f00000004c0)=""/66}, {0x0, 0x1e, &(0x7f0000000540)=""/30}]}) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) rt_sigsuspend(&(0x7f00000003c0)={0x6}, 0x8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0xc) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getegid() getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 2018/04/22 09:00:56 executing program 4: r0 = open(&(0x7f0000000000)='./file0\x00', 0x100, 0x4) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f0000000040)=""/163) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x4) personality(0x400000d) 2018/04/22 09:00:56 executing program 1: unshare(0x40600) r0 = memfd_create(&(0x7f0000000240)='-G\\%(\x00', 0x0) fcntl$addseals(r0, 0x409, 0x4000000b) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r0, 0x1, 0x1, 0x101, &(0x7f0000000000)=[0x0, 0x0], 0x2}, 0x20) [ 112.460501] raw_sendmsg: syz-executor6 forgot to set AF_INET. Fix it! 2018/04/22 09:00:56 executing program 5: syz_emit_ethernet(0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="d0eb71626f6da26e1ae45e6296a26c7838153b0f02f05cec3d23f7f0f3b6892bbd62dbf113603f27ce59d086713897ce65dea892c37f81610344036f0efe350bf6d1845b150da7294c15968e5e96ba95e81a4150caf2adf6360a1e80bfcbd337449e2cb512647c81ca4ba01acc1f6c394011af20cf1f78c211d19c735b415710ed4e0acb71220bcb7f3b161175dca150a99c0cc1e3371f21a2e9c19eaca88107a152dfd6e3d3a294", @ANYBLOB="5000000090780000"], &(0x7f00000001c0)) r0 = dup(0xffffffffffffffff) sysfs$3(0x3) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0x917d0492b0b4c865) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x57fc, r1, r2, 0x4000000000000003, 0xfffffffffffffbff, 0x4000) r3 = request_key(&(0x7f0000000040)='big_key\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000140)='\x00', 0xfffffffffffffff8) keyctl$clear(0x7, r3) syz_emit_ethernet(0x9c, &(0x7f0000000300)={@empty, @random="07fbf5544900", [], {@llc_tr={0x11, {@snap={0x1, 0xab, 'b', "da3d0b", 0x888e, "ea33a47fa4c26e83a004c79a7d55808ca265f828fa79ca0569c76f2db706b657f665a73d0713773539d0328c3577f9da5ac5fa0e4cf64b244d1af21afa070e78cbfe18ef7761e22e59ae6026212fdec80b89c04466b61350e2066eb9c2b1f0ade403b39c6f134d9129f82ce8d03ec14e4ece16c8e4546c4d339ec9420917bdcce9d515b93d77"}}}}}, &(0x7f0000000180)={0x1, 0x1, [0x6d3, 0x9b1, 0xefe, 0x63]}) 2018/04/22 09:00:56 executing program 2: accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x14, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f000066b000)=""/1, 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)) syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000080)={0x5, 0x76, 0x3, 0xfffffffffffffff9, 0x101, 0x1, 0x5354dfe5, 0x800, 0xbc7, 0x1000, 0x8, 0x2}) [ 112.639745] FAULT_INJECTION: forcing a failure. [ 112.639745] name failslab, interval 1, probability 0, space 0, times 0 [ 112.651258] CPU: 0 PID: 8043 Comm: syz-executor3 Not tainted 4.16.0+ #85 [ 112.658146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.667529] Call Trace: [ 112.670178] dump_stack+0x185/0x1d0 [ 112.673862] should_fail+0x87b/0xab0 [ 112.677679] should_failslab+0x279/0x2a0 [ 112.681849] __kmalloc+0xc2/0x350 [ 112.685387] ? mpi_resize+0x254/0x450 [ 112.689231] mpi_resize+0x254/0x450 [ 112.692904] mpi_powm+0x1d59/0x56f0 [ 112.696632] dh_compute_value+0x347/0x5f0 [ 112.700870] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 112.706403] ? dh_set_secret+0x620/0x620 [ 112.710552] __keyctl_dh_compute+0x158a/0x1ef0 [ 112.715221] keyctl_dh_compute+0x22e/0x260 [ 112.719515] ? SyS_keyctl+0x76/0xa0 [ 112.723174] SYSC_keyctl+0xd31/0x1830 [ 112.727082] ? syscall_return_slowpath+0xe9/0x700 [ 112.731989] ? fput+0x25c/0x2e0 [ 112.735360] ? SYSC_write+0x2f0/0x360 [ 112.739244] SyS_keyctl+0x76/0xa0 [ 112.742799] do_syscall_64+0x309/0x430 [ 112.746749] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 112.751725] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 112.756940] RIP: 0033:0x455389 [ 112.760144] RSP: 002b:00007f2125a61c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 112.767885] RAX: ffffffffffffffda RBX: 00007f2125a626d4 RCX: 0000000000455389 [ 112.775178] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 112.782465] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:00:56 executing program 4: r0 = socket$inet6(0xa, 0x80803, 0x84) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in, @in=@dev={0xac, 0x14, 0x14}, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x0, 0x6c}, 0x0, @in6, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0)={0xa}, 0x1c) [ 112.789735] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 112.797006] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000012 2018/04/22 09:00:56 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x81, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x200) 2018/04/22 09:00:56 executing program 6: accept$netrom(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) socketpair$packet(0x11, 0x0, 0x300, &(0x7f00000000c0)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x1, 0x32, r0, 0xfffffffffffffff8) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 2018/04/22 09:00:56 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1082a0}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[]}, 0x1}, 0x40) fchdir(r0) mkdir(&(0x7f0000001280)='./bus\x00', 0x107) remap_file_pages(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x3, 0x2, 0x10) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000032e000)) chdir(&(0x7f0000f95000)='./file0\x00') r1 = open(&(0x7f00000000c0)='./bus\x00', 0x105000, 0x0) ioctl$void(r1, 0x0) ftruncate(0xffffffffffffffff, 0x8000) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000001340), &(0x7f0000001380)=0x4) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0xffffffffffffffc0, 0x200, 0x0, 0x2}, &(0x7f0000000100)=0x14) read(r1, &(0x7f0000000240)=""/4096, 0x1000) r3 = syz_open_procfs(0x0, &(0x7f0000000240)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798058439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14}}, {0x2, 0x0, @loopback=0x7f000001}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, 0x0, 0x0, 0x0, 0x0, 0x400000008000, &(0x7f0000000000)='syzkaller1\x00', 0x0, 0xfffffffffffffffc}) epoll_wait(r3, &(0x7f0000000200), 0x0, 0x10000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) pread64(0xffffffffffffffff, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r4) request_key(&(0x7f0000000680)='dns_resolver\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000006c0)="7b2d23776c616e3076626f786e657431766d6e657430142400", r4) setsockopt$inet_sctp_SCTP_RESET_ASSOC(0xffffffffffffffff, 0x84, 0x78, &(0x7f0000000440), 0x4) 2018/04/22 09:00:56 executing program 5: pkey_alloc(0x0, 0x1) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000674000/0x2000)=nil, 0x2000, 0x2004000, r0) 2018/04/22 09:00:57 executing program 3 (fault-call:5 fault-nth:19): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 113.023596] mmap: syz-executor4 (8065) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/04/22 09:00:57 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f00000001c0)='/dev/snd/seq\x00', 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000180)) r1 = msgget(0x1, 0x8) msgsnd(r1, &(0x7f0000000000)={0x2, "cd40c0fd323517eebc5d7f784e8ec68b9e689ca03cf5e397daa91d2824e5ad7d0053e454ca18936375e6c8f692b4bd3a2f0f7d7ebdd47d0545eb68c39657b251836bdd2f592449a3ee664f59562e6f975a5c01b3b45432f889444ba44c5201bca52211d99c6227ddf15d49dbe466bb10591b9f277cf43239f324d38e9c1d5bd01772d6523ef54477fc3034bc634315be2fb88baa7111ede1ec609eec664329576a7f43c82a1b26c38de684109d0af3d5451c7928b88cb9af87cf6314fe12"}, 0xc6, 0x800) 2018/04/22 09:00:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000440)={0x26, 'aead\x00', 0x0, 0x0, 'ccm(camellia-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="5f797554dbb7295df0df821728d598bf6c2c702ff314e1b450faaf364a461977e9bc7b29e98de9efd954baa129ea7cd525569485614b65f387ff64867f8e8bc0cbd1afcdfba8346c8a99ea3fcfd290d624a59ad344b6de91886a5d7f3820016b1a1d49d27ae8e48a82a95102db18f16503eeea8ca0df2e5a7baeab42b7ebbeac39ae4fd1c339c8d2c2bb8e33deb19b2a97c188f6073ac03fd86341cf7690fef200810f6b2d4496a25e34b2963a55302606227f0e2edd188a00040000d377fa24e7f5e776bf37df421c506a9d89487492b8bfe4c1605651c36424c47a30cd3522cdb1", 0xfffffffffffffeb6) [ 113.129249] FAULT_INJECTION: forcing a failure. [ 113.129249] name failslab, interval 1, probability 0, space 0, times 0 [ 113.140676] CPU: 1 PID: 8071 Comm: syz-executor3 Not tainted 4.16.0+ #85 [ 113.147547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.156931] Call Trace: [ 113.159574] dump_stack+0x185/0x1d0 [ 113.163258] should_fail+0x87b/0xab0 [ 113.167083] should_failslab+0x279/0x2a0 [ 113.171202] __kmalloc+0xc2/0x350 [ 113.174736] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 113.180272] ? mpi_resize+0x2bc/0x450 [ 113.184149] ? mpi_alloc_limb_space+0x6f/0xb0 [ 113.188694] mpi_alloc_limb_space+0x6f/0xb0 [ 113.193071] mpi_powm+0x236d/0x56f0 [ 113.196795] dh_compute_value+0x347/0x5f0 [ 113.201044] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 113.206575] ? dh_set_secret+0x620/0x620 [ 113.210715] __keyctl_dh_compute+0x158a/0x1ef0 [ 113.215391] keyctl_dh_compute+0x22e/0x260 [ 113.219690] ? SyS_keyctl+0x76/0xa0 [ 113.223353] SYSC_keyctl+0xd31/0x1830 [ 113.227255] ? syscall_return_slowpath+0xe9/0x700 [ 113.232169] ? fput+0x25c/0x2e0 [ 113.235537] ? SYSC_write+0x2f0/0x360 [ 113.239425] SyS_keyctl+0x76/0xa0 [ 113.242967] do_syscall_64+0x309/0x430 [ 113.246916] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 113.251895] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 113.257113] RIP: 0033:0x455389 [ 113.260322] RSP: 002b:00007f2125a61c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 113.268068] RAX: ffffffffffffffda RBX: 00007f2125a626d4 RCX: 0000000000455389 [ 113.275362] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 113.282652] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 113.289952] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 113.297248] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000013 [ 113.562123] alg: No test for cbcmac(camellia) (cbcmac(camellia-generic)) [ 113.743377] alg: No test for ccm(camellia-generic) (ccm_base(ctr(camellia-generic),cbcmac(camellia-generic))) 2018/04/22 09:00:57 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x5, 0x80000000032, 0xffffffffffffffff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 2018/04/22 09:00:57 executing program 3 (fault-call:5 fault-nth:20): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:00:57 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) semctl$GETALL(0x0, 0x0, 0xd, &(0x7f00000019c0)=""/153) r1 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfe, 0x5288101}, 0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f00000001c0)={0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)=@bridge_dellink={0x28, 0x11, 0x319, 0x0, 0x0, {0x7, 0x0, 0x0, r2}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x3}]}]}, 0x28}, 0x1}, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000080)='bcsf0\x00') socket$nl_crypto(0x10, 0x3, 0x15) 2018/04/22 09:00:57 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x400000, 0x0) bind$alg(r0, &(0x7f0000000640)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null-generic)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-avx\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 2018/04/22 09:00:57 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xf91c, 0x200) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000001c0)=0x54) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f00000000c0)="bde9a62be84943362db47f97d3897d62e197040b37b59a632a65a2b515d1c67386d80f2782dacfe5c93bd0f3b81f88fb704cb85ceb046e4d17be191ad1c543ffb29b3a85972a9e8a02ef3d203578ab1aeb3888493fd7") getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x5, 0x7ff}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000340)={r1, 0x3000000000, 0x1ff, 0x6, 0x1280000000000, 0x78fc}, 0x14) unshare(0x3fb) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)="2f70726f632f7379732f6e65742f64726f705f656e74f535f6", 0x2, 0x0) fcntl$getflags(r2, 0x40b) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000200), &(0x7f0000000240)=0x4) 2018/04/22 09:00:57 executing program 6: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1001, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) getsockopt$sock_int(r0, 0x1, 0x30, &(0x7f0000000040), &(0x7f0000000140)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@dev}}, &(0x7f0000000000)=0xe8) sendto$inet6(r0, &(0x7f0000000080)="67ae537e7c15133293a9d7920defa31b942165ea9b9d231f18d3a189d928b2ea2760a5f78b7cf87328f4464b1782ed9ba095c7b670eb3901f5b564112912aee22b8ad171c2d3620ec0ff6f487afb7e2e6703ff84507c062ee18043d309de47a3b72448d2ca48ee86fb792ef25cde3d1d2509dcda8667e5b8096cd7e2434d805b5679ab3e1f58a5f71db9afc7028820137eccf7cd", 0x94, 0x80, 0x0, 0x0) setuid(r1) 2018/04/22 09:00:57 executing program 1: mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000b19000/0x3000)=nil) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @hyper}, &(0x7f0000000080)=0x80, 0x80000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="74010000", @ANYRES16=r1, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x8000}, 0x8010) 2018/04/22 09:00:57 executing program 2: socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000280)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f00000002c0)={0xffffffffffffff9c}) accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000000300), &(0x7f0000000380)=0x60) socket$inet(0x2, 0x2, 0xa9c) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rfkill\x00', 0x200200, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000180)=0x4) openat$cgroup_type(r0, &(0x7f00000000c0)='cgroup.type\x00', 0x2, 0x0) syz_open_dev$sndmidi(&(0x7f0000000400)='/dev/snd/midiC#D#\x00', 0x9, 0x200200) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/net/pfkey\x00', 0x52000, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={r2}) bind$vsock_dgram(r3, &(0x7f0000000140)={0x28, 0x0, 0x2711, @any=0xffffffff}, 0x10) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)="2e2f6367726f75702e6370750086298d", 0x200002, 0x0) r5 = openat$cgroup_int(r4, &(0x7f0000000100)='cpuset.memory_spread_page\x00', 0x2, 0x0) r6 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r5, &(0x7f0000000000)) epoll_wait(r6, &(0x7f0000000040)=[{}], 0x1, 0x0) [ 114.005775] FAULT_INJECTION: forcing a failure. [ 114.005775] name failslab, interval 1, probability 0, space 0, times 0 [ 114.017207] CPU: 1 PID: 8133 Comm: syz-executor3 Not tainted 4.16.0+ #85 [ 114.024078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.033459] Call Trace: [ 114.036107] dump_stack+0x185/0x1d0 [ 114.039795] should_fail+0x87b/0xab0 [ 114.043571] should_failslab+0x279/0x2a0 [ 114.047788] __kmalloc+0xc2/0x350 [ 114.051354] ? __keyctl_dh_compute+0x1bae/0x1ef0 [ 114.056200] __keyctl_dh_compute+0x1bae/0x1ef0 [ 114.060873] keyctl_dh_compute+0x22e/0x260 [ 114.065162] ? SyS_keyctl+0x76/0xa0 [ 114.068822] SYSC_keyctl+0xd31/0x1830 [ 114.072720] ? syscall_return_slowpath+0xe9/0x700 [ 114.077623] ? fput+0x25c/0x2e0 [ 114.080982] ? SYSC_write+0x2f0/0x360 [ 114.084853] SyS_keyctl+0x76/0xa0 [ 114.088389] do_syscall_64+0x309/0x430 [ 114.092336] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 114.097312] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 114.102527] RIP: 0033:0x455389 [ 114.105737] RSP: 002b:00007f2125a61c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 114.113487] RAX: ffffffffffffffda RBX: 00007f2125a626d4 RCX: 0000000000455389 [ 114.120787] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 114.128639] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 114.135934] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 114.143231] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000014 2018/04/22 09:00:58 executing program 2: munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x13) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000080)={0x1, 0x1, {0x3, 0x3, 0x80, 0x1, 0x47}}) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) getresuid(&(0x7f0000000100), &(0x7f0000000140)=0x0, &(0x7f0000000180)) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r1, r2) 2018/04/22 09:00:58 executing program 7: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) madvise(&(0x7f000090b000/0x3000)=nil, 0x3000, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) munmap(&(0x7f000090e000/0x2000)=nil, 0x2000) sigaltstack(&(0x7f000090b000/0x1000)=nil, &(0x7f0000000040)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x4, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x9, 0x10}, &(0x7f0000000180)=0xc) read(r0, &(0x7f0000000300)=""/100, 0x64) 2018/04/22 09:00:58 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x80, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x810, 0x70bd2b, 0x25dfdbff, {0x1}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e22}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x0) r2 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f000000bfc8)={&(0x7f0000000000)=@nl=@proc={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001000)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623692500080004000200f0ff00009848a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000004000)}, 0x0) getsockname$inet6(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) pipe(&(0x7f0000000080)={0xffffffffffffffff}) unlinkat(r3, &(0x7f00000000c0)='./file0\x00', 0x200) 2018/04/22 09:00:58 executing program 6: socket$inet6(0xa, 0x805, 0x80000000) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x43, &(0x7f0000000000)=0xefffffff, 0x10b) 2018/04/22 09:00:58 executing program 1: mmap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0, 0x8972, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000b19000/0x3000)=nil) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@vsock={0x0, 0x0, 0x0, @hyper}, &(0x7f0000000080)=0x80, 0x80000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="74010000", @ANYRES16=r1, @ANYBLOB="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"], 0x174}, 0x1, 0x0, 0x0, 0x8000}, 0x8010) 2018/04/22 09:00:58 executing program 3 (fault-call:5 fault-nth:21): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:00:58 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt(r0, 0x10e, 0x0, &(0x7f0000f67000), 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7fff0, 0xd7578fab9e292c7a) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000040)=r1, 0x4) 2018/04/22 09:00:58 executing program 4: mmap(&(0x7f0000000000/0xda6000)=nil, 0xda6000, 0x0, 0x64031, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_buf(r0, 0x1, 0xb7, &(0x7f0000000480)=""/163, &(0x7f0000000180)=0xa3) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @multicast2=0xe0000002}}, 0x5, 0x4, 0xff, 0x5, 0xa1ac}, &(0x7f0000000000)=0x98) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000600)=@sack_info={r2, 0x5, 0x81}, 0x4) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000140)={r0}) accept$packet(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000680)=0x14) connect$packet(r3, &(0x7f00000006c0)={0x11, 0x1c, r4, 0x1, 0xff, 0x6, @random="ec10f536028b"}, 0x14) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000340)={0x0, 0x80000}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000380)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000003c0)={0x0, 0x80000, 0xffffffffffffff9c}) r6 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x7, 0x4900) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0}, &(0x7f0000000740)=0xc) setsockopt$inet_IP_XFRM_POLICY(r6, 0x0, 0x11, &(0x7f0000000780)={{{@in, @in6=@dev={0xfe, 0x80, [], 0x15}, 0x4e22, 0x334, 0x4e20, 0x0, 0xa, 0x80, 0x80, 0x3f, r4, r7}, {0x128, 0x80000000, 0x9, 0xfffffffffffffffd, 0x0, 0x0, 0x7f, 0x3ff}, {0x1, 0x0, 0x8001, 0x3}, 0x800, 0x0, 0x2, 0x0, 0x2, 0x2}, {{@in, 0x4d4, 0xff}, 0xa, @in, 0x3503, 0x1, 0x0, 0xe69, 0x3, 0x9, 0x5}}, 0xe8) ioctl$sock_inet_tcp_SIOCATMARK(r6, 0x8905, &(0x7f0000000580)) r8 = fcntl$getown(r0, 0x9) ioprio_get$pid(0x2, r8) socket$inet6_icmp(0xa, 0x2, 0x3a) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_NODELAY(r9, 0x84, 0x3, &(0x7f0000000540)=0x7, 0x4) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x40032, 0xffffffffffffffff, 0x0) bind$ipx(r9, &(0x7f00000005c0)={0x4, 0x101, 0x13d0000000000000, "598ec04ae703"}, 0x10) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) pread64(r5, &(0x7f0000000280)=""/155, 0x9b, 0x1a) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffff9c}) mmap(&(0x7f0000e64000/0x1000)=nil, 0x1000, 0x0, 0xa831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf02000)=nil, 0xf02000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000440)={r2, 0x7ff, 0x8000, 0x7}, 0x10) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000200)=@add_del={0x2, &(0x7f00000001c0)='gretap0\x00', 0x100}) 2018/04/22 09:00:58 executing program 2: r0 = socket$inet(0x2, 0x803, 0x7f) sendmsg(r0, &(0x7f0000001480)={&(0x7f0000001180)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x10, &(0x7f0000001240), 0x0, &(0x7f0000001600)}, 0x0) sendto$inet(r0, &(0x7f0000000000)="02d7e270d3dda9a2ac98c0f4b38a8bf07631f1ebf8876e4abdc1", 0x1a, 0x90, &(0x7f0000000040)={0x2, 0x4e21, @rand_addr=0x100}, 0x10) recvmsg(r0, &(0x7f0000002b40)={0x0, 0x0, &(0x7f0000002a80), 0x0, &(0x7f0000002ac0)=""/89, 0x59}, 0x10022) r1 = semget(0x1, 0x5, 0x40) semctl$GETZCNT(r1, 0x2, 0xf, &(0x7f0000000080)=""/3) 2018/04/22 09:00:58 executing program 6: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x6) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x9) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0xfffffffe, 0x0) ptrace(0x4207, r2) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000040)=0x3) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={&(0x7f0000000140), &(0x7f0000000240)='<'}}, &(0x7f0000000480)) ptrace$setregset(0x4205, r2, 0x202, &(0x7f00000000c0)={&(0x7f0000000040), 0xfffffffffffffdb8}) 2018/04/22 09:00:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0xb7d61de928becb14) ioctl$TIOCCONS(r1, 0x541d) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x7, 0x101080) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) 2018/04/22 09:00:58 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0xfffffffffffffffc) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "706f727431000000000000000000000000000000000000000000eb000000b2a587e2000000000000020000000000000001008e15e7af00", 0x2, 0x10800a}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000000c0)={0x80, 0x0, 0xf7}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000300)={0x4, 0x3, 0x0, 0x7, 0x7, 0x7}) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000140)={'nat\x00', 0x0, 0x3, 0xf9, [], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000200)=""/249}, &(0x7f0000000040)=0x78) 2018/04/22 09:00:58 executing program 0: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000040)={'security\x00', 0x5d, "c519558e379582c91690a8a05a0f3a12892b63cd59ad5aebee159d91a91391bc25d732eebfb0277a49bee1995f5102e5233788820991a1ec5a3a8573abe284612b331208d5b7efb69e9cac34cd2fc3340eeeecc2af74d41ac9ddba90d0"}, &(0x7f0000000100)=0x81) r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, &(0x7f0000b31000)="f9", 0x1, 0x0, &(0x7f00009e1000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}}}, 0x98) 2018/04/22 09:00:58 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) socketpair(0x4, 0xe, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$llc_int(r6, 0x10c, 0x6, &(0x7f0000000180)=0x400, 0x4) pkey_mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000be4000/0x4000)=nil) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mprotect(&(0x7f00002b1000/0xc00000)=nil, 0xc00000, 0x7) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) syz_open_pts(r5, 0x309000) 2018/04/22 09:00:58 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x27) flistxattr(r0, &(0x7f0000000280), 0x0) r1 = getpid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000000)={0x7}) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000040)=""/180, &(0x7f0000000100)=0xb4) [ 114.934081] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2018/04/22 09:00:59 executing program 2: syz_emit_ethernet(0x1d0, &(0x7f00000e0fba)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @random="8a53ee431abe", @loopback=0x7f000001, @empty, @loopback=0x7f000001}}}}, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x1, 0x0) r1 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f00000000c0)={0x3, 0xcb}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r1}) 2018/04/22 09:00:59 executing program 5: unshare(0x400) r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) ioctl(r0, 0x4401000000001279, &(0x7f0000000240)="0351798d9449b72d19525395e28cc86a11206652e635da8415712b4cc0d0fdb8646bc8f0e24aa4e37de68806da94502bab77fd9c0110f498688c63ead8bd77ed9239a46673f0735de810cb7749cec32034c99648f5f265cc3361a3e720320658b21053551b37029dafdea80cb52e456361dfe549bd19a2323fa656004e060b7402b09eac2be7be23585132a803ad01287643f9d5b75aa487bc423a42e7885ee58600a23643aecc21614ad4d03562c8301f2163f6d69c6270491d2cd94d32c87fe20d413fc5521aeec8") 2018/04/22 09:00:59 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x4e2040) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000080)) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x43, &(0x7f0000000300)=ANY=[@ANYBLOB="8d6177000000000000000000f10000000000000000000000000000000000000000090d000003000000e802000010010000ffffffffffffffff10010000ffffffff50030000ffffffffffffffff50030000ffffffff0300000075d7d187de73e4f0d6370aaed49011d465382298e67f6c8fbfe6459bf14419ec5f9f06b2c2b2fe71dabaddbdd930", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c80010010000000000000000000000000000000000000000000000004800435400000000001374000000000000000000000000000000000000000000000000000000000000000000000070707470000000000000000000000000000000000000000000000000fe8000000000000000000000000000bb00000000000000000000000000010000000000008000000000000000000000000000000000000000000000000000766c616e3000000000000000000000006c6f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c8000801000000000000000000000000000000000000000000000000400052415445455354000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x348) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f00000001c0)={0xffffffffffffffff}) r3 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cuse\x00', 0x40000, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000200)={0x0, 0x1, 0x5, 0x7, 0x7, 0x1}, &(0x7f0000000240)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000280)={r4, 0x3, 0x7ff, 0x4, 0x1000, 0x2}, &(0x7f00000002c0)=0x14) 2018/04/22 09:00:59 executing program 7: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) madvise(&(0x7f000090b000/0x3000)=nil, 0x3000, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) munmap(&(0x7f000090e000/0x2000)=nil, 0x2000) sigaltstack(&(0x7f000090b000/0x1000)=nil, &(0x7f0000000040)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0x4, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000140)={r2, 0x9, 0x10}, &(0x7f0000000180)=0xc) read(r0, &(0x7f0000000300)=""/100, 0x64) 2018/04/22 09:00:59 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) ioctl$sock_ipx_SIOCIPXNCPCONN(r0, 0x89e3, &(0x7f0000000080)=0x8000) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000000c0)) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xb7, &(0x7f0000000000), &(0x7f00000001c0)=0x4) 2018/04/22 09:00:59 executing program 4: r0 = semget$private(0x0, 0x4, 0x0) semtimedop(r0, &(0x7f000001dfd6)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f000001f000)={0x2000, 0x989680}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) sched_rr_get_interval(r1, &(0x7f0000000040)) semtimedop(r0, &(0x7f0000a0ffc4)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f000043d000)={0x0, 0x989680}) 2018/04/22 09:00:59 executing program 1: r0 = dup(0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in6={{0xa}}}, &(0x7f0000000200)=0x90) 2018/04/22 09:00:59 executing program 6: r0 = socket$inet6(0xa, 0x5, 0x0) close(r0) shutdown(r0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x80, @empty, 0x401}, 0x1c) 2018/04/22 09:00:59 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) socketpair(0x4, 0xe, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$llc_int(r6, 0x10c, 0x6, &(0x7f0000000180)=0x400, 0x4) pkey_mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000be4000/0x4000)=nil) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mprotect(&(0x7f00002b1000/0xc00000)=nil, 0xc00000, 0x7) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) syz_open_pts(r5, 0x309000) 2018/04/22 09:00:59 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="02cc990c93f9f15c47e1e62f4f52ea11afcda43691746c3be25838b74c29767ac7423ffdd4d1d672a97986047696bfbc8859934a9ea609516187f59acb75e6ef65c64ee991d2aa9ff804f1c3058a931d75a9e3ce0100", 0x56, r0) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x0, 0x3fffc) getsockopt$packet_buf(r4, 0x107, 0x0, &(0x7f00000000c0)=""/2, &(0x7f0000000140)=0x2) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:00:59 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x9}, 0x14) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) accept$alg(r1, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00002c0fe8)={r0, &(0x7f000078f000), &(0x7f0000476f8a)=""/118}, 0x18) 2018/04/22 09:00:59 executing program 1: unshare(0x8000400) r0 = mq_open(&(0x7f0000000000)='proc,C\x00', 0x2, 0x0, &(0x7f000004b000)={0xffffffffffffffff, 0x7, 0x3}) preadv(r0, &(0x7f00000017c0)=[{&(0x7f0000001780)=""/44, 0x2c}], 0x1, 0x0) 2018/04/22 09:00:59 executing program 5: socketpair(0x14, 0x807, 0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)={0x8001, {{0xa, 0x4e24, 0x8000, @local={0xfe, 0x80, [], 0xaa}, 0x8}}, 0x1, 0x3, [{{0xa, 0x4e22, 0x8, @ipv4={[], [0xff, 0xff]}, 0xffffffffffffffff}}, {{0xa, 0x4e24, 0x4, @remote={0xfe, 0x80, [], 0xbb}, 0x100000001}}, {{0xa, 0x4e20, 0x6, @loopback={0x0, 0x1}, 0x3}}]}, 0x210) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x13fe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x1, 0x0, 0x0, 0x5}, 0x0, 0x0, r0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_mr_vif\x00') sendfile(r2, r2, &(0x7f0000000040)=0x37, 0x400000ff) syz_open_dev$tun(&(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) 2018/04/22 09:00:59 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0xffffffffffffff48}, 0x2c) r1 = dup(r0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{0x18}, [@alu={0x8000000201a7f19, 0x0, 0x7, 0x0, 0x1}], {0x95}}, &(0x7f0000f6bffb)='GPL\x00', 0x0, 0x36, &(0x7f00001a7f05)=""/251}, 0x18) 2018/04/22 09:00:59 executing program 6: userfaultfd(0x0) socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x0) getsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000040)=""/11, &(0x7f0000000080)=0xb) socket$inet6_dccp(0xa, 0x6, 0x0) pselect6(0x40, &(0x7f00000abfc0)={0x3ffffd}, &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 2018/04/22 09:00:59 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) socketpair(0x4, 0xe, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$llc_int(r6, 0x10c, 0x6, &(0x7f0000000180)=0x400, 0x4) pkey_mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000be4000/0x4000)=nil) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mprotect(&(0x7f00002b1000/0xc00000)=nil, 0xc00000, 0x7) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) syz_open_pts(r5, 0x309000) 2018/04/22 09:00:59 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x40000, 0x40) fgetxattr(r2, &(0x7f0000000180)=@random={'btrfs.', 'keyring\x00'}, &(0x7f0000000480)=""/141, 0x8d) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:00 executing program 4: lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, r1) r2 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r2, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000000)}, 0xc100) sendmsg(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000002ff0)=[{&(0x7f0000000000)="8e380fe8", 0x4}], 0x1, &(0x7f0000000480)=ANY=[]}, 0x0) 2018/04/22 09:01:00 executing program 5: r0 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x0) accept(r0, &(0x7f00000000c0)=@ipx, &(0x7f0000000140)=0x80) unshare(0x400) r1 = syz_open_dev$sg(&(0x7f0000b01000)='/dev/sg#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000080)={0x0, &(0x7f0000000040)}) ioctl(r1, 0x5382, &(0x7f0000001000)) 2018/04/22 09:01:00 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x42, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a6621f51a480e2f3aac78a8db2c0be10f25d1fea68bbb27cf59ce6768143c7da0a5277c17be7e03ff2cd97a72d0351a82cb32b931716cad42bf9e3ec64b5fb82d5ab6bbd2d014549e66a84f9c795681f0a1df8b9edf3ce14950237ec78ece828761d8bc9245639704915d7d5d5625e9cd9707fd187d962a37d82094a688f609709697282397e835b7b1e416f488d1e93e9dd87c96a1fdfc37bdb13612dd5aa126c16417a8f366042350e9485d00b192449c56657ad3ea028ff1eb384742822414bbe5218eb51fe1b23ce8ff59358aec9153efa611c57ea26daf7533d6c3a4") sendfile(r0, r0, &(0x7f0000000040)=0x200000, 0x4000000bf3) 2018/04/22 09:01:00 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:00 executing program 2: timer_create(0xffffffffffffffed, &(0x7f0000005fb0)={0x4, 0x0, 0x2, @thr={&(0x7f0000000000), &(0x7f0000000080)}}, &(0x7f0000002ffc)) 2018/04/22 09:01:00 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) socketpair(0x4, 0xe, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$llc_int(r6, 0x10c, 0x6, &(0x7f0000000180)=0x400, 0x4) pkey_mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000be4000/0x4000)=nil) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mprotect(&(0x7f00002b1000/0xc00000)=nil, 0xc00000, 0x7) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) syz_open_pts(r5, 0x309000) 2018/04/22 09:01:00 executing program 7: mbind(&(0x7f00003bd000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000)=0x2, 0xcb60, 0x3) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f0000c1f000)=0xfffffffffffffffd, 0x5, 0x0) get_mempolicy(&(0x7f0000f12000), &(0x7f0000c20000), 0x400, &(0x7f000077a000/0x4000)=nil, 0x3) 2018/04/22 09:01:00 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x6, 0x2, &(0x7f0000000000)={{{@in6=@mcast1={0xff, 0x1, [], 0x1}, @in=@multicast2=0xe0000002}}, {{@in6=@loopback={0x0, 0x1}}, 0x0, @in6}}, 0xe8) r1 = fcntl$getown(r0, 0x9) sched_rr_get_interval(r1, &(0x7f0000000180)) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x3) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000240), 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}, 0x10) sendmsg(r0, &(0x7f00000017c0)={&(0x7f0000000740)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000780)="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", 0x5da}], 0x1, &(0x7f0000000180)}, 0x861) 2018/04/22 09:01:00 executing program 1: r0 = memfd_create(&(0x7f000003affa)='posix_acl_access{Y\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x200000d, 0x11, r0, 0x0) write$tun(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00'], 0x1) capset(&(0x7f0000000ffc)={0x20080522}, &(0x7f0000000000)) 2018/04/22 09:01:00 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet_sctp(r1, &(0x7f000093eee8)=[{&(0x7f00001f6000)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000080)="96", 0x1}], 0x1, &(0x7f0000000240)=[@sndrcv={0x30, 0x84, 0x1, {0x2, 0x1, 0x0, 0x2, 0x3, 0x4, 0x879, 0x3}}, @init={0x18, 0x84, 0x0, {0x6, 0x1, 0x33, 0x400}}, @sndrcv={0x30, 0x84, 0x1, {0x0, 0x4, 0x8001, 0x5, 0xbb, 0x7f, 0x3, 0x26}}, @sndinfo={0x20, 0x84, 0x2, {0x7, 0x8004, 0xffffffffffffffe0, 0x2}}], 0xc0, 0xffffffffffffffff}, {&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0xc9}, 0x1c, &(0x7f0000000080), 0x0, &(0x7f000093ef10)=[@sndinfo={0x20, 0x84, 0x2}], 0x30}], 0x2, 0x200040c1) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000340)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) syz_emit_ethernet(0x234, &(0x7f00000000c0)=ANY=[@ANYBLOB="01936103241d523af6bcdad406fc24446680c20000000000140000000800450000119078ac14ffbbe000000100000000000890780000000000007ab97bf5f15ca9366d8461179e8df3b5bce1fd628e371839ed387b41940bb31a7f30d8c8f9c0861be3c292"], 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000000)={0x2, 0x8000, 0x0, 0x2, 0x0}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e23, 0xffffffff, @loopback={0x0, 0x1}, 0x5}}}, 0x84) 2018/04/22 09:01:00 executing program 6: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x220000) syz_extract_tcp_res(&(0x7f0000000040)={0x41424344, 0x41424344}, 0xffffffffffffffff, 0x0) syz_extract_tcp_res$synack(&(0x7f00000000c0)={0x41424344}, 0x1, 0x0) write$tun(r0, &(0x7f0000000100)={@void, @hdr={0x1, 0x0, 0x80000001, 0x7, 0x7, 0x7fff}, @ipv6={0x2, 0x6, ')\f<', 0x87, 0xbb, 0x1, @ipv4={[], [0xff, 0xff]}, @mcast1={0xff, 0x1, [], 0x1}, {[@fragment={0x87, 0x0, 0x2, 0xffffffff, 0x0, 0x9, 0x7}, @routing={0x2f, 0x6, 0x1, 0x1, 0x0, [@mcast1={0xff, 0x1, [], 0x1}, @ipv4={[], [0xff, 0xff]}, @local={0xfe, 0x80, [], 0xaa}]}], @tcp={{0x4e23, 0x4e24, r1, r2, 0x81, 0x0, 0x11, 0x82, 0x7, 0x0, 0x6, {[@mss={0x2, 0x4, 0x4}, @timestamp={0x8, 0xa, 0x4, 0x4}, @sack_perm={0x4, 0x2}, @exp_smc={0xfe, 0x6, 0xe2d4c3d9}, @exp_smc={0xfe, 0x6, 0xe2d4c3d9}, @exp_fastopen={0xfe, 0x10, 0xf989, "162a2d0dcf05dff5721c03c8"}, @nop={0x1}]}}, {"b48ca1"}}}}}, 0xb9) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip_tables_targets\x00') lseek(r3, 0x20, 0x0) 2018/04/22 09:01:00 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x2691d0877f1cca9b}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ip_vti0\x00', 0x4200}) write$tun(r1, &(0x7f00000000c0)={@pi, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @multicast1=0xe0000001, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x20) 2018/04/22 09:01:00 executing program 2: r0 = socket$inet6(0xa, 0x20008000000001, 0x8010000000000084) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000c4570000000000000000000000000000cf000000c006e830f026433b83fe799a16f644921bf456cee6f5cfb76d07dd2fb327f59a227df862a1f59fbd4c559b789cbd1acc324124dbb4b67eedd45aa9b72279b38c2a6f1ef3c97beff50799bbb147319e42c142e12d502ba174185e9e98684eed1ffd5d5dc90449042965b9f92d199d574dc3050587782065cb99b7ff90ad8ef31c69049167d836b47f9b2dcce5550930aee3efb77a369983489c235b9a2de2ae6e13db3be53ce3a2c94023a9fa5bd7c4ca6ec066b2a3d0c3609b5b26e723ee9f1d113dce332bc9ddb16f56a36986f145"], &(0x7f0000000240)=0xf3) getsockopt(r0, 0x84, 0x8000000006a, &(0x7f0000feeff8)=""/8, &(0x7f00003e4ffc)=0xfe3e) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000080)={'raw\x00'}, &(0x7f0000000100)=0x54) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) socket$inet(0x2, 0x800, 0x80000001) r3 = msgget$private(0x0, 0x610) msgsnd(r3, &(0x7f0000000280)={0x1, "a19145ffbf4683ac3f793201f2cd85c6352b5f9a209d96aeea62eba8f0f864bd2b0a757e23ed400bc3f30d1b9ca8f4dcbcd2e30ebb5c433d210f413b340e4a6b27f186d4e5e702ae781a2e5816b2134dadb4aaa3103e95870a4767ba358c4a49af848b305c855b6a21d6917ce7d3ad82f53199c462fd8ed8304e9857bc77ef400f6c45f88fcb951d527c8ed4f5a05f"}, 0x97, 0x800) setsockopt$inet_int(r2, 0x0, 0x12, &(0x7f0000000040)=0x8, 0x1) socket$inet_udp(0x2, 0x2, 0x0) 2018/04/22 09:01:00 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000ca1fc8)={&(0x7f00008dd000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000032eff0), 0x0, &(0x7f0000733fd0)}, 0x0) close(r1) sendto$unix(r0, &(0x7f0000000040)="730e962bae8805ed99e2a147474faf2aac27c85f5e7f9a456bf2823e60d2e3018b9d508e5e6b856eb89e", 0x2a, 0x40082, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x0) 2018/04/22 09:01:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f00000001c0)={0xffffffffffff74ec, 0x0, 0x0, 0x8}) writev(r0, &(0x7f00009d5ff0)=[{&(0x7f0000be9000)="440ada610000fe82fd9b56e22f9d6cd47c2ec78b000000096bc82d5d480000888413", 0x22}], 0x1) ioctl$TCSETA(r0, 0x5402, &(0x7f0000f9f000)={0x0, 0x0, 0x401}) 2018/04/22 09:01:00 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x301000, 0x0) sendmmsg$alg(r0, &(0x7f0000001980), 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) 2018/04/22 09:01:00 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r5 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1eb, 0x0) fchmodat(r5, &(0x7f00000000c0)='./file0\x00', 0x100) socket$inet6(0xa, 0x80000, 0x9) setsockopt$EBT_SO_SET_COUNTERS(r5, 0x0, 0x81, &(0x7f0000000140)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) socketpair$inet(0x2, 0x8080e, 0x100, &(0x7f0000000280)) 2018/04/22 09:01:00 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) socketpair(0x4, 0xe, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$llc_int(r6, 0x10c, 0x6, &(0x7f0000000180)=0x400, 0x4) pkey_mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000be4000/0x4000)=nil) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mprotect(&(0x7f00002b1000/0xc00000)=nil, 0xc00000, 0x7) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:00 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:01 executing program 5: mmap(&(0x7f000053b000/0x2000)=nil, 0x2000, 0x0, 0x84132, 0xffffffffffffffff, 0x0) munmap(&(0x7f000053c000/0x1000)=nil, 0x1000) mremap(&(0x7f000053b000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000053b000/0x3000)=nil) 2018/04/22 09:01:01 executing program 1: r0 = socket$inet(0x2, 0x80807, 0x11) setsockopt$inet_buf(r0, 0x0, 0x1, &(0x7f0000000100)="b6", 0x1) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000003b80)={&(0x7f0000000000)=@in={0x2, 0x0, @multicast1=0xe0000001}, 0x10, &(0x7f0000003ac0)}, 0x0) 2018/04/22 09:01:01 executing program 2: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000003e40)='/dev/cuse\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f000051cff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x3) 2018/04/22 09:01:01 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x3, 0xfffffffffffffff9}, 0x4) 2018/04/22 09:01:01 executing program 6: r0 = socket(0x11, 0x100000802, 0x0) r1 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x2) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x2691d0877f1cca9b}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'ip_vti0\x00', 0x4200}) write$tun(r1, &(0x7f00000000c0)={@pi, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @empty, @multicast1=0xe0000001, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x20) 2018/04/22 09:01:01 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:01 executing program 3: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r6 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r7 = eventfd(0x4) ioctl$VHOST_SET_VRING_CALL(r6, 0x4008af21, &(0x7f0000000000)={0x3, r7}) 2018/04/22 09:01:01 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) socketpair(0x4, 0xe, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$llc_int(r6, 0x10c, 0x6, &(0x7f0000000180)=0x400, 0x4) pkey_mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000be4000/0x4000)=nil) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:01 executing program 2: r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000b09000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000b38000)=0x3d) fcntl$setsig(r1, 0xa, 0x12) recvmmsg(r2, &(0x7f0000000300)=[{{&(0x7f0000000000)=@rc, 0xa, &(0x7f0000000280), 0x0, &(0x7f00000002c0)=""/61, 0x3d}}], 0x1, 0x0, &(0x7f0000000340)={0x77359400}) r3 = dup2(r1, r2) r4 = semget$private(0x0, 0x6, 0x20) semctl$GETVAL(r4, 0x3, 0xc, &(0x7f0000000080)=""/71) getpgrp(r0) fcntl$setown(r3, 0x8, r0) tkill(r0, 0x16) 2018/04/22 09:01:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2040, 0x0) ioctl$sock_ipx_SIOCGIFADDR(r2, 0x8915, &(0x7f0000000040)={'ip6_vti0\x00', {0x4, 0xe31, 0x80000000, "84ef2ea293aa", 0x7}}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) 2018/04/22 09:01:01 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000380)='proc\x00', 0x0, &(0x7f0000002980)) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x10) r1 = msgget$private(0x0, 0x400) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000000)=""/56) unshare(0x28060400) socket$inet_sctp(0x2, 0x1, 0x84) fstat(r0, &(0x7f0000000100)) 2018/04/22 09:01:01 executing program 1: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect(r0, &(0x7f00000fefe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x10) syz_emit_ethernet(0x66, &(0x7f00000f8000)={@random="cd390b081bf2", @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, [], {@ipv6={0x86dd, {0x0, 0x6, "a2fbe8", 0x30, 0x3a, 0x0, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9433df", 0x0, 0x0, 0x0, @mcast2={0xff, 0x2, [], 0x1}, @loopback={0x0, 0x1}}}}}}}}, 0x0) 2018/04/22 09:01:01 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:01 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) socketpair(0x4, 0xe, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$llc_int(r6, 0x10c, 0x6, &(0x7f0000000180)=0x400, 0x4) pkey_mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000be4000/0x4000)=nil) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:01 executing program 3: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140)='keyring\x00', 0x0) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) r6 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_percpu\x00', 0x0, 0x0) r7 = semget(0x3, 0x4, 0x500) semctl$SEM_STAT(r7, 0x4, 0x12, &(0x7f0000000580)=""/64) sendmsg$unix(r6, &(0x7f0000000540)={&(0x7f0000000480)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000280)="8f2df8a2beeacdd2381096e5823d96d6f3cd", 0x12}], 0x1, 0x0, 0x0, 0x5}, 0x4008000) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r8 = semget$private(0x0, 0x3, 0x1) semctl$SEM_INFO(r8, 0x7, 0x13, &(0x7f0000000300)=""/117) 2018/04/22 09:01:01 executing program 6: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) socketpair(0x4, 0xe, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$llc_int(r6, 0x10c, 0x6, &(0x7f0000000180)=0x400, 0x4) pkey_mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000be4000/0x4000)=nil) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:01 executing program 4: socketpair$unix(0x1, 0xfffffffff7fffffc, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x81}, {0x6}]}, 0x10) socket$inet6(0xa, 0x0, 0x9) socket$inet6(0xa, 0x7, 0x2) 2018/04/22 09:01:01 executing program 1: r0 = socket(0x10, 0x803, 0x0) recvmsg(r0, &(0x7f00000014c0)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f00000012c0)=""/83, 0x53}], 0x2, &(0x7f00000013c0)=""/208, 0xd0}, 0x0) 2018/04/22 09:01:01 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000a7dfff)}, 0xa00000400, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000dba000)='./file0\x00', &(0x7f0000000680)='./file0/file0\x00', &(0x7f000015bffc)='9p\x00', 0x1100000, &(0x7f00000006c0)) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='tracefs\x00', 0x400, &(0x7f0000000140)="9933a5a1735861e4bc985a6147b0be00f0dcd7d363401a6bcf4cb5968c8f86cca30befc004dbac5154af75d88693d7b04918fb5693ce53412a9c27f9397c334224d1eb7e47f7a73957e75ff056cd35e60f113a47b9a9bfba4866ee0fc5d939931baab151fb7179e8bc3ce026d2675296af643d638fbe51348539a77b89256ca576ac45408886211ad24596d0e67e31eb572fac2ad4ee96e42c4b886e6ccf4a7c4b74f18e31729c5d6f442914cb008d6d5457639131343b83b9086187aa47ad1097c5fa9b955f8529") bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x2, 0x2, &(0x7f00000000c0)=@raw=[@exit={0x95}], &(0x7f0000000240)='syzkaller\x00', 0x7, 0xeb, &(0x7f0000000280)=""/235, 0x40f00, 0x1}, 0x48) bpf$OBJ_GET_PROG(0x7, &(0x7f00000004c0)={&(0x7f0000000440)='./file0/file0\x00', 0x0, 0x8}, 0x10) mount(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='./file0/file0\x00', &(0x7f00000005c0)='hfs\x00', 0x148004, &(0x7f0000000600)="de2d6fd95183f4f79c68ee668a8304773030c96a6b88566a05307f7b04b9b607a743df633d23df0e93f5439c6c264fc6750056a5e6fe8c4743e95f5f95cc1a3e424bcda4053f6b50ea1e40e38b") bpf$OBJ_GET_PROG(0x7, &(0x7f0000000480)={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x10) socketpair(0x13, 0x7ff, 0x5, &(0x7f0000000500)) 2018/04/22 09:01:01 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)={0xc0, r6, 0x302, 0x70bd27, 0x25dfdbfc, {0x9}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x31}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x2}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x800}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xa86e}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x20000800}, 0x4000) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:02 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:02 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r5, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)={0xc0, r6, 0x302, 0x70bd27, 0x25dfdbfc, {0x9}, [@IPVS_CMD_ATTR_SERVICE={0x3c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x31}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x2}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x800}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xa86e}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast=0xffffffff}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x20000800}, 0x4000) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:02 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) socketpair(0x4, 0xe, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$llc_int(r6, 0x10c, 0x6, &(0x7f0000000180)=0x400, 0x4) pkey_mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000be4000/0x4000)=nil) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:02 executing program 1: unshare(0x40600) r0 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)) 2018/04/22 09:01:02 executing program 5: r0 = memfd_create(&(0x7f00000001c0)='\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000300)={'#! ', './file0', [{0x20, '\x00'}], 0xa}, 0xd) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000000)=""/1) execveat(r0, &(0x7f0000ff7000)='./file0\x00', &(0x7f00000002c0), &(0x7f000034bff8)=[&(0x7f0000ff7000)="00000000000000060804002000fffc0c6565643b799365005f1b76"], 0x1000) 2018/04/22 09:01:02 executing program 6: capset(&(0x7f0000000040)={0x4000019980330}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5a72df60}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key(&(0x7f0000000000)='syzkaller\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r1) r3 = semget(0x3, 0xcac056e548d8e1f1, 0x201) semctl$IPC_INFO(r3, 0x5, 0x3, &(0x7f00000001c0)=""/162) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='sit0\x00', 0x10) add_key(&(0x7f0000000280)='rxrpc_s\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="317deba9e9ccafd8a030e286a3d784389ad3ec9846643e398baea978ef0a83bae276edc4bc40eac852c172b8bd04f862c55d83f317a9582583b9d53bc37ce8b3bd6f2dbce166737e8653f58561561e9c829171825591f2568e819e53af8b250fbe55712df096a1ce12865317fdec7f4e7c42636567bb9bd8e065775518ffbadc682ad52a9d23a303df53585d41a9f996d47917ac4396b1fdff3b3bd178bf3c1e90c54fcc547261d3c22034368479bd1bb9790b7e5a34d22539a467dbf6d67b39dec11805ba599efc64566baee5e02beb6f318479c0728a803047a11c9661610e944c9f258f38995abb5e46e395179943d39ff13a27b02c73", 0xf8, r2) 2018/04/22 09:01:02 executing program 2: mkdir(&(0x7f0000fddff8)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0/file0\x00', 0x40) r0 = open(&(0x7f0000f51ff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000df2000)='./file0/file0\x00', &(0x7f0000a16ff8)='.', &(0x7f0000a42000)='\x00v\t', 0x1001, &(0x7f0000f8e000)) unlinkat(r0, &(0x7f000057d000)='./file0\x00', 0x200) mount(&(0x7f0000c08000)='./file0\x00', &(0x7f00006b7000)='.', &(0x7f00005e9000)='cifs\x00', 0x6004, &(0x7f0000ad5000)) 2018/04/22 09:01:02 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x8000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001c00)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000001d00)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000001e00)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e20, 0xfffffffffffffffe, 0x4e23, 0x7, 0xa, 0x20, 0xa0, 0x87, r8, r9}, {0x0, 0x44, 0x9, 0x3, 0xfc7, 0xff, 0x8000, 0x20}, {0xa9e, 0x400, 0xcf4, 0x20}, 0x6, 0x6e6bbb, 0x0, 0x1, 0x2, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x20}, 0x4d5, 0x33}, 0x0, @in6, 0x3506, 0x1, 0x3, 0x7, 0x6fb6, 0x7fff, 0x3}}, 0xe8) mq_timedreceive(r5, &(0x7f0000000600)=""/4096, 0x1000, 0x80, &(0x7f0000000140)={r6, r7+10000000}) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:02 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x5452, &(0x7f0000000080)=0x8) r2 = semget(0x3, 0x2, 0x4) semop(r2, &(0x7f0000000040)=[{0x0, 0xccfd, 0x1800}, {0x3, 0x8, 0x1000}, {0x4, 0x6d0, 0x1800}, {0x0, 0x0, 0x800}, {0x3, 0x3, 0x1000}], 0x5) close(r1) 2018/04/22 09:01:03 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r2 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r2, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:03 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xee7c0eae4fc361af}, 0xff89, &(0x7f0000000480)={&(0x7f0000000740)={0xfffffffffffffedc, r0, 0x0, 0x70bd28, 0xffffffffffffffff, {0x10}}, 0xa8}, 0x1, 0x0, 0x0, 0x4010}, 0x4000010) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x1f, &(0x7f00000002c0)=""/152, &(0x7f0000000080)=0x98) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f00000001c0)={{0x5e, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'ovf\x00'}, {@empty, 0x0, 0x0, 0x0, 0x80, 0x4}}, 0x44) nanosleep(&(0x7f0000000440), &(0x7f0000000500)) syz_open_dev$sndpcmp(&(0x7f0000000700)='/dev/snd/pcmC#D#p\x00', 0xfff, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000540)=ANY=[@ANYBLOB="49c9d4c9", @ANYRES32=0x0], &(0x7f0000000580)=0x8) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000180)={0x3}, 0x2) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) sync() getsockopt$inet_tcp_buf(r2, 0x6, 0xb, &(0x7f00000005c0)=""/240, &(0x7f00000006c0)=0xf0) 2018/04/22 09:01:03 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x1}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000180)={r1, 0xe05a}, 0x8) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x2, 0x71, r0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, &(0x7f0000527ff8)=0x7fff, 0x401c, 0x0) get_mempolicy(&(0x7f000029a000), &(0x7f00003e8000), 0x401, &(0x7f0000377000/0x1000)=nil, 0x2) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000080)=0x7fffffff, 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000200)={0x0, 0x3}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000280)={0xc24, 0x6, 0x8, 0x0, r3}, &(0x7f00000002c0)=0x10) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000040)=""/21) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f00000000c0)=0x4) 2018/04/22 09:01:03 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f000048d000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00009f9000)={0x0, 0x0, &(0x7f0000d58ff0)=[{&(0x7f00003faf57)='>', 0x1}], 0x1, &(0x7f0000000000)=[@iv={0xc8, 0x117, 0x2, 0xad, "834c9726a310d28fdf7391d65eeeb8478f75bd2136096d09129268503185beefdc70cac91e7d0649b8adc61289200dd0d6b0e80e32b812effcfbcdba5bb8c567b7a916025e815ba090bff7ac583a0698fdfec135118b06e2fdf73a78c7bcfab9899e8ec4cf0543db8029cc1600ae971f2d4985d4b962a08a21827161fb82d5115b18af4ff9a10879ec8ae73ed674ffc598efa70ced6bd7bc650c39b738bb018cdc87d269f89c553e2b8c4e0b6e"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0xc0}, @assoc={0x18, 0x117, 0x4, 0xfffffffffffff000}, @iv={0x110, 0x117, 0x2, 0xfa, "ed4a55a8378b0459d136cf78e78ebc170b83766d99de06c0c368558375ead09c1d5dfb6365598aa20d0a156f543a385f47e8f3b484e0baf0e2c5cd59be31375c3dd8975e57a0ea85207ed876c20cd38a5dee82f1e709fb2ccaf39ff2cb77b2fbfd5be9555d399f47fb13c38c42578c2f9321ead0c4193f4ec25ad1dbe191b220df817091e0f15f3ba4415c679cbae64f3a38e6b7dcf4e80eeac27e76fb5358a470aff77dc01ec0170d92a56d282bc79455659092e861548f5a05663b2de126de1707d3b7191f58a3cd9a04e0ebf896fb8ade96cafc83be1a091c98a28f3aea42b82337a3b8097ece3fec3a24937436a3a2e2670b29fac8cb908d"}, @iv={0x50, 0x117, 0x2, 0x35, "d7f35c67d556ffbea6e2b2d12154109dda748d36bfc315e4551cc9a99d8b42dabb51dc4b4108f02bb49880cc41c28a559a237504f8"}], 0x288}, 0x8000) r2 = open(&(0x7f00004b8ff8)='./file0\x00', 0x28042, 0x0) fallocate(r2, 0x0, 0x0, 0x1ff) sendfile(r1, r2, &(0x7f0000ccb000), 0x357) 2018/04/22 09:01:03 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x3, 0x20a040) getsockopt$inet_int(r5, 0x0, 0x21, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 2018/04/22 09:01:03 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x8000) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000001c00)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000001d00)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast1}}, &(0x7f0000001e00)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000001e40)={{{@in=@remote={0xac, 0x14, 0x14, 0xbb}, @in6=@local={0xfe, 0x80, [], 0xaa}, 0x4e20, 0xfffffffffffffffe, 0x4e23, 0x7, 0xa, 0x20, 0xa0, 0x87, r8, r9}, {0x0, 0x44, 0x9, 0x3, 0xfc7, 0xff, 0x8000, 0x20}, {0xa9e, 0x400, 0xcf4, 0x20}, 0x6, 0x6e6bbb, 0x0, 0x1, 0x2, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0x20}, 0x4d5, 0x33}, 0x0, @in6, 0x3506, 0x1, 0x3, 0x7, 0x6fb6, 0x7fff, 0x3}}, 0xe8) mq_timedreceive(r5, &(0x7f0000000600)=""/4096, 0x1000, 0x80, &(0x7f0000000140)={r6, r7+10000000}) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:03 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) socketpair(0x4, 0xe, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$llc_int(r6, 0x10c, 0x6, &(0x7f0000000180)=0x400, 0x4) pkey_mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mremap(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000be4000/0x4000)=nil) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:03 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000400)=0xafb, 0x4) ioctl$sock_SIOCGIFCONF(r3, 0x8910, &(0x7f00000003c0)=@req={0x28, &(0x7f0000000380)={'ip6tnl0\x00', @ifru_map={0x1, 0x4, 0x2080, 0x6, 0x1, 0x101}}}) fgetxattr(r3, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) getsockname$packet(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000580)=0x14) sendto$packet(r3, &(0x7f0000000440)="2d8ef448aafd02a4d268b7439fcc0d45cace", 0x12, 0x40800, &(0x7f00000005c0)={0x11, 0x8, r4, 0x1, 0x5, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 2018/04/22 09:01:03 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$unlink(0x9, r2, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:03 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f00000d4000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) r0 = creat(&(0x7f000016cff8)='./file0/file0\x00', 0x0) mount(&(0x7f0000000500)='./file0/file0\x00', &(0x7f0000959ff2)='./file0\x00', &(0x7f0000000440)="4d153dfaffdd9fd744f49ac3ca524998e9a5c70509605abcd0445a0fd930956052dc3daeae91347dc29d19dcf1959da47e4f74d9abbfedc6ac9b37ba75962f15f60b1059aee5436edd1ef45cf0fba173cfffd014822d6c755a250000000000b40cc657aeb1e419008bc76ae3a7b0e40000000000000000000000000000000000000000", 0x2105403, &(0x7f0000000240)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@ipv4={[], [], @rand_addr}}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000180)=0xe8) accept4$unix(r0, &(0x7f0000000000), &(0x7f00000001c0)=0x6e, 0x80800) 2018/04/22 09:01:03 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, 0x0) r2 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:03 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) socketpair(0x4, 0xe, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$llc_int(r6, 0x10c, 0x6, &(0x7f0000000180)=0x400, 0x4) pkey_mprotect(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:03 executing program 5: r0 = socket$inet6(0xa, 0x80f, 0x2) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e21, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x7}, {0xa, 0x4e21, 0xffffffffffffaa87, @dev={0xfe, 0x80, [], 0x21}, 0x7}, 0xfffffffffffffffe, [0xffff, 0x7fff, 0x8, 0x100000001, 0x100, 0x5fcf, 0x0, 0x4]}, 0x5c) setsockopt$inet6_int(r0, 0x29, 0xcf, &(0x7f00000000c0)=0x9, 0x4) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000000), 0x2b9) fcntl$addseals(r0, 0x409, 0x0) 2018/04/22 09:01:03 executing program 6: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x50, &(0x7f0000000100)}, 0x10) preadv(0xffffffffffffffff, &(0x7f0000000240), 0x298, 0x0) 2018/04/22 09:01:03 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xee7c0eae4fc361af}, 0xff89, &(0x7f0000000480)={&(0x7f0000000740)={0xfffffffffffffedc, r0, 0x0, 0x70bd28, 0xffffffffffffffff, {0x10}}, 0xa8}, 0x1, 0x0, 0x0, 0x4010}, 0x4000010) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000614000)="74086e750000000000000000008c00", 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f0000000040)="aa", 0x1}], 0x1, 0x0) getsockopt$inet_tcp_buf(r2, 0x6, 0x1f, &(0x7f00000002c0)=""/152, &(0x7f0000000080)=0x98) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) setsockopt$IP_VS_SO_SET_EDITDEST(r2, 0x0, 0x489, &(0x7f00000001c0)={{0x5e, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'ovf\x00'}, {@empty, 0x0, 0x0, 0x0, 0x80, 0x4}}, 0x44) nanosleep(&(0x7f0000000440), &(0x7f0000000500)) syz_open_dev$sndpcmp(&(0x7f0000000700)='/dev/snd/pcmC#D#p\x00', 0xfff, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) readv(0xffffffffffffffff, &(0x7f0000000140), 0x0) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000540)=ANY=[@ANYBLOB="49c9d4c9", @ANYRES32=0x0], &(0x7f0000000580)=0x8) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000180)={0x3}, 0x2) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f00000000c0), &(0x7f0000000140)=0x4) sync() getsockopt$inet_tcp_buf(r2, 0x6, 0xb, &(0x7f00000005c0)=""/240, &(0x7f00000006c0)=0xf0) 2018/04/22 09:01:03 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000400)=0xafb, 0x4) ioctl$sock_SIOCGIFCONF(r3, 0x8910, &(0x7f00000003c0)=@req={0x28, &(0x7f0000000380)={'ip6tnl0\x00', @ifru_map={0x1, 0x4, 0x2080, 0x6, 0x1, 0x101}}}) fgetxattr(r3, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) getsockname$packet(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000580)=0x14) sendto$packet(r3, &(0x7f0000000440)="2d8ef448aafd02a4d268b7439fcc0d45cace", 0x12, 0x40800, &(0x7f00000005c0)={0x11, 0x8, r4, 0x1, 0x5, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 2018/04/22 09:01:03 executing program 5: clone(0x200, &(0x7f0000fbf000), &(0x7f0000744000), &(0x7f0000f8b000), &(0x7f0000000040)) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f00000affc0), &(0x7f0000b5aff8)) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='personality\x00') preadv(r1, &(0x7f0000538ff8)=[{&(0x7f000010dff1)=""/15, 0xa}], 0x372, 0x0) execve(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100), &(0x7f0000000580)) open$dir(&(0x7f0000000340)='./file0\x00', 0x26102, 0x0) 2018/04/22 09:01:03 executing program 2: prlimit64(0x0, 0x7, &(0x7f0000d41000), &(0x7f00009d8ff0)) signalfd(0xffffffffffffffff, &(0x7f00008e6ff8), 0x8) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={"73797a5f74756e00000000000400", &(0x7f0000000080)=ANY=[@ANYBLOB="050000000000110012f5e5823f0921be3588b28fc4ce36aff95b8aebc814eb1257fa5c"]}) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x100000001, 0x414d40) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x68, "639916ec7e091a7cfa31882395756c0062535f0f2e7b117a0b46c71dbb3c12eda032fe3498e98b52ea7be0fa19f16b930b569dd6759b84c40ed171fb3a8be72a1f997219d5aaa7d606bca51c8362f6ae1e26d3ee5e93d4a37ee926a8dd9ce1c405b695e0202bbdae"}, &(0x7f0000000140)=0x70) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000180)={r2, @in6={{0xa, 0x4e23, 0xfffffffffffffffa, @local={0xfe, 0x80, [], 0xaa}, 0x100000000}}, 0x4, 0x9, 0x3f, 0x101, 0x1}, 0x98) 2018/04/22 09:01:03 executing program 3: add_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) clock_gettime(0x7, &(0x7f0000000080)) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:03 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r1) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:03 executing program 6: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, r0, 0x3) 2018/04/22 09:01:03 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) socketpair(0x4, 0xe, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$llc_int(r6, 0x10c, 0x6, &(0x7f0000000180)=0x400, 0x4) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:03 executing program 4: r0 = socket(0x18, 0x0, 0x2) bind$netrom(r0, &(0x7f00000002c0)=@full={{0x3, {"ff1627183a7516"}, 0x8}, [{"563f6552bc695f"}, {"a434e0edf3d173"}, {"a9636a277ece17"}, {"235d415ff9c66a"}, {"4a02c3eb2263b9"}, {"3c509fc5c011fe"}, {"24f87c2fe3daef"}, {"74d3f5e4e22075"}]}, 0x3) connect$bt_rfcomm(r0, &(0x7f0000000000)={0x1f, {0x3101, 0xff, 0x4, 0x7, 0x23, 0x9}, 0xa20b}, 0xa) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "b7a7a914a5a29744e39c60ef5b244460cb89d4d2be426fca22ff1dfbf3d78dca45fbb1d022f1f33cbb5bba0ada2b40a86bbca42a2fa444572f91f949bcd13e"}, 0x60) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000100)={0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/04/22 09:01:04 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000400)=0xafb, 0x4) ioctl$sock_SIOCGIFCONF(r3, 0x8910, &(0x7f00000003c0)=@req={0x28, &(0x7f0000000380)={'ip6tnl0\x00', @ifru_map={0x1, 0x4, 0x2080, 0x6, 0x1, 0x101}}}) fgetxattr(r3, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) getsockname$packet(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000580)=0x14) sendto$packet(r3, &(0x7f0000000440)="2d8ef448aafd02a4d268b7439fcc0d45cace", 0x12, 0x40800, &(0x7f00000005c0)={0x11, 0x8, r4, 0x1, 0x5, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 2018/04/22 09:01:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) socketpair(0x4, 0xe, 0x0, &(0x7f0000000140)) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:04 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x6220accb86105377, 0x0) ioctl$sock_netrom_SIOCGSTAMP(r0, 0x8906, &(0x7f00000001c0)) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000200)=0x2, 0x4) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r2 = socket(0x11, 0x100000802, 0x0) r3 = syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000100)={'syz_tun\x00', 0x1}) shmget(0x2, 0x4000, 0x100, &(0x7f0000ffb000/0x4000)=nil) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'ifb0\x00', 0xa201}) 2018/04/22 09:01:04 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:04 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect(r0, &(0x7f00000fefe4)=@in6={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) sendmsg(r0, &(0x7f00000c8fc8)={0x0, 0x0, &(0x7f00000e5000)=[{&(0x7f0000063ffb)="d5c0", 0x2}], 0x1, &(0x7f0000000100)=[{0x30, 0x103, 0xff, "deb9c0ceef64ceb74dfb62e35841bb95fac32f62aa4670166ad784"}, {0x1010, 0x97a41f435dc079e5, 0x7, "1945793c01345a0e31e44c85c0049cf13c050dc2811e03078721cc93b993dcbc2f5845d6392cbc3becbdc1e27b3b537d1bd17daba884e786724b6f8ea503940676a4c5bf8c4c665f2f5fb43d76f299db586d6fbb580841e138fbc1df992255c087337c0753e4174cbd91f45f9f2c05be4076cfbc32db6215ca33ba5a3979f939e0d4a4b51d618f7972c0542915adc32499937bee06d6f3c8be68df7193145d9d88c0ed0aa948cfd5b82a5aabb8633c70ca38608331de73781089a0945be8d5e261772a6eeb36b1cb355f1bf01a8ff6e2c9f394e0c2b25dd76a7548f7cdd549b8ae12d8d279489ff6df25355e00ee037b07149066ec0df4619cff79a3e499157af1c94ed64aa525e02ecef0f4265c03f66a5964d16993f08b401cdedcbac727d5f4262e1a40cdd5903856d7ffafff532bc50f2f1286796777bcc732ca851e24de3de6238dd62d94f4e351a8a434cf6472d4eeb25c63199e929257b95144578c453a7f39853dbe241f9bf9c9b14467daa2bcea17d4490f7a1110ecf39fa510427095c46af1ab466a139f7f6f13469d3f34f6d7e72c04cc4046585554f83edf92a0ece22928db878bd67209d6dc14aab69786ca4e8211d6d98a0ef443b249abb7a669e47748ceddd67a0ebb630014799a2883c502f01598567b66b47018e9dbbec313c78cc1397adcb8b8b9040cb301a9460849e95291ef9af08fcac7a042ead180874583b69fdfc4c27f29122e3ace9dc0044b530bedd403f8b5eaaaee6092583576d4fb88391f65413ded6acefe83c18f0ddb5aecd856b9c73a4fdc27631f144998bd7532d9d0c9b1abfe4d74a3dbb40b3935d80031dbe6d716954eb41a5a977eb74d2ab390bd27d077dfdd7a55e048c94b4842baa341c5ac41678d824420240afb02c05000064b66cfd1cf6fdbf98d5d41126f127593ccdc5f0e0d1417dba4b5d8bc9673796b2c6fa60d92cbead7bbeb0d5c9d82301d69c4d234e870ff696b3eca02d2a2672923961c0254e3de4f69f71c39a0aa2430f2a0adc9169d7a0eb37afd287b1f52a412c83bbadd85c6ac0058578eb592972c439b20972a9820119e3207f553939a61c5531bea757f047e5b9bb9e8c8b4951257d44c20bd6e170fb1fe372eba3e419ea03857d0dbc57e567522280bb5be3b97f6cfb686e538a4473b6fa2e5aed435784d99ec70addc16669a1b5e29246240cd3165b125a2320db955a6d4880b22a656bb14a6078975101d5102d71b1f9446814968ec55bb98417db63def7962828878d1fe0218673c82984ce9192b1447c9687d082d029b558dffd7ca4465a045400a87b02e07b242e47b4d78a38a18fa8c17febfc7605ed722771cf66b47e1db40543d04be9ce52cd7d90c2728e2d61bb2e13b34830fa2faf321bffebb862a4cf08e44911f1cdd5d3ab942a952e4547fec92eb6a1e90b31c65594ded3a81b6911a2303b6a4f7743f43d7a825fc5677656a73ecd3485f9dbe2bbc25c47f303097916b8c6590af20d2e8b23834c4391fcfd7971a06edc7e9c4a03c1a88e9b5ccef381850ae89bb9298394e8e43b98b3740c3d068dc64b310f0c6e7e72261e1e0c341048fb18fc453dc01aa7a59f12894f9f7a94f71ff50f6ea076952c8d7d2a459b3acc286555724ba1b020dc4194a653bd9423f0c4ede40cb5c96e1e4a78e5ded17931a29077b763f30420b11ff1d66d12126e29e457cbccc9c7cf905c6ce3ea9b8b4e7759ea4dab4b86b40683fad02851c06017e6c4b1f2a4dfce30829e933d721fe470b05537e7df3807f01112b999fdfbd6aa4a02c31f438de6e1a66e857cdeb18029177b15b9df321455a49d803e6ae83e8d6ea8d6773a9ae157327cef9df8e8d0a08d69c427c0e94b342fd20db54c7840c3a2fa64d9be09c2c355c3f597174ea6055c1ca4daf71a09571169f48641c7cb37146b453b3aad88096390c1fd2a2892384c7d933156f2182a00a299676d599d9dbd14c336bebb2a9b188ab67d69897e2a642da1574407c8b7ad38c91e0f1a97c790d3a90c8015772afa9c71e9bb326db2c7cfcbb5631f6b2400ecbf19ebb49f8cc4ea9ad83f986e8e09a0a3f0c28dc3b88a5cff1cde9ee7ed121e662852b011cd4ca593c1b316fa830e1a2308afeed040396d488a2c299e5fd333e30fd3f9f07750da1a80c7dcb4bc466b171d9a9666d99ac526e1670865712a57ee3e4e4e9d8c9f1d6887d151017b0a12ab3433beb88a772d0b93f4db5d53e55feeaacc0c9c18e187996359dcd926fc8286ccbe20c162b560c03875423457e1ab1bf46045f557fe575e6b309be8dcff3cc3162881f325868baf3978b52fd7dedb17289458f5c6ce365985ed194e602d13bc128e162ff6a8bf21f1b1d23e66deba77b3f6db29ecf6e2b9fb6b15b057530a07bc9f841580534a0d3ca16909b2b3be108e26b1c033fe08dec813d19191421ee8e32a34bfa8890a285ae2e73e0da082e0337b6774e3ad89cb9f9363bb655a4c63f1531ee88722bef13581e3f33c17b46dd09cc3dfa53e2d79fe439a47e8d8c912c48905ac80ef084e1d84f88dd4ae1cd8292ff8b05b315681f0b92698c1ee0e4279b98cc5e766dcc8b41e95678565da3b0cf4a3c6af5f292fa073b31bdff2789d50caa08d4c7e197f68ab61dcea49b62c74b884db1b65788003c66c33eab67727eaa5f06f1cd304013dad44e19d6a8f6b3e0e671f61ce5d02d9c45a1c6254ce69001175098320926e1a6f384d6e422ac8f89aced9c2e10d88dffb74a5943ad4518ef29ce07609abcdb115746cd1b1478059745acb39eb988537da29727d4385ab3aa6b8fa0cb1913a25ba3bfba233eb76464cb7d26cbd5c30e7161d82568856f049bcf991e9015ee11fa76c1b68ae135a730bead6796adbbb815af90eedd8999e2902fa86a764f9d2dd1dbebe48c587d2fe792892617b79e07da5f3868775521daab6f3b14ab82073509fa103bae044269539cb5a029d0a9e7bdb0918659f88d2eaebd4f4001ca7b34bca0212ef13d588615abb27de26989a4745501e135550c3c71b2f6e65d09c69e70c3bed5e32a4a56639337cfe3a3b9be28ebecfebb015c3aefcb6f1869ec9f107b521bdf1b23369350cad9deb1aba05c7f7486f49f0c8e787295c219f33a1460e223fdc974f46c8b1c4f7e4decd5816fe4cfe416c0e845db8db778041c58ad1fded0a0141485aae4f93ac8fb8430b27273f08ac28c5effe046c7cbe7b2bdf4df2b954846100f00ae724d6e688cbcb4a4c2557b36e62b5dffa07216b39b368185cfa64abc29be917c4dac33e84a043b1f6aebf400067be7afd2328c11b6ba3c4d364d3f1271a659589022be75ed473b016b45b065df7544589b412528cc19e40106fce35201a0d697fbecb8a222d86a5f6d601eaeba8269a1166f74c06e664a62f4fc324cc202d89f3cfdb7a9fcc528d230da50ddb6c852e5ef2ff2ad3caf2efaa77e64435c5fb12b842c36650afbe7a64bac101b06a4f9433d599fa1bf48a22a139c432a9002d4da00c04778717b3a51c6a561a930e67316ea23404b7e2de95b4433e9bbbfb69b25c2fead94eaec8649657f96c561fb15acfc4ad2fb05ab115965f8c76ee438ee888c3463f9f78b4af49776ef8bf35528f0d84155ce034897c5fb0923974b5e30f4454c26b56c2489ff2866cd1ff584723ce8dd4dfe025ea697c32aa5183ebee04c7b4f5957e67ac8aeae0e72a797e1aaf52729404e8adb5835782dfb3b47151c751649a8bbd687d1f9b197eac0db9b8266c7a3562ff1c0053b3b5945ab0737b250339f958c770d6e24c12c65aaa2e4dc830f7711622b04fb31cc4116fee2f932a582a4d01b7de696ecab3805be3bea8e60e9d46c37308530a3466ddb01585f2b0eeff0d6820a49ed1780157e787f9c3e458cf6a7a4823719ab14857b45d47b3cd6aa21f224ef38eb11463032a4bd1bf18bf13116168189fd019c815eb2e9988e6677d52883a6a50791ceeced677a73b0611e4e4d57330ceb2c17953f637f5fe04540568e41a484b77c95e020e47f913abdacbd51420d1a4468d0c97be2a4a0686c76b0d8d12eb4d01a874dec32763d9e271346360b15da59f443f75483b7988f1d439692cd0a3f801b8bf364e266a414bce82dfc44f1570da0a0fb53147f6d18d013fa8ba0332ddf70262f5a4b27eee78483bfb14c46b45aa472013ed650fb3c6da6cdecfeaa660667767da6f5732651cde6a7cd9c3461e79de88f8b075e1281894ca1768f109ae59e04651b9684c200417e64b045e954ace114b361417b583c7a4344a0a46aaa094a866462320d26612b069cce2ed31e33928faa738e046f4676b728972112692f48aeac9c6557e2dbccbf1777e8cb49cf1a2d11167d6a4f4db12265c7bed26e5db2d2783f7049f376ca6881a10d6e8ddffbaf7e9cdf9b1ab7fcbc59523b2f9464a9e8668edcddba4c64b648abdd7c400e36134fbbd16a65c62a5b773f2e9760cef16b328247d9df89685e98649515a2047c25ae8ab041979959090ee269687b5636066d1a4898f2a901ad60f98dfedac4a39acc479809073b62d4dc1797c60f6309b3e5a8d6b7faf16496e71b77da029b7e9472b8ed0a8f9c67168f63a324065b9834d34f67a3e178482ca2d0685015d520f84a1123ce361333e114f0285357796e0d795d042558db4bf254a7cba965dcd58b9c63442b3fcce4d0d7b84b146a0adecb9568af7992cf304a2460c7a7420d76b689aef5c482f1cabc96998131b961502fac8a961aa894daa8c90949f6ec1a72374ebe13ec86c920ec5aa590455a9f262ce12359fa8ca5a92ed370d4c52c95002b461978746c20c33adecb528384d1dc2200b736441bc7e479a9ce733b828de687aa9602a7ba25c9beedda0919cd1e9a5d45920a417b5545165a50f083ace326ff814fbfe8015e20b186322742cff44cf086febed6a82e4ea90be82d722004a60007695f6f471834fa29b426b65a1e2672f9541f921f4c849513d354fa31a6fb9487e8cfd4bbb28b43b84304953086fc5052963812b5ba96f3926037dcadfbec6f4b4fadff62c68219df535131afcc53523191d66b7c0db38c9d73edadfc07f26d569cc7c1fb1b1bd2c1b370618de112dbd21f32b8c4c46f2f6cdb82d6de9a750391ed05ee5623d71f486e73f40036a0d79a80cc3a4db2d0bdba8978ae78ec2fd19f7028c841025dd1c5f5823df47544adc7ac705b4f38dfdab2c6979c539fffed397d218592cde9494168a0e199355f5fc61bdff51d858d4a60fa4997f8c9cd18f9242d24f977119e69967f84e756cb8d8d5e2d79346514685d64af685006079bac5769249cd28ac6e93a7f8d41126fd9834f423ff8af76cc5fbecac8bbd743d5fda996b62b785592787c3ccf5168ad69afd080c17ebc60ec3c4642de59d320c997ea9f3f4d188f720a2a27473fb7aed1182207a8f1c65d6935562d54cd2e61c60b1f9c6607e42442ef4198f309953bc6bdbd3fa93a4448bea329038637add95cecf5ed68cbf8a6831f952fd9504ca8ee6095125ec9a2152cc61317d9d1d5c23c3adfab0b063283a775069ee2b956b7c43a4fe9ba98714c81318d9cc54a6b2bcd5bbd71f34c1af5757333f851fda3ceab77cf98c91a6c75b3538b5f8dfb0b6dad1dda0766bf3e71e8eff140a3361ff5ae3c531fb9caa2a5e40f3d5bab1ae88112a606d29999f7a0f334b0e7333a2d290852e29c85eb804c34945c75011a27991a7085f7fc65c26e63a669d798e65534896707eb110b708fafe26800e9b378672eb96eb9811f9e6ee61e648911d2a6c3a7c856c148"}], 0x1040}, 0x0) 2018/04/22 09:01:04 executing program 5: perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}, 0x2000003ff, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00007fc000)='nfs\x00', 0x0, &(0x7f000000a000)) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/118, 0x76) 2018/04/22 09:01:04 executing program 6: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x100000000040, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(r0, r1, &(0x7f0000000040)=0x3f, 0xffffffffffffff4c) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 2018/04/22 09:01:04 executing program 7: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r1) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:04 executing program 6: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x121000) connect$ax25(r1, &(0x7f0000000180)={0x3, {"cc34d3b647af1e"}, 0x5}, 0x10) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x80) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000000c0)={0x9aca, 0x9, 0x1000, 0xffffffffffffffe1, 0x5, 0x81, 0x2176, 0x0, 0x7d1, 0x8, 0x5, 0x2ec000}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)=0x6f687b8d) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000001c0)={0x1, 0x2, 0x77d, 0x7, 0x94c, 0x1000, 0x2, 0x2b, 0x400, 0x100000001, 0xfffffffffffffffd, 0x3f}) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000100)={0x50, 0x3be903fb, 0x200000000, 0x8, 0x1f, 0x7, 0xff, 0x8d08, 0xffffffffffffffff, 0x3, 0x5, 0x8000}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x6, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'wrr\x00'}, 0x2c) 2018/04/22 09:01:04 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000400)=0xafb, 0x4) ioctl$sock_SIOCGIFCONF(r3, 0x8910, &(0x7f00000003c0)=@req={0x28, &(0x7f0000000380)={'ip6tnl0\x00', @ifru_map={0x1, 0x4, 0x2080, 0x6, 0x1, 0x101}}}) fgetxattr(r3, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) getsockname$packet(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000580)=0x14) sendto$packet(r3, &(0x7f0000000440)="2d8ef448aafd02a4d268b7439fcc0d45cace", 0x12, 0x40800, &(0x7f00000005c0)={0x11, 0x8, r4, 0x1, 0x5, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x14) 2018/04/22 09:01:04 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:05 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/exec\x00') r0 = accept4(0xffffffffffffff9c, &(0x7f0000000040)=@hci, &(0x7f00000000c0)=0x80, 0x80800) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000002000)="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", 0x12e) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa}, {0xa, 0x0, 0x0, @empty, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x9}, 0x14) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000001fde), 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e24, 0x3, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0xfff}, 0x1c) 2018/04/22 09:01:05 executing program 3: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:05 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f00004cfff3)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000040)={0x0, 0x3}) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x20000) 2018/04/22 09:01:05 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000683ff4)={@remote={0xac, 0x14, 0x14, 0xbb}, @multicast2=0xe0000002}, 0xc) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e000000200000000010000000100000a0000ffffffff000100000000"], 0x1c) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x200, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0x50, 0x81, 0x9}, &(0x7f0000000200)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000240)={0x1, 0x1f, 0x2, 0x7fffffff, 0x200000000, 0x7, 0x10001, 0x40, r2}, 0x20) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000000000002004e20e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f7ffffff000000000000000000000000"], 0x110) fcntl$setflags(r0, 0x2, 0x1) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000280)={0x3f, 0x0, 0x10001, 0xfffffffffffffffc}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f00000002c0)={0xcea, r3}) r4 = getpgrp(0x0) stat(&(0x7f0000000480)='/\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) r7 = getpgid(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000005c0)={{{@in6=@ipv4={[], [], @local}, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@remote}}, &(0x7f00000006c0)=0xe8) fstat(r0, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000780)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000007c0)={{{@in6, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) r12 = getegid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000001ec0)=0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001f00)={{{@in6=@ipv4={[], [], @dev}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000002000)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002040)={0x0, 0x0, 0x0}, &(0x7f0000002080)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000020c0)={0x0}, &(0x7f0000002100)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002140)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000002240)=0xe8) fstat(r0, &(0x7f0000002280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r19 = getpgid(0xffffffffffffffff) r20 = getuid() getresgid(&(0x7f0000002540), &(0x7f0000002580), &(0x7f00000025c0)=0x0) fcntl$getownex(r1, 0x10, &(0x7f0000002780)={0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000027c0)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f00000028c0)=0xe8) getgroups(0x1, &(0x7f0000002900)=[0xffffffffffffffff]) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000002940)=0x0) getresuid(&(0x7f0000002980), &(0x7f00000029c0), &(0x7f0000002a00)=0x0) lstat(&(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r28 = fcntl$getown(r1, 0x9) getresuid(&(0x7f0000002b00)=0x0, &(0x7f0000002b40), &(0x7f0000002b80)) fstat(r1, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r31 = gettid() r32 = getuid() getgroups(0x1, &(0x7f0000002c40)=[0x0]) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000057c0)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002e00)={0x0, 0x0, 0x0}, &(0x7f0000002e40)=0xc) r36 = getpgid(0x0) fstat(r1, &(0x7f0000005500)={0x0, 0x0, 0x0, 0x0, 0x0}) r38 = getegid() sendmmsg$unix(r1, &(0x7f0000005640)=[{&(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000440)=[{&(0x7f0000000380)="e57d5e60939211062a061c0ec5a07fad405f6fcd85e035627aaae5e17819a521239a4ece6bf2c976012f53f69ab31ec98bd6d9fc6e991f4c4eea9b0d21115f929f6f0452822a99ab30d5ffadab4bda3b639f6118650f137225e97898891acdee11ea8b6b35b866cfa99b59cc14d323fd0511f1f1f6ce2fb1bca863d9e85137f911edfbd32018b97141489f53de70f52048ed9d433ade51c30ca3c7ba1ceafbe1eaad133b1010433fb64b", 0xaa}], 0x1, &(0x7f0000000900)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x28, 0x1, 0x1, [r1, r0, r1, r1, r0]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x20, 0x1, 0x1, [r0, r0, r1, r0]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x10, 0x1, 0x1}], 0xb8, 0x20040891}, {&(0x7f00000009c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000001e40)=[{&(0x7f0000000a40)="ca4c0eccc78d6b0bdae9df848f1d6888f67ec5239c1079744a79e10f245163e8397938736063b532d52728cd10ef30bfb3f5b8dfe37d61a423742e6e091ead1760b3744839f12092b0b059ce2243133ad8ac3ed2c6974b3d6f2e547a9242da2980f8b8acbfb3a92ac84f253fc8a5f1faaf24", 0x72}, {&(0x7f0000000ac0)="16b19cd25289ac556f00b9a2c1fb446f4c9de924cb0cd7804f4904ec49767518bb2eb9af326b9616f18644c265de3a8ed4e301a3b58d6e9f6bfebef5ab530e63846aa688b34cf22edd08ec9290ee9096454e952b311ee5c6d0b923f497d35ead1d1f36fe", 0x64}, {&(0x7f0000000b40)="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", 0x1000}, {&(0x7f0000001b40)="c8371b25e26c874437a2af3465aaff77a683f6fa6fb9296a0b4c0cdd7672a0502ac8449b9a2a3cab50debf2ede1d9bdd873fe55fee1a10467f263c6e765d3b193491a91a2a", 0x45}, {&(0x7f0000001bc0)}, {&(0x7f0000001c00)="e39cb7aa7242d4dfef347a142b572c4c118ecd05dce6f93a8784d76ef45d4479b39ef3e4964b7c6ad056fc42916ed6ad37a4cf16ac4a895da76a487ba6a78cdf0685b2", 0x43}, {&(0x7f0000001c80)="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", 0xfd}, {&(0x7f0000001d80)="cbced64e33994330b6da9a8f49ba550a26457f12b22ccfbfd9d956bb3eb9314e2ededa6eef1eb2c4e9bcb40b3dd09b84489afb337809f5025c1aa7ce173338b1b6e7b9d8702f3005dd8f47fcb34039b1d743b098cfeb15ed4052c4f84462aed4e1909b5a9a04375ea70cc585c4b37ae398bf138f8288016009b8e9b3444ff1cffe38add5e016", 0x86}], 0x8, &(0x7f0000002300)=[@cred={0x20, 0x1, 0x2, r13, r14, r15}, @rights={0x38, 0x1, 0x1, [r0, r1, r1, r1, r1, r1, r0, r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @rights={0x18, 0x1, 0x1, [r1, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r1]}], 0xb0, 0x10}, {&(0x7f00000023c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000002500)=[{&(0x7f0000002440)="68aa30b432d0c405cb89744c877132c8df72e749e5fb40446042b9aad6ad6a6e4d8165e736fd50125ac6b78ecea996dbc33243de00a8", 0x36}, {&(0x7f0000002480)="835cc9365638a55f85da135bb9ee339a93f8e12ead29dfb7db7641c00c994d4b4e09bc0473880ee051aec6be3fb689ae96e58f3b1be131b5ac9506c4a15f92cdd5b6b9c3f1b1e0a848d661", 0x4b}], 0x2, &(0x7f0000002600)=[@cred={0x20, 0x1, 0x2, r19, r20, r21}, @rights={0x28, 0x1, 0x1, [r1, r0, r1, r0, r0, r0]}], 0x48, 0xc5}, {&(0x7f0000002680)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000002740)=[{&(0x7f0000002700)="cf82b57e4b190e43fc262815781ba20454b0046fe4c04865c44ed8efcf0d2f697b74588a1788aabfb362bd47ca9f107a19", 0x31}], 0x1, &(0x7f0000002e80)=[@rights={0x28, 0x1, 0x1, [r1, r1, r0, r1, r0, r1]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r0]}, @cred={0x20, 0x1, 0x2, r22, r23, r24}, @cred={0x20, 0x1, 0x2, r25, r26, r27}, @cred={0x20, 0x1, 0x2, r28, r29, r30}, @rights={0x18, 0x1, 0x1, [r1]}, @cred={0x20, 0x1, 0x2, r31, r32, r33}, @cred={0x20, 0x1, 0x2, r34, 0x0, r35}], 0x110, 0x1}, {&(0x7f0000002fc0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000005480)=[{&(0x7f0000003040)="8fd6b1954c4e488ac431a5bd7e2a8de4e9cf300f1c56fe85512ddd971c9d940f12efa3462c680031fab73a85c6bd891b4ccec626b86d9fbc09a0edabf2c7918d6ecd689c253b71c734f7e4ee022fb5af4d4a555bcc0aa8686758b5f087e97555bd90b020b75894eeb737b3687528116f4c711d8cf9791e75e794", 0x7a}, {&(0x7f00000030c0)="3510c9261249695c3dee4583337d7e4931104451105cfc3f7f580a331ecd351eaa8c263a5fde73e1e9514f50b4515bcf035cf21bfb0c8b3c7f0a24ea707e6221cc845c90dd2d5358d60a597c37c4654c88784e41bbd3164fbcadeb09e2f4ce4635307c7fac92413cd44d542db898fa03fe57bde486b01a7a5f9454465c7a7bbfaa2caf0e2a0a0a935fa7930c669906624f8c7935fcc43572bed77f722e7915ac0a7ae44a3c04bc702e4e25803ad079f7a65f9abb372868bee830bcb0356a9bfacd2b82d8f43b9ed35621e9141493b87555b17af44bb69708ada0557bd084f4dc993994c8e98d5c46a0", 0xe9}, {&(0x7f00000031c0)="141fa33973f24075f0cc5b5418ab256d48c145afaeee5f8ac2b74629266469879af34b59477fac7870256563e6c0d0fb24052eb82158be30573ec1f952b517fb5d1d85e0d20d8e17ee0b0dae8290dcc842a3d90dd909c53ef5eb06a01d24f7a1a65192fce41d4900cb360727629db1b08b77242c3f3aa1e34cb7204012a101981dab09bd2cbf46b0a316173ad27f8bb4593a7ddf52829145e91e13696660", 0x9e}, {&(0x7f0000003280)="251398b7c40059d827b4edda4f4b7b4b8b9cfc69bbbfdf67a402751f8feb3a222d6bfefecfbbdc70144a27f1a1f8fb175739370fd8a9d3525792dd5bd18953f4a963b37f86f5d32f8daa16de54d534f2f3dcfca4bc861c2b0acafc4be456f52a19ad76417207271d7d97199c799c9edff042fc3b5511875088e0", 0x7a}, {&(0x7f0000003300)="8080ab5768fffbca756b777ad6917d6ce1940425903be0f64c0f1139e73e8d01892232982f1be91dba500e6e7ea1941dc55c5d7f63b6d37667bb82e3d47fbc2e65da24cb7f79574183021a348b6609939a96436d883b127c31f4e66f1315a0646451e234e308f66e5d507ff3f3a9b45fc06aab35b7eae12867b9e681108289f82323cedb68aa964ce3af74ad41f5a94fe870847deba375ba83485ceab6540746b1", 0xa1}, {&(0x7f00000033c0)="f7824f0248f1330e20227818c5db3cd6440521394434ff385b1da78b64c5ef4c28cff0343b0d3067b8d808ac58bb65de9a5124df722ab2a5e25998b4aa3dfb6940598de35ff349005128ce006f0abcd5675993c2234cedec715a82548acbc8c21e19c1bbf4e1b5ab4287b0482f89b13d5c8cd29bf698a0ee506f122f51c3037d193a24f3554bfe8905849dd695af2a77ad69b40fc6b7f3e5d6580bfedabd1ffb729e07ef", 0xa4}, {&(0x7f0000003480)="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", 0x1000}, {&(0x7f0000004480)="93ee18b3db90240ec0fc410737cef124ac5bd60a74a142b356819c4a84492c93e4a9e94e27f5325cae5f98476cbc34a2f41a4cc0e2c0752ec71269e42fc5b46a00b74afe0a5a4ca0ec49a7a038871b363f21c5d8de4876fab7796f5fa85b44517675da11f3356c5a2d8a4c975c1d10d245b47b5ef66242fcf74235921a16cb6c935da762c3e49d16fe73048f6c5f914069c52d043c6e10c5fcb20e1bf554d1d010e3dfb85c47991d0707e0333766ef4697c340b3041113ded407ffd471dadefcd2fc2509da4a2d109b87ae34f3806c428f585f61046b691cb978b5768b21bd8287d99738a082ff87a75fe98473ddf4d06b0c6613af053ef34b4daf6e94de00de62d371d21215202d5f8b59c60d711b9d040ec99c966b667cbf36a0aebd3853e4b4f537745aa827e4716ffd40065f0c600e94cbf8d93b23d31d2a373c9586f72fd5d08b2f81c9cca4128e995f4c89939468a49acb217e4249ba1aa7300d7bc08c1cfdc90169d20a26aca9caa5c3484a1a0bed50abe321c93acf11cbb48fde3117a108c8bf2e197a71731c7460249dab9044148c6e8a86fb4169da0fcf2b4fa0d10907f3043080e9b456817a780d7ae401687f6c5b4ac160c920a2c7312d309c992dce6f21463769702e116e8d61c4f02e6da0621d7aed6f18902ed1605191a946d567be33e7810eeac8bfc7215ca93c21feb3923ef03303e509f1fc246c3ff4984d2bee53273a78ac4b13f4696fbe472a0f6f4faed42f9c8d873a890460db826e44787c78ac8116b5e4197de3cfa703c250795cd05b2b7abe5f89869ba8ccf43934ba1116e8a9c05e6bb32869693bdbfbd36ffdccc9e8f9611be7f8052268e126828058755b468c0246fb21defefe9f6de8f3073ea3ab8660a748f34feff0dc2fc4f53c78a0157e779967593870c4812532eec8ab7fa3484284dc01a325d808ac488e1396c9d627e88a107b48564786e0f2cedfd24da77aa02ec6e023d451cc5b7642915f90b71c8d536c39234e3e03e24da92d6584893361b363a489a32d31848c1402250217046d8b95bd3dbfe3d2120b036bfaa1f8460a9cd6dabc752d794d05dd6bee8689510aedea25338a5b858b5c8edef2643b194db44be866444eba1a2634782af8023f3714366f7c85cc1d11c6a3d981e3169dd02d998f09048d2a8b9ce8b1fd525ab3211d480df9799d9d60469bcdc01b279d0cac1a21bd4769193ece444210e1e91658ed75ad05773d06e5354b1defe1c1c34c39e6aadf1752e353621f6762e6cb8ff8cfa589faaefb50eac38fed16b4c3e99ca1d0a4eebe68f356f5bd1e4a744c485ad01d3c4d2db96d7051e25935150b20e102314188c317d4a3ddbcd048a557cd2649f86ba46b1e6cd749c7ee75815af1eb9f1f21c9017f55a5ea16685b7ffffaa67d27c3c9274fbd769818838dacfe586d489b64e98d60b5db1aff079c7a8aac9d8c174ee7365a2ee2cd7138b5b0e75371acb41b526427f5b35acbaf2429ceab475f23d8492b357c27bb8852f318681acf65e597c00e2e12f37985d6c102f200658ff4baebb240af283e2e27a1315640bd131a6d7a386e36eb8b34eef5fb94d3e920a084917b8f9329ad1ef2173f7d769e93777a0de0f9ac4b5eb2c4ca71f877a765b6c97a871b1534cdbfefc28e6189ef81564031c6a33585a4d4a5d6c07422544fca390d299a63c7c5f28ae7326ead6442c8235eb60edfeff1aa58b47ba10e67dd241040876384bc96e5fb73f42bb8756f3c475b94484d30cc86408e8b00d18a52f957928d82a48793b3c1e8fec8417f837ecbe9a12ffc0504acaf4d64d3e6e27dc3e3bb301340a8aaf9d25444f52ada646d3a233902b6a5255ed1c96ccc75a6dee6d769916709435c873134ae5d2f5faa04ac7b775db9083cbdae540a1cd5a564222256a4e0411ef6e47f78b949fc9d3c69b130182c8eb505aa1dae2b82602da7384ef7d6bef993796926533014e288340807c8df35aaba5e2648eb197eb58ad402f4ffdafe0b73ee3833a8e00fc9a540f5c0ce07b1a7b11c7ebc421d4182a7388f4fbacf63047b207295c1fd5d81ce6f7087817643d8320b08036cd149c69bd9efce9a9cbdf4153b0e9a39763eee474e880327926bb7e7dbfd47e13e8324881af836f656e43211c0ba9cf452749c735af6e816fa81d89945b1fd36344622129cbfccf8a20e9f4de75de1c45985b5e814be4ca7d204b61d657a4278ac121c74d3cf11a641a5da006d13d452235db814c6ffafd9e8e70df459c4e2b033a903ac876ecdd3cb34d35221c04b5b5262891e41c90bafb759bc5b1efe81fa0266e689b48a51e78b470e5b263d5fcd957ff30de1c38bb21fcb71545e298e4f22dc5c42ab0c5232fd5c5d6543b0196153334e1a6f6bc3032dedf284f8c5f9369ae0745899fbe0720eb7d9e6e04420ee995dfe96c1a50a8828064e8faf0f689056d146a16ff30103110a6d8550fe1f42ea48e75a1353fdaf93480853c8ffd90b32ede554fe17028b43a89f84a6cbc0d542c872a5de5b2afd9a8b6ad7e566905d6975c9eb3e940312b05e489e8ccf9930a4e2ab65dbc01e820781fe90f83f125d6667ec930c25fed40b57c04c0360ed36a364888bb11a2aa6ef8fd6a786ada25f52f5e70a0e1d913d5c8d6fa0a71bace1787428872b52576f02c73ad7fed00db02f384507e225843cc3f7016655f052c5ef2d414af6efad8aea42ed34b9f807cc9a0a25d2f4b92c1c1a280ecedb8f5d3cac513b07475788c98fb6649a23f104237d29d9b23c92c267e36f0be968783db37f977db1c24a2cf99f9c6cdf90fdf24c70f98ba6ce0f9de0472299c8f9d66398a539597ba976bce039bbc4cbab99e938c09fd3bb5c0752d7ae9ebbf68bfba7b91afb922649bfe60a3dea5abc03630ede17c56fab352e16fa619e078a4a7a288ebbea44385bc5167a56889053a68f3c6b796b7d8455a95abb40fc97399f9279899c54af3a1b104d9140c23e9c4a4a422cbac7eda384e810818b22a0966123a2f4d4ef694201f6348cbe3527b452a452e1289b86c547f84bf97ea2142135e0956635e4215ac52fcc5741791567e19768fed70ca2141a0796ef30c4425a478e4a2a2a521fecd1a3921503271d6893be4090e5b0fec375142a53fd6209865a6e4d578607471a7c484179c1a0cb29e7ea723f1a6520323c1332b840aef8931cf0cb88cb64076d6959c2bcabb976f8f187268575017c0488fba8b93c9620087bc5fa3c6c0eb943271f0a80c4a022b4bb843141998f542c222931f5c117d03a012451a73b155b30503fb73f00b02eb69ab30b7e60018cb32c5dc82785c30ee152c6d126b360c590d75258ee03484f5f39789eac7782a9ae521e9c9039df46e4670b2085f42d6dccfeafe5ab0cf5f986fcf2800b699ddaa7d70509e4ea06d4b484ecd5f7c3d3006185667b527b7d320d61483dfbce22782e7fc303d7ae02c618c7cece0c635f98532f45ae857f066cc907e9ed9d20125d2d0962e0efa372c8c584409fb8050e382a15cd842d1b373a0756671f7c90cc0e293f00840471c307201a3aaf626d5cb01622ea9e1dfa2de2b28b24bd6593f136fb269676dde5ba8751884ec4d3d6b108c35b10c43870a13044fa80e8786646c1f6d5e987eeefd0898b2cf838b1d9174117774e23d1912df66137f471c2a0c7bc2a40ed1ffe619a78278dfd4bb0b8b97d352ae83e01e24a8eb97a3bff92c5861c22982a2a068dbf3fda5be031b9a80aa8f26d3828d97a939c4a4875e9374a63d8a3fa15a947491380440124813bf6add6366dee805f6d7b5a7a43c0574e624057550be021bb4f13b6d2a0dbd1d9507e5d933fcc554399ec9e116309fb88d450021c3b40c639a7209dceeda9dec28c89555e243eef9e24ca271b6ad621c7548cd37f2260c603cf30596fe8ebce5460b226d3590c58c57e862ae8b88339876e0f71cb1eb8d9cfe23d882a40d64ee7b8b2dd089fb9ac7a0402221a10c8dfaa84d5747ed88664c29a79278ab347d76f7fad613d3e1663488fbafa71769f385217f9497d2aaa06647f8ac11252037c3d27a834258402a9cbb7d79269afb382c1b234be0531d3a27b9803520a7e75786ba07fc94342a3aaefa6b073fa5f8d22cb49fc36cb1c9f2deaf04bce9d6e9a1c254da69428e2b154aaf777ca1af70ca3e13d82610294361505227b5dac4115e70bae28d12fa863ce24039e72f04b3f87485bf92db0b1db5c8e23e0d1061c848eefb5421c01cb21ebd32ea1a69ac16eb5476067312c632d22daa5f87eac073fcde49a55ee58e59db34280023dbbb725e79d76d9e0a5975ce406c8459ff1b7868f9ce70662a011cc3e59d64e068f132e736ff915e0e76b7fa84feccdc7a65aaf81e5b8bcff8a4b5db37ff9d4817ef2d2c3683b8ed7a13ec31bd40b96da14ab2501a5aec7106b67c9c70191623c4c370f69102e5ea35abcfae08e853e291ab874875972bbf81a16f50b121dc9474c8a67eddeb262759f2dc99199c0303ca0f3983efbe28a13ae193f71bf18e6ad0691e05cbdec0ad0d51502afb5446f9f581743bd5c9abbb88bebd238f84fb134d7e840a7ac91ca4a6a59d3695ce44279ced07df8305204eb9be9dab4d722c02b1a7b06bbd9538de51716756835e7aee6a8bf42aaabf5369d9e1ae48c8f56ff73c26c5f8d3025f2aaf9390759035536d4dd9689ff371bd46c1f71eca07df3665702fbb20f63edea239ee0d806e679731cf339f1f000f84e7404255a1ecd1a14e8317d7b77d6718c3c21eb126083af5344696ac126241a626230ad9689995b367e9397e4ad70b51f932e244198a93e1a8c7c2286f621c20c6642146874e491a85939e3981e0b2ee739d1a07bb8a68c4554fa9362d76d8c139fb4b690122054baa2b23f2cea56f52c073e5820a3f04ad9f9ff090e1d8465213054d8bfcd678dd6d94e0c9a04709159c0e95f8d4dd0fca2bcb34c60ac482c5b0e8c0d03c2100c583dd95bf348422c88cf083b17c5a422f05d99b4982b097fe8b6c7c96b1f60acb2c9ddb46323e72d573931d430e9af0bb3acb4d7546a3c58f622535c082b5ca2c826201c1ed15b3049841efbce7bc45ec56d748689a2c5a60aebefbfccab3487200edd62ee395068297bd7314834c4c598c0f0714b60112b5fe521bf9f54e085ed0efc8f525e9dfdfa07fa8d919d51dffa27351a2781947717c0a4fb639a6ef745a9a0aa96f5f037a3f4d2c2bdb861b2594fb4e8657dd7c72d71852e54fab27b0ec346cc57ca13fb64b4de77d1651eb72fcf4ed841d1991e05976f081f2135528625300e721f4be2097bec4fb84e53a6b6f191c393f4772b8973d6df6aa06a9a43ee471b3a3f5eaba1fb3b569f9d824148f831719aef2bcd4037e947acd7dd8ad0f6ef791156181450bdccca792063cf4c0ae02172bfbea3e6e324040c2839613f8a94f57f00fc07a2607b26c664109f1c96f79d154e23601ce46df9afa59e8489dfe87a4263f5538b220264280193e36ec8cd200c992f8705c896bcbed88ac3395b2d4ffe7b8504d6591e2818a2aa175acba5858f897a716a1a79e72e0f91b836fc23e8298b6f7e9ab6a17c014914e21439e3919b97ee3faba7192de18ad2759a8bcc305f3bef63034f5c978fd7aa05bf782e07f37be4755e956274006bc05435c2673385b287b9b134bcb0a1c8604fde0248b60594e258494c9055c39de0fcfff0d429e19e225e655b145197112db0ee3e82a9f2a7cc714a56b1cb68c0f13de4fa385d5cf0e457d57f8f09eb9c21b784cf00fe9695bb3944a5958b98e0ae3aa89a16", 0x1000}], 0x8, &(0x7f0000005580)=[@rights={0x30, 0x1, 0x1, [r1, r0, r1, r1, r0, r0, r1, r1]}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x20, 0x1, 0x1, [r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r36, r37, r38}], 0x88, 0x20000001}], 0x5, 0x40000) 2018/04/22 09:01:05 executing program 6: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x121000) connect$ax25(r1, &(0x7f0000000180)={0x3, {"cc34d3b647af1e"}, 0x5}, 0x10) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x80) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000000c0)={0x9aca, 0x9, 0x1000, 0xffffffffffffffe1, 0x5, 0x81, 0x2176, 0x0, 0x7d1, 0x8, 0x5, 0x2ec000}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)=0x6f687b8d) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000001c0)={0x1, 0x2, 0x77d, 0x7, 0x94c, 0x1000, 0x2, 0x2b, 0x400, 0x100000001, 0xfffffffffffffffd, 0x3f}) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000100)={0x50, 0x3be903fb, 0x200000000, 0x8, 0x1f, 0x7, 0xff, 0x8d08, 0xffffffffffffffff, 0x3, 0x5, 0x8000}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x6, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'wrr\x00'}, 0x2c) 2018/04/22 09:01:05 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:05 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000400)=0xafb, 0x4) ioctl$sock_SIOCGIFCONF(r3, 0x8910, &(0x7f00000003c0)=@req={0x28, &(0x7f0000000380)={'ip6tnl0\x00', @ifru_map={0x1, 0x4, 0x2080, 0x6, 0x1, 0x101}}}) fgetxattr(r3, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) getsockname$packet(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000580)=0x14) 2018/04/22 09:01:05 executing program 4: unshare(0x40600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001b4ff6)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x509c00, 0x0) accept$netrom(r1, &(0x7f0000000080)=@full, &(0x7f0000000100)=0x48) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xffff) 2018/04/22 09:01:05 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x1, 0x20000) setsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000300)=0x7, 0x4) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x80, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x283, 0x3}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x76, &(0x7f0000000180)={r7, 0x3f}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:05 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:05 executing program 5: r0 = socket$inet(0x2, 0x200000000003, 0x8001) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1ff, 0x400) ioctl$sock_netrom_TIOCINQ(r1, 0x541b, &(0x7f0000000040)) setsockopt$inet_int(r0, 0x0, 0xd3, &(0x7f0000002000), 0x3c) 2018/04/22 09:01:05 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) keyctl$revoke(0x3, r3) mlock(&(0x7f0000011000/0x3000)=nil, 0x3000) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:05 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) ioctl$DRM_IOCTL_ADD_MAP(r0, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffc000/0x2000)=nil, 0xba2, 0x3, 0x50, &(0x7f0000ffc000/0x1000)=nil, 0x870}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000800)=ANY=[@ANYBLOB="0d010000270063810000"], 0x14}, 0x1}, 0x0) 2018/04/22 09:01:05 executing program 3: add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r0 = add_key(&(0x7f0000000140)='pkcs7_test\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) r6 = syz_open_dev$audion(&(0x7f0000000280)='/dev/audio#\x00', 0xe9b, 0x400000) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000340)=0x14) setsockopt$packet_add_memb(r6, 0x107, 0x1, &(0x7f0000000480)={r7, 0x1, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x16}}, 0x10) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:05 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:05 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000400)=0xafb, 0x4) ioctl$sock_SIOCGIFCONF(r3, 0x8910, &(0x7f00000003c0)=@req={0x28, &(0x7f0000000380)={'ip6tnl0\x00', @ifru_map={0x1, 0x4, 0x2080, 0x6, 0x1, 0x101}}}) fgetxattr(r3, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:05 executing program 6: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x121000) connect$ax25(r1, &(0x7f0000000180)={0x3, {"cc34d3b647af1e"}, 0x5}, 0x10) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x80) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000000c0)={0x9aca, 0x9, 0x1000, 0xffffffffffffffe1, 0x5, 0x81, 0x2176, 0x0, 0x7d1, 0x8, 0x5, 0x2ec000}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)=0x6f687b8d) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000001c0)={0x1, 0x2, 0x77d, 0x7, 0x94c, 0x1000, 0x2, 0x2b, 0x400, 0x100000001, 0xfffffffffffffffd, 0x3f}) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000100)={0x50, 0x3be903fb, 0x200000000, 0x8, 0x1f, 0x7, 0xff, 0x8d08, 0xffffffffffffffff, 0x3, 0x5, 0x8000}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x6, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'wrr\x00'}, 0x2c) 2018/04/22 09:01:05 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000f18)={{{@in6=@loopback={0x0, 0x1}, @in6=@loopback={0x0, 0x1}}}, {{@in=@loopback=0x7f000001}, 0x0, @in6}}, 0xe8) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:05 executing program 5: r0 = socket$inet6(0x10, 0x4000000003, 0x0) sendmsg(r0, &(0x7f0000002fc8)={&(0x7f0000001000)=@nl=@kern={0x10}, 0x80, &(0x7f0000002000)=[{&(0x7f000000dfaa)="5500000018007fafb72d1cb2a4a280930a06000000a84308910523692500080008000500000000001900a30700000000000000dc1338d54400009b84136ef75afb83de448daa7227c43ab8220000060cec4fab91d4", 0x55}], 0x1, &(0x7f0000006000)}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f0000000200)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={r1, r2, r3}, 0xc) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x4a, "8c3b73350bda7405a3312628cd82308777200c32d27a2ff50ee9ee4488ae2b20efa7ddb4de721de278c5b530f44ddaeb86642b3a5ea96f9d0eda8b3aafad52bd7768ca640e11340073ce"}, &(0x7f00000000c0)=0x52) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r4, 0x6}, 0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000280)={r4, 0x8}, 0x8) socketpair(0x9, 0x800, 0x0, &(0x7f0000000000)) socket$bt_bnep(0x1f, 0x3, 0x4) 2018/04/22 09:01:05 executing program 2: r0 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000000)={'vhan0\x00', 0x400}) r1 = syz_open_dev$tun(&(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"d202b999cf85000000000088f301e710", 0x102}) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x2, 0x200000) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)=0x0) ioctl$TIOCSPGRP(r2, 0x5410, &(0x7f0000000100)=r3) dup2(r0, r1) [ 121.778500] netlink: 17 bytes leftover after parsing attributes in process `syz-executor5'. [ 121.922451] netlink: 17 bytes leftover after parsing attributes in process `syz-executor5'. 2018/04/22 09:01:06 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto(r0, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @loopback=0x7f000001}}, 0x1) getpeername(r0, &(0x7f0000000140)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, &(0x7f0000000080)=0x80) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@rand_addr}}, &(0x7f00000002c0)=0xe8) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in=@dev={0xac, 0x14, 0x14, 0xb}, @in6=@remote={0xfe, 0x80, [], 0xbb}, 0x4e24, 0x0, 0x4e23, 0x0, 0x2, 0x20, 0xa0, 0x7f, r2, r3}, {0x1f, 0x0, 0x100000000, 0x20000000000, 0xffffffffffffffff, 0x1ce52f45, 0x3f, 0x1}, {0x40, 0x7, 0x5a6d, 0x8562}, 0x3, 0x6e6bb6, 0x0, 0x0, 0x2, 0x3}, {{@in6=@ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x4d6, 0x33}, 0xa, @in=@broadcast=0xffffffff, 0x3504, 0x3, 0x0, 0x23a, 0x8f5, 0x3f, 0x12cc00000000000}}, 0xe8) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x101000, 0x0) setsockopt$netrom_NETROM_T4(r4, 0x103, 0x6, &(0x7f0000000040)=0x8, 0x4) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) 2018/04/22 09:01:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:06 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440), 0x0, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:06 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) ioctl$VHOST_GET_FEATURES(r5, 0x8008af00, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:06 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000400)=0xafb, 0x4) fgetxattr(r3, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:06 executing program 6: r0 = socket$inet_dccp(0x2, 0x6, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x1, 0x121000) connect$ax25(r1, &(0x7f0000000180)={0x3, {"cc34d3b647af1e"}, 0x5}, 0x10) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x80) ioctl$TCSETSF(r2, 0x5404, &(0x7f00000000c0)={0x9aca, 0x9, 0x1000, 0xffffffffffffffe1, 0x5, 0x81, 0x2176, 0x0, 0x7d1, 0x8, 0x5, 0x2ec000}) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000080)=0x6f687b8d) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000001c0)={0x1, 0x2, 0x77d, 0x7, 0x94c, 0x1000, 0x2, 0x2b, 0x400, 0x100000001, 0xfffffffffffffffd, 0x3f}) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000100)={0x50, 0x3be903fb, 0x200000000, 0x8, 0x1f, 0x7, 0xff, 0x8d08, 0xffffffffffffffff, 0x3, 0x5, 0x8000}) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000040)={0x6, @remote={0xac, 0x14, 0x14, 0xbb}, 0x0, 0x0, 'wrr\x00'}, 0x2c) 2018/04/22 09:01:06 executing program 5: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x6, 0x800) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r1 = socket$vsock_stream(0x28, 0x1, 0x0) shutdown(r1, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000080)) 2018/04/22 09:01:06 executing program 2: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000400)=0xafb, 0x4) ioctl$sock_SIOCGIFCONF(r3, 0x8910, &(0x7f00000003c0)=@req={0x28, &(0x7f0000000380)={'ip6tnl0\x00', @ifru_map={0x1, 0x4, 0x2080, 0x6, 0x1, 0x101}}}) fgetxattr(r3, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:06 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, 0x0) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:06 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x880) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:06 executing program 6: r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@in6={0xa, 0x4e21, 0x0, @loopback={0x0, 0x1}}, 0x80, &(0x7f0000001380), 0x0, &(0x7f0000000040)}}, {{&(0x7f0000000a80)=@in6={0xa, 0x0, 0x0, @dev={0xfe, 0x80}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000080)="cae007fa5f494419b0003cbda31b63427edcbd7b431536954023dcc38dd9ee13c5b8a36b7f5ab529770115a89175aeab125f89a1ae0372e46b2f034ac5014bca76f7d88218b7a0741b309e0f7da281eaf82d73ce95670206eeaf1250dd0c3e92bcd3c4f72809571a3104d9d9814da733cd6f86d00c8d5bccd3163867922a1b906dfb4cea285e69d96f7673c8ecf9207984c4cbfce55000e43c2ac46e0e8d68e6fba18d68a4f83699b0f1a88015be37dad31012", 0xb3}, {&(0x7f0000000140)="c5fede2a5e65dfe170283b631b5137957c955957188ad7d8d6137111e4d95114b0a7667dd7f4c16c53a5479e1ede38dc38bc52c44240883acdfd8ea8bb056e536cbb1d02cb555c5ca48092172b8809d2f6e326a0171fed55b2fa6c9ea045a023e08d8280850c51e7846321d1f3899047288270c2db7dbcd424af5e374a176e7678e2982eddec226973f2ea5b0e916b785f27e6564fa35eb2b3b1ec83aefc4feb50d6ed90fa514ae0df2ffe6ccf2f2c9e8eed3e937705068714dd0f273d8fa037552c018b69e6560b6c4146a5618ce4d5c7cdc33ac876a8207540bdd9940d9d4f6e", 0xe1}, {&(0x7f0000000240)="9968ec4291bed2f64986be2e1dff4619fb032939e3a4c67d90e9adff1e2fef502fd14fbf838f822992633065ee1a24df72ef0e29ef48e25bbcbcb6d8373a151870b72f2ef893b4f48a3ba8d6415b135d9cb626be146efa2b0b5d254b2c9b2e5c1ef916f6cfe9eb7520945a08e2dbfcf60ddd", 0x72}, {&(0x7f00000002c0)="b3b869649893ad40301dfc5c22adf9262ce7548f597b586f08a61e03f84398f1fd70bc4cc9e489b43c89d0fb7e79d3c61fd7a28dc9889868da753ce22e2f40321880b1a9c55305d610db53a3e7f6c738a3eb667ccc8aa95c992f6a86eeccb7f5664322aedb294b7242d5242e616f3b92df", 0x71}, {&(0x7f0000000340)="a3c8caa80ffbec7fa402a11278ccba1754a62f033be847ac38f23e123ba96c3fb6b4b1172654efe2", 0x28}, {&(0x7f0000000380)="377769e413a8ca24bc5554951f0634c90e5307462237835054e1d5087549205409abd00c2ac2509819343cf249e6f7f5aa57a1540ad94f5608a6de36a013848fe37f1c28190c39b956388d2742404f886024344c7c54f6cc99c5c9446334df4dc7792bb507c3be86324c3bcde1ba265473bc95e1dcf4cc7fe9cb43bdc5775374ad85d2fc4059667433cc6c20b00d9cdaed040444a3b75b6ba81c65edf9db943dbe010d", 0xa3}, {&(0x7f0000000440)="654a48cff7ebd595933ead838c9cd79812c9d44d5cd7cdf402f3ba06", 0x1c}, {&(0x7f0000000480)="eb9e57051c112bcc3d27b2ea0bfa1e9f7ac965f3a164ba929bc446e6", 0x1c}, {&(0x7f00000004c0)="2c10b78fd460eddf391f87de85ad81efc37cebbea47362379a7b9a0f2d0287959cc5ef5b58c365b10102762add73aef58158491311149a53e8f4e2825e99acce14da1c24325ec0e0f5182a3576d5893b60b63c4e7168b225fd0904bf0c21bf6b53781694c8b2e464a6f54dcf13aded7b2611dafa0f55c07884558d6e5b3b52b19a08d913f9e5df7999e3f933b364b19d86fdba38305522b7973a56f2c02d16639dacdec437b08935c2027dd2dee70ba4db7d65b135e3a11d0a0ec7330daa5200ab18723fcec3b890f449001c56f98e53b5d0f77f9285dea3d7d9c7d18ca01b", 0xdf}], 0x9, &(0x7f0000001c00)}}], 0x2, 0x0) 2018/04/22 09:01:06 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x4, 0x762dfe7ac080c3b8) sendmmsg(r0, &(0x7f00000007c0)=[{{&(0x7f00000000c0)=@ethernet={0x1}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)="7a961cf07a4bddacd2a5739b7943830c0b5c85f708e7aad377fa3e8bbe8a74753be300e8f22f008b90483090a99aeff98c968022aebea94b1c703549614f25d579ed3d1481f1f0f5d252c32a956a229f16deffd7e0c94e43b5d429ab77c7ee3f516c8a0c816de9213dd6d53f92238898c6ae9f473b92962eb887e8a7e3a3d60bf6b1eccb1e9a94ea32d73ccc0e5e2690ca", 0x91}], 0x1, 0x0, 0x0, 0x4000000}, 0x9}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000340)="a68d7bd2031d73735696d366448e892ba72f03acabc277b114d88cceb5527797aa87af078bcd41c64485143333b86a6caf7603eeff7c46ac6e4566d8df52287f29d79b07315fefa38437a6932dcd565d8becfb8c60ecba99fa6b9cc444fe7fafe78f5a9dd79d0dc26e09575607980755c9f0b50c06908e169a62142d9d5ccc8232a3dd0e889acd0489099b4a3fe50df32ca905a7f47b6e9daed8bfbe581b4b16116716eb397deb46a9", 0xa9}, {&(0x7f0000000240)="f48c3c9e43c5ad669231f8e2d56ed24e9af06d9117cb9dfc1d16760140620353d39815b4a6511ad97641823ea40e2fff4fcc04851de8e329a5d57fa4f99780d64398fc25aed7b07a4be93d6b709472e183f053a76487575b77", 0x59}], 0x2, &(0x7f0000000440)=[{0x18, 0x11, 0x1000, "494455e54c63"}], 0x18, 0x8080}, 0xfffffffffffffd6d}, {{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x3, 0x0, 0x0, 0x1, {0xa, 0x4e22, 0x7, @mcast1={0xff, 0x1, [], 0x1}, 0x5329}}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000540)="7e9a1c48f6e88b5f25edb4549dcaf4ee2493381cc4172088357aa771c90c211090a121bf9797ee752f1d91758e3649ead3417fef7ce4bc82d631ed9cca4681517f3f1d5cd80d3daa88461c0642ccadc82f1f5aa7c4baf37c3b9874755728fcae21722db31aa5f30e8ce6d49bd7a958a20e7ee9eb367a4d1223d33f1ac755bc772a756ea59ac0487f5dae200ce16fc026f82e63a3e29c4678e15e75d4ad2a6889fdbe5c61894433461be81186266d3977cbe0784136e194d5431c6b3c469bb0dff1ced1be19b6837ffcf3537c0c047d0914cb4f4d8b6f4c69f6ae90e4e671115b7b3bff19e62f17a2ba7bab", 0xeb}, {&(0x7f0000000640)="35734724fa8191072369415b038968871211be68a2a45e3a64035108", 0x1c}, {&(0x7f0000000680)="9048d95e9c632faff5d5c49eded6bc983c04a556c22febd8bd31f74ad9f2a2291e75b70c9e563d1066256f77409eaf4769109668a8da76c6b69510118ad834bcda9756a76e0c193a88f99c513b29372eab60dfa34ad6f28e63fe1ac28c849161642b632e8d3d380d90c7484250da0e197878e531f3701208f28680b9321f1700e8206e4a38e5c7244764591863ca74c08723cca93e113ed760fdd72982172423223a3f5b606bd22d2faf2435a1d832b4af834484af790b427b940979a989e96d8516bcdc331e96dc01be6883880519db36a6b2dafcae0e63cf23ce07498fa485415e325a4e", 0xe5}], 0x3, 0x0, 0x0, 0x800}, 0x800}], 0x3, 0x800) r2 = socket$inet(0x2, 0x3, 0xdc) sendmmsg(r2, &(0x7f0000001e80)=[{{&(0x7f0000000000)=@in={0x2}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000080)}}, {{&(0x7f00000002c0)=@generic={0x0, "f07418eb11dd25792616f1e89da489a89f12436d6a6950b1bd1552d0f6452e0e00d99064a07e2487565703c0db63ddcd9fb6055b227ea412c11b17e78b547248b1c0da4568dcb4cf71cd0328cc9bdee5d592e16a4f7468948bf37c3554291a9540e0c63f30f2d7c5175d2879a089284a77e2e2ec9361db88b8a9a4ec17e4"}, 0x80, &(0x7f0000000600), 0x0, &(0x7f0000004440)}}], 0x2, 0x0) 2018/04/22 09:01:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00001edff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180)="011908000000f5bfcb", 0x9) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000e76000)="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", 0x5b5, 0x0, &(0x7f0000bc8ff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) recvmmsg(r0, &(0x7f0000009940)=[{{&(0x7f00000001c0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f00000024c0), 0x0, &(0x7f0000002540)=""/1, 0x1}}], 0x1, 0x2, &(0x7f0000009bc0)) 2018/04/22 09:01:06 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) r2 = getpid() r3 = syz_open_procfs(r2, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r3, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:06 executing program 5: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) connect$netlink(r1, &(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x1}, 0xc) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 2018/04/22 09:01:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c, 0x80000) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000180)={0x0, 0xffffffff}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000300)={r3, 0x1000, 0x6, 0x80, 0x6, 0x100000001}, 0x14) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r5 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r4) add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000580)="7dccabfb13963fbe35799cf38a986c8fd1fd8e90d644a5be150905af6794bb3aba471be96cdbec79642dbf449ab9c5e5c1f3f111572d8473ac616ea830", 0x3d, r0) r6 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000480)="465151c50c5d63fc78e5ca73498f18b3a837a826e4e8a32fc63a0565c0ac47920cb27745294a6258cc24ef07b4dc318fcad4538d9a441a118484d3971faa2f8a00e97dcd25390c1c2d8c54cd0b43871917d1700f056b034386618d86e15f9bf1069c02856fdd7be6b5f16f35c81b0f33f7f4a2b490a9135a676bc5ef98a1ff0dd177398121fd822f862f42e5ee9f8d9809ad8d097fcbdb6ec49a333b12d61a5548a9bf", 0xa3, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r5, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:06 executing program 6: r0 = memfd_create(&(0x7f00000002c0)="bcf6", 0x0) write(r0, &(0x7f0000000080)="f0", 0x1) accept$inet(r0, &(0x7f0000000100)={0x0, 0x0, @rand_addr}, &(0x7f00000000c0)=0x10) keyctl$join(0x1, &(0x7f0000000000)={0x73, 0x79, 0x7a}) 2018/04/22 09:01:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x0) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f00009a2ff8)='./file0\x00', &(0x7f0000ab4000)='qnx6\x00', 0x2003002, 0x0) pivot_root(&(0x7f0000359ff8)='./file0\x00', &(0x7f00000001c0)='./file1\x00') pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(0xffffffffffffffff) linkat(r0, &(0x7f0000000040)='./file1\x00', r1, &(0x7f00000000c0)='./file1\x00', 0x0) 2018/04/22 09:01:06 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:06 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:06 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) getpid() fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:06 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00001edff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000180)="011908000000f5bfcb", 0x9) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) sendto$inet(r0, &(0x7f0000e76000)="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", 0x5b5, 0x0, &(0x7f0000bc8ff0)={0x2, 0x4e20, @multicast1=0xe0000001}, 0x10) recvmmsg(r0, &(0x7f0000009940)=[{{&(0x7f00000001c0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @remote}}}, 0x80, &(0x7f00000024c0), 0x0, &(0x7f0000002540)=""/1, 0x1}}], 0x1, 0x2, &(0x7f0000009bc0)) 2018/04/22 09:01:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x800) r4 = socket$kcm(0x29, 0x7, 0x0) recvfrom(r3, &(0x7f0000000300)=""/188, 0xbc, 0x2000, &(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x2, 0x0, 0x0, 0x1, {0xa, 0x4e20, 0x12, @local={0xfe, 0x80, [], 0xaa}, 0x6}}}, 0x80) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r5, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:06 executing program 5: socket$packet(0x11, 0x2, 0x300) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) connect$netlink(r1, &(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x1}, 0xc) shutdown(r0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14}}}, 0x1c) 2018/04/22 09:01:06 executing program 4: r0 = open(&(0x7f0000011000)='./bus\x00', 0x8000000141042, 0x0) truncate(&(0x7f0000011000)='./bus\x00', 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x7, 0xfffffffffffffffc, 0x2, 0xf3, 0xe2b2}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={r1, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x15}}}}, 0x84) mmap(&(0x7f0000000000/0x11000)=nil, 0x11000, 0x0, 0x11, r0, 0x0) r2 = semget$private(0x0, 0x7, 0x2) semctl$IPC_INFO(r2, 0x3, 0x3, &(0x7f0000000000)=""/37) mremap(&(0x7f000000d000/0x2000)=nil, 0xfffffffffffffe74, 0x1000, 0x3, &(0x7f0000007000/0x1000)=nil) 2018/04/22 09:01:06 executing program 6: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7fc, 0x200400) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x3c}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x3ff, 0x7fff, 0x5, 0x9, 0x7095, 0x10001, 0x0, 0x7, r1}, &(0x7f0000000100)=0x20) mount(&(0x7f0000000140)='.', &(0x7f0000000180)='.', &(0x7f00000001c0)='tmpfs\x00', 0x0, &(0x7f0000000200)) 2018/04/22 09:01:06 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:06 executing program 6: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000340)={0x0, 0x7f}, &(0x7f0000000380)=0x8) r2 = request_key(&(0x7f0000000100)='user\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='nodevposix_acl_access\x00', 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r2, 0x5) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000003c0)={0x4, 0x201, 0xea, 0x8, 0x0}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000280)={r3, 0xfffffffffffffff8}, &(0x7f0000000300)=0xfffffffffffffe8f) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={r4, 0x84, &(0x7f0000000140)=[@in6={0xa, 0x4e24, 0x1f, @loopback={0x0, 0x1}, 0x7fffffff}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}, @in={0x2, 0x4e21, @multicast1=0xe0000001}, @in6={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0xc}, 0x425}, @in6={0xa, 0x4e24, 0x4, @dev={0xfe, 0x80, [], 0x15}, 0x4}, @in={0x2, 0x4e24, @multicast2=0xe0000002}]}, &(0x7f0000000240)=0x10) ppoll(&(0x7f00001b2000)=[{r1}], 0x1, &(0x7f00000d3ff0)={0x77359400}, &(0x7f0000f06ff8), 0x8) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) write$evdev(r1, &(0x7f0000000040)=[{}], 0x18) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000440)={{{@in=@local, @in=@local}}, {{@in6=@remote}, 0x0, @in6=@loopback}}, &(0x7f00000000c0)=0xe8) 2018/04/22 09:01:06 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:06 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) getpid() fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:06 executing program 5: r0 = syz_open_dev$urandom(&(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) r1 = dup(r0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f00000000c0)=""/253) 2018/04/22 09:01:06 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = memfd_create(&(0x7f0000000000)='\x00', 0x1) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f00000000c0)=""/228) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)) write$binfmt_elf32(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{0x0, 0x0, 0x1}], "", [[]]}, 0x158) 2018/04/22 09:01:06 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) r3 = memfd_create(&(0x7f0000000140)='keyring\x00', 0x1) getsockopt$inet_sctp6_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000340)=@assoc_value={0x0, 0x400}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000004c0)={r4, 0x80000001, 0x30}, &(0x7f0000000500)=0xc) accept$ax25(r3, &(0x7f0000000180), &(0x7f0000000280)=0x10) r5 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vga_arbiter\x00', 0x4000000000080000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x701000, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r7, 0x1, 0x1, &(0x7f00000000c0)={0x200}, 0x4) keyctl$dh_compute(0x17, &(0x7f0000000100)={r5, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:07 executing program 6: r0 = open(&(0x7f0000000000)='./bus\x00', 0x100000141841, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) syz_mount_image$ntfs(&(0x7f0000000440)='ntfs\x00', &(0x7f00000001c0)='./bus\x00', 0x0, 0x0, &(0x7f00000005c0), 0x1000, &(0x7f00000006c0)=ANY=[]) 2018/04/22 09:01:07 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) getpid() fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:07 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, 0x0, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:07 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:07 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = accept4$llc(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000180)=0x10, 0x800) r4 = socket$kcm(0x29, 0x7, 0x0) recvfrom(r3, &(0x7f0000000300)=""/188, 0xbc, 0x2000, &(0x7f0000000480)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x2, 0x0, 0x0, 0x1, {0xa, 0x4e20, 0x12, @local={0xfe, 0x80, [], 0xaa}, 0x6}}}, 0x80) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r5, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:07 executing program 2: r0 = dup(0xffffffffffffff9c) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r0, 0x111, 0x2, 0x1, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$int_in(r1, 0x541f, &(0x7f0000000000)) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00003de000)='/dev/vhost-net\x00', 0x2, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x80000) ioctl$TCSBRKP(r3, 0x5425, 0x2010004) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f00000000c0)=0x5000000) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r3, 0x29, 0xd2, &(0x7f0000000040)={{0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0xd}, 0x100000000}, {0xa, 0x4e21, 0x3, @loopback={0x0, 0x1}, 0x1}, 0x7, [0x0, 0x8, 0x1ff, 0x7, 0x100, 0x3, 0x9000000000000, 0x9]}, 0x5c) write$vnet(r2, &(0x7f0000a8d000)={0x1, {&(0x7f0000c91000)=""/24, 0x18, &(0x7f0000b4cf9b)=""/101, 0x3, 0x2}}, 0x5aa) 2018/04/22 09:01:07 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x80000000, 0x0, 0xd9, 0x80000000}, &(0x7f00000000c0)=0x18) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000100)={r1, 0x6}, 0x8) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@multicast2=0xe0000002, @multicast1=0xe0000001, 0x2}, 0x192) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1=0xe0000001, @local={0xac, 0x14, 0x14, 0xaa}}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, &(0x7f0000001ff4)={@multicast2=0xe0000002, @multicast1=0xe0000001, @loopback=0x7f000001}, 0xc) 2018/04/22 09:01:07 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000600)="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", 0x1000, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:08 executing program 0: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:08 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r2, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:08 executing program 5: r0 = perf_event_open(&(0x7f0000348f88)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x60000, 0x0) clone(0x0, &(0x7f0000001240), &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 2018/04/22 09:01:08 executing program 4: r0 = socket$inet(0x2, 0x800, 0xfffffffffffffffe) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xf3ae, 0x101000) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000040)={&(0x7f0000ffa000/0x4000)=nil, 0x4, 0x5, 0x2, &(0x7f0000ff9000/0x4000)=nil, 0x8}) sendto$inet(r0, &(0x7f0000e9bf14), 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f000084e000), 0x4) 2018/04/22 09:01:08 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:08 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:08 executing program 2: r0 = socket$inet(0x2, 0x803, 0x3) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000340)=""/152, &(0x7f0000000000)=0x98) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x2, 0x280, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, &(0x7f0000000900), &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffc, 0x2, [{{{0x3, 0x0, 0x0, 'gre0\x00', 'bcsf0\x00', 'ip6tnl0\x00', 'bcsf0\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [], @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], 0x70, 0x108, 0x138}, [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00'}}}, @common=@LED={'LED\x00', 0x28, {{'syz0\x00'}}}]}, @common=@AUDIT={'AUDIT\x00', 0x8}}, {{{0x3, 0x0, 0x0, 'bcsh0\x00', 'ip6gre0\x00', 'gretap0\x00', 'ipddp0\x00', @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], @random="ee067bca9f8d", [], 0x70, 0x70, 0xb8}}, @common=@ERROR={'ERROR\x00', 0x20, {"364c0eb3bb262ad19cd13b05ba6ef2182ea1e01a5d5910d480e2dc4b87cd"}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffe}]}, 0x2f8) 2018/04/22 09:01:08 executing program 6: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00006dc000)=[{0x6}]}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback=0x7f000001}, 0x10) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x1000000000000012, 0x0, @thr={&(0x7f0000000080)="ab43d647a57f0e0b8eac1515f662536b6099ac41470439a2091060d04f6535977baf0f44b185d49a55fa96b2562b431d3154296aada4ebdb864147bfef5ba9d4f22b4a05444c196f8d8b4a12cb3e912246f18e513832e2b8fbd3820844ba39ef35c81dcf2daab33b71b9c4be45b035a6f07d832148ee70f90cb8dc69b6ae4ea7ec90f95fb179169cc82f378e6bef95cdafd44d974481df71a0c28f3c22751e", &(0x7f0000000140)="3f351c8b16143c52808e6c5ddd87e9a893abce633c47ed316169bf3cff31e1d58ee399964f599ae024d5464e25d4b54d9336375454d11bcd5896c01921df23b14a8f79f6fa84ff84b07df04e51b2a84190be7cc828ca72d2fccdf47e5a0b914b6e24a8cefcc11dc3dbd9c233d7a4cc42d08e7c0187ab1ea1d8e6d66498bc97bf680709aedb2cb72bd27fb7c4d9e97281"}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) readv(r0, &(0x7f0000000580)=[{&(0x7f0000000380)=""/204, 0xcc}], 0x1) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x31, 0xffffffffffffffff, 0x0) tkill(r1, 0x1000000000016) 2018/04/22 09:01:08 executing program 0: add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:08 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000340)={0x8000, 0x9, 0x9, 0xff, 0x34, 0x5, 0x1, 0x8, 0x100000000, 0xc0}) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r2, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:08 executing program 7 (fault-call:5 fault-nth:0): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:08 executing program 5: clock_gettime(0x0, &(0x7f0000000040)={0x0}) setitimer(0x1, &(0x7f0000000140)={{0x77359400}, {r0}}, &(0x7f0000000180)) setitimer(0x1, &(0x7f0000000000), 0x0) r1 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x7, 0x80000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x80000001}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000300)={r2, 0x80, 0xffffffffffffff85, 0x8, 0x1, 0x1}, &(0x7f0000000340)=0x14) 2018/04/22 09:01:08 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000000040)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) mount(&(0x7f00002b9ff8)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) unshare(0x7fff77fd) mount(&(0x7f0000adcff8)='./file0\x00', &(0x7f0000000140)='.', &(0x7f00005e9000)='cifs\x00', 0x2000, &(0x7f0000ad5000)) [ 124.485882] FAULT_INJECTION: forcing a failure. [ 124.485882] name failslab, interval 1, probability 0, space 0, times 0 [ 124.497281] CPU: 0 PID: 8849 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 124.504151] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 124.513527] Call Trace: [ 124.516162] dump_stack+0x185/0x1d0 [ 124.519842] should_fail+0x87b/0xab0 [ 124.523611] should_failslab+0x279/0x2a0 [ 124.527736] __kmalloc_track_caller+0x208/0xcb0 [ 124.532500] ? strndup_user+0x134/0x1f0 [ 124.536529] memdup_user+0x7c/0x200 [ 124.540200] strndup_user+0x134/0x1f0 [ 124.544093] __keyctl_dh_compute+0x804/0x1ef0 [ 124.548668] ? kstrtouint_from_user+0x373/0x410 [ 124.553388] ? kmsan_set_origin+0x9e/0x160 [ 124.557676] keyctl_dh_compute+0x22e/0x260 [ 124.561969] ? SyS_keyctl+0x76/0xa0 [ 124.565625] SYSC_keyctl+0xd31/0x1830 [ 124.569526] ? syscall_return_slowpath+0xe9/0x700 [ 124.574435] ? fput+0x25c/0x2e0 [ 124.577788] ? SYSC_write+0x2f0/0x360 [ 124.581654] SyS_keyctl+0x76/0xa0 [ 124.585191] do_syscall_64+0x309/0x430 [ 124.589117] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 124.594074] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 124.599269] RIP: 0033:0x455389 [ 124.602461] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 124.610178] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 124.617448] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 124.624720] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:08 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:08 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) [ 124.631987] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 124.639258] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000000 2018/04/22 09:01:08 executing program 5: unshare(0x8000400) r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x10000000004002) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x8, 0x880) mkdirat(r1, &(0x7f0000000080)='./file0\x00', 0x62) ioctl(r0, 0x440000000000127d, &(0x7f0000000140)) 2018/04/22 09:01:08 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) open(&(0x7f0000000180)='./file0\x00', 0x0, 0x44) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x10800, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r3, 0x800455d1, &(0x7f0000000600)=""/4096) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r2) 2018/04/22 09:01:08 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:08 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1000, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000100)={{0x8, 0x8000}, 0x21}, 0x10) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f000002f000)) mount(&(0x7f0000000000)='.', &(0x7f0000000040)='.', &(0x7f0000000080)='afs\x00', 0x1000, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000140), &(0x7f0000000180)=0x4) umount2(&(0x7f000075e000)='.', 0x0) 2018/04/22 09:01:08 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f00000001c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw(anubis)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000440)={&(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x5, 0xa, 0x1, 0x8}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00003bcfd0)="d3ab27191a01002356ba602dff05000bfef9b9d2a4b20079fffffffffffffe00", 0x20) writev(r1, &(0x7f0000000040)=[{&(0x7f00000001c0)="1793164adee20297cf935dec98b6ffb2", 0x10}], 0x1) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000011c0)=""/244, 0xf4}], 0x1, &(0x7f00000012c0)=""/4096, 0x1000}, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) r3 = msgget(0x1, 0x585) msgrcv(r3, &(0x7f0000000280)={0x0, ""/211}, 0xdb, 0x0, 0x800) [ 125.153247] alg: No test for lrw(anubis) (lrw(ecb(anubis-generic))) 2018/04/22 09:01:09 executing program 5: socketpair$inet(0x1e, 0x1, 0x0, &(0x7f00001b6ff8)={0x0, 0x0}) sendmsg$key(r1, &(0x7f0000d4c000)={0x0, 0x0, &(0x7f000089c000)={&(0x7f0000e6ce08)={0x2, 0x0, 0x0, 0x0, 0x2}, 0xffffffa3}, 0x1}, 0x0) recvmsg(r0, &(0x7f00002ed000)={&(0x7f0000559fec)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x14, &(0x7f0000686fa0)=[{&(0x7f0000ae3000)=""/22, 0xb03568cd}], 0x1, &(0x7f0000000000)=""/4096, 0xffffffffffffff73}, 0x121) 2018/04/22 09:01:09 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:09 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = getpid() ptrace$getsig(0x4202, r5, 0x1, &(0x7f0000000280)) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x800, 0x0) ioctl$KDGKBDIACR(r6, 0x4b4a, &(0x7f0000000140)=""/95) getsockname$unix(r6, &(0x7f0000000300), &(0x7f00000000c0)=0x6e) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:09 executing program 7 (fault-call:5 fault-nth:1): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:09 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:09 executing program 2: r0 = socket$nl_generic(0x2, 0x2, 0x88) sendmsg(r0, &(0x7f00000026c0)={&(0x7f0000000000)=@in={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x80, &(0x7f0000001300), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1400000000000000000000000002000000a71ebf25176c0f54248f8b9ac58ea7935b9f5afc126632a31206fe387dae03bac87bea904e8a0aa96ee643eb685ef318a31fcdd57c4bb5b127b28a84300f5a99bc441b5ea230982cb585de1ab16e73bbbaa643fa979606caa1f5935972d6e535cb5435ca8c30d5d6e46e12820d6cb438e6441ae26f606745bb8e82af788109fb2880ea5eb8801a65c620995382d45fcd1b3e4e3cb076aa4e6a92c4c1001fe58f12aa46b86634e1e5a3c624a01d06a963f9f810524238d1e8ccd6d977619e2ec6813d73337cb52344044f5650f2534efc7ecf8d2f5a793eb20311a76c"], 0x14}, 0x0) 2018/04/22 09:01:09 executing program 6: setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'osx.', 'mime_type:@}{vmnet1em1\'ppp0system@selinuxposix_acl_access\x00'}, &(0x7f0000000140)='lo*#\x00', 0x5, 0x2) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x10f, 0x4) sendto$inet6(r0, &(0x7f00000000c0), 0x246, 0x0, &(0x7f0000005fe4)={0xa, 0x0, 0x100000002, @mcast2={0xff, 0x2, [], 0x1}}, 0x1c) recvmsg(r0, &(0x7f0000001740)={&(0x7f00000000c0)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000001680)}, 0x2000) 2018/04/22 09:01:09 executing program 4: openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8083c3f9901e47cd, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x1, 0x5, 0x9}, 0x14) r1 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0xd, 0xa, 0x4, 0x100000001, 0x0, r0}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00005f1000)={r1, &(0x7f0000eed000), &(0x7f0000b88000)="13"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r1, &(0x7f0000000000), &(0x7f0000000140)=""/129}, 0x18) timer_create(0x6, &(0x7f0000000080)={0x0, 0x1b, 0x1, @thr={&(0x7f0000000040), &(0x7f0000000200)="304978e27debcafb3fc41d139ff75b21b6d5943e166aaa7cfba69795e8cddbc521e64a21d610cce4b28b1d99a5de2cd8d792dae2f71b6acbeccfe4b6dd7dd7f67cefc6de79c42bb6e02a4e8f17f40dd0a12547708acf57a435557dfab0153bb47db125a3250b19cdcdd3a1d0da69b254f6ae49894fa5e9100272ae1d95ec5f0ecb28b273c727272a3a51fd7dedce896d070a286ef543840196ea"}}, &(0x7f00000000c0)=0x0) timer_gettime(r2, &(0x7f0000000300)) [ 125.557423] FAULT_INJECTION: forcing a failure. [ 125.557423] name failslab, interval 1, probability 0, space 0, times 0 [ 125.568819] CPU: 1 PID: 8914 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 125.575724] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 125.585125] Call Trace: [ 125.587777] dump_stack+0x185/0x1d0 [ 125.591464] should_fail+0x87b/0xab0 [ 125.595246] should_failslab+0x279/0x2a0 [ 125.599361] __kmalloc+0xc2/0x350 [ 125.602897] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 125.608307] ? crypto_create_tfm+0x10a/0x640 [ 125.612758] ? crypto_alg_extsize+0x66/0xc0 [ 125.617169] crypto_create_tfm+0x10a/0x640 [ 125.621500] crypto_alloc_tfm+0x3a9/0x710 [ 125.625750] crypto_alloc_shash+0x99/0xb0 [ 125.629994] __keyctl_dh_compute+0x9c5/0x1ef0 [ 125.634576] ? kstrtouint_from_user+0x373/0x410 [ 125.639297] ? kmsan_set_origin+0x9e/0x160 [ 125.643589] keyctl_dh_compute+0x22e/0x260 [ 125.647880] ? SyS_keyctl+0x76/0xa0 [ 125.651536] SYSC_keyctl+0xd31/0x1830 [ 125.655440] ? syscall_return_slowpath+0xe9/0x700 [ 125.660348] ? fput+0x25c/0x2e0 [ 125.663705] ? SYSC_write+0x2f0/0x360 [ 125.667587] SyS_keyctl+0x76/0xa0 [ 125.671139] do_syscall_64+0x309/0x430 [ 125.675089] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 125.680063] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 125.685283] RIP: 0033:0x455389 [ 125.688488] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 125.696229] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 2018/04/22 09:01:09 executing program 2: socketpair$unix(0x1, 0x200000000005, 0x0, &(0x7f0000000ff8)={0xffffffffffffffff}) clock_adjtime(0x7, &(0x7f0000000000)={0x4, 0x1, 0x9, 0x1000, 0x6c, 0x7ff000000000000, 0xd90, 0x2, 0xfffffffffffff800, 0x6, 0x8, 0x7, 0x3, 0x100000000, 0xff, 0x4, 0xcfab, 0x5, 0xb5c2, 0x4, 0x4, 0x9, 0x1000, 0x0, 0x3}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000697000)={0x2, &(0x7f000030a000)=[{0x28, 0x0, 0x0, 0xfffffffffffff004}, {0x6}]}, 0x10) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000000, 0x3, 0x40000) 2018/04/22 09:01:09 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000ec0)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000000), 0x0, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r5 = accept4(0xffffffffffffffff, &(0x7f0000000300)=@ethernet={0x0, @local}, &(0x7f0000000180)=0x80, 0x800) sendmmsg$alg(r5, &(0x7f0000000e40)=[{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000600)="4aba2a130234bff6f39873bc9f87442abbd0e7001e0deaf4aa31bc668579b1095960931be6957e412cf721d9bf0e2d999690b4210ed089d296ab7578627dc156278eeb776a96ea314ddd656e54f90ef0bf40d54a796cec50d077cb6811ed0a762ff72f00467bcec767cc6a9d5a022dab5878c1041bdd0a154d9ce12aab4d51d6416fdb935685eaf65bf3aee8304e447b395628abddbb3e4d676c00427085514c9655c9b8a7c7d32a2501f6a26486fc4e263d62298a58f2e8cf37188a358458", 0xbf}, {&(0x7f00000006c0)="44efaafc38973c898a5da825499dd330b3415d3715780239a65989d6ce5b52185a0195711f70879a4931398262e8307c244ee788bbedd4dcad77b2becd1f9b35be6f3e3bfaf5585f0d52bdbbe0ef97d3ab30dc6221a02232cca59692c5bc3c85443877e61035b40170cbb0bcd43b4629ea38fd24a2068717250c0efb5e14dd900cc5bb87f3c0166f7e8fa1a62e5bd6c00767d856a610ddb900440e5e3bfc3cf534160c1c6da754e4e690f48276cc2fdc16e23d6d9c05f852054415a662ca6ebad36c3d1ebbff8b572355896224e68615e65798d581", 0xd5}, {&(0x7f00000007c0)="77f5fb95110ade21d1bc069353b061c0c325855da3ff214017b496b0189c826eca5b2294c49ecc1c78c47967baaed8188d71052eb6f4581e0999ada461fe03f9455e9aa01d00d2f502bcd4035d95a08230406d3d77bda4cf52ef79c7585a8ebecad04315cd1652a614ed332b443b4ae61d492fec78975ebc196551b8ab6033bef41bb3631f1aa6413cfd794db00b8ab7523cd5d31f7499255541e3a38008a67e788e4bf59cf33555ef5bc3c9228bde32a231136dcdbe40fa42dc1f61a815bec11125173dd1e0eea691eb1b690c159c03752cbde396a365b80cdc34351906615186a04d156d3380258f6f32c9d2ec", 0xee}, {&(0x7f0000000280)="ef73df0423d3fc60ff6ef47b0ea88e9537cc9bb807247b0e15005dc12fbfb260ccdc644f8e20fa9d62a7077f0040003237", 0x31}, {&(0x7f00000008c0)="964aad75503746b4dc2be663ea3b35f97d97f249249439c89444c5c426b56f9bb17c08ca998ee52c032a4bf55eedf346cbef617b0b4b2b68b1bf9ce308ee3182ddc2c90a3a241ca8208e2b85b4bfc172a89bca6579e47617bd843724191d36d36470d0ff330108104ef0439dbc4952c4d9acbcedd7f47d5bb063290dc35eacc6aba27ac6b17f57d654c2f09040", 0x8d}, {&(0x7f0000000980)="c7ce588423b17a3e434b850f60bbe019e4d13aec5975b8b21a5a5c9e6d1dcf64e3d21dc077c151c1c77d8aad37ced01ac350a952dfebfc45541a454ebb63c2525109e9a979aa10c86d566cd973f557fc82da6338b18c6cc42a7c6fcfbffd14c66e42e762fb3b157cd9b367409c6b6010ebc28b8a5cf0d278b323eda795e419c883100d17dd52671a84227931dfb5f07f4a9fe0616104f80177e75044511b490bf8fed5628edf80e57e", 0xa9}], 0x6, &(0x7f0000000580)=[@assoc={0x18, 0x117, 0x4, 0x4}], 0x18, 0x20000810}, {0x0, 0x0, &(0x7f0000000d40)=[{&(0x7f0000000ac0)="62205ca72e748e25dde40921eebaccc1bd119a500fe255374667e6dd3d5eded26c5c50b18a23658a59c9ef09cdafac724cf43ce21ae3f2e1d97fb1f093c981b84603ab3e04cce93d69464919a1f91e2faf51af5b110bbe95e5ab2b389fae6a8886cff67d0410055c6999a972db0a6ac6bb8f5c623982c702edc302b4bfcb0f788915648a0ba6eee2c44278352ddfe8d423eccd33f10d47eefd1ffe6905d3918fe24a0b16276a694f99a332f3698c26d2912e90d1232b033f22d6098c", 0xbc}, {&(0x7f0000000b80)="e5e6c9044311981df48165f14369cd07adcd294ff91c8566ddf0438d3d6dc19ae3570e5663ce29cf846e73dcc16073ec7d", 0x31}, {&(0x7f0000000bc0)="deda88e8e5c4ff235070a3e0dea6aec1379c0649b8381778d06be5f4cfd1befd62529336bc0bd9d352354168a397f8a821fbd585085fed2a908c7b1706f223973082062126d4e19223637deefab3d6be41532ad660afe242558bfd1bfb7b4054290c9a7086aaac0773806e354a1aad5b34056f1c84b45a5f4a2410afb66beebfaae914b3d875762d69ccaa7beb585b", 0x8f}, {&(0x7f0000000c80)="4ca5b4fd5b74bedb9af7311a7b72a197d8c336d152905c8af3f78c0333aac5b42c95ddb9dca07220d079a7491f169f4205ec300b3ca33cf219eba683e68270ff4b5f3506fe21009a985a4eeeaf709300d3142c5b6d9dd445", 0x58}, {&(0x7f0000000d00)="ae2121f31ce5b3bb6ed670c79abd374d352ef05030824cbacaabaae7a624692e249d69ed544fdcee4e5627ac621e8c861fb9920eee5da3fd17357bc4a2d5c0", 0x3f}], 0x5, &(0x7f0000000dc0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x3}, @assoc={0x18, 0x117, 0x4, 0x3f}, @assoc={0x18, 0x117, 0x4, 0xdfc7}, @assoc={0x18, 0x117, 0x4, 0x9}], 0x78, 0x4000000}], 0x2, 0xc004) r6 = memfd_create(&(0x7f0000000000)='@\x00', 0x2) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) mq_timedsend(r6, &(0x7f0000000480)="8d9de7e32c2ecbde1569dfd8edde3c79f287b267a9f0e7032d0574d536d1f43a67941619291965de2465e7eb0e6d5589298a9e78aa0807c8400f7bf47b1aa0228041d5b8a7387899343ea5e7bd422b8c04819a07e629d98fdc5582af6aa8d2a68176bd195c618e9cefca1d40e65ff4bb9b9f36219e2239451f299d3b0590247f26a4a2ce162cbfd4c5a1c469b4b601ca6108d5104374da89572f8b20c2ff5e8b092e07c7e3eee7d57400d71fc5c3e96f4e4236fae39493efbee4700edc5cb28ef9496c8274c5d8919d7e2f92486d2539c89cbca510615fc651a429cd1dd3a86817300a092e88e1d36918bc9e6a0822", 0xef, 0x0, &(0x7f0000000140)={r7, r8+30000000}) 2018/04/22 09:01:09 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:09 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000004d80)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004dc0)={{{@in=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000004ec0)=0xe8) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000586ff8)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000a2af87)=""/121, 0xfffffffffffffdd0) [ 125.703520] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 125.710817] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 125.718113] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 125.725407] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000001 [ 125.733009] could not allocate digest TFM handle crct10dif 2018/04/22 09:01:09 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:09 executing program 4: r0 = accept$ipx(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x10) bind$ipx(r0, &(0x7f0000000200)={0x4, 0x1, 0x5, "c837247f83bd"}, 0x10) r1 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000000)=@nl=@proc={0x10}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="5500000018007fafb72d1cb2a4a280930206002000a843096c26236925000600290002000000ca8a9848a3c728f1c46b7b31afdc1338d54600009b84136ef75afb83de448daa7227c43ab8220000bf0cec6bab91d4", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) 2018/04/22 09:01:09 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$set_timeout(0xf, r0, 0xfffffffffffffeff) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4800, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r5, 0x10e, 0x1, &(0x7f00000000c0)=0x1f, 0x4) 2018/04/22 09:01:09 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x1000004e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000240)=0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001cc0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}]}, 0x28}, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2}}, 0x0, 0x0, 0x0, 0x20, 0x4}, 0x98) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 125.903907] netlink: 'syz-executor4': attribute type 6 has an invalid length. [ 126.158359] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 2018/04/22 09:01:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x1000004e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000240)=0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001cc0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}]}, 0x28}, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2}}, 0x0, 0x0, 0x0, 0x20, 0x4}, 0x98) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/22 09:01:10 executing program 4: r0 = socket$rds(0x2, 0x5, 0x0) sendmsg$rds(r0, &(0x7f0000002fc8)={&(0x7f0000002000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff, 0xaa}}, 0x10, &(0x7f0000003000)=[{&(0x7f0000002000)=""/181, 0xb5}], 0x1}, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x84) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000100)=0x8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) mq_notify(r2, &(0x7f0000000080)={0x0, 0x31, 0x6, @tid=r3}) setsockopt$RDS_RECVERR(r0, 0x84, 0x6, &(0x7f0000001ffc), 0x84) 2018/04/22 09:01:10 executing program 6: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000004d80)='/dev/sequencer2\x00', 0x400, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000004dc0)={{{@in=@remote, @in=@multicast1}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000004ec0)=0xe8) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) lsetxattr(&(0x7f0000712ff8)='./file0\x00', &(0x7f0000faffe7)=@known='security.capability\x00', &(0x7f00002b2fec)="0000000201000000000000010400000000000000", 0x14, 0x0) getxattr(&(0x7f0000586ff8)='./file0\x00', &(0x7f0000d8e000)=@known='security.capability\x00', &(0x7f0000a2af87)=""/121, 0xfffffffffffffdd0) 2018/04/22 09:01:10 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) getpgrp(r0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:10 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000000)={r3, r4, r4}, &(0x7f00000000c0)=""/5, 0xfffffec7, &(0x7f0000000140)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:10 executing program 7 (fault-call:5 fault-nth:2): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:10 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000070ffe3)={0xa, 0x1000004e20}, 0x1c) sendto$inet6(r0, &(0x7f000023effe)="7f", 0x1, 0x0, &(0x7f000010e000)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000240)=0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000001cc0)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b}]}, 0x28}, 0x1}, 0x0) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000180)={0x0, @in={{0x2}}, 0x0, 0x0, 0x0, 0x20, 0x4}, 0x98) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) 2018/04/22 09:01:10 executing program 0 (fault-call:1 fault-nth:0): mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) [ 126.697585] FAULT_INJECTION: forcing a failure. [ 126.697585] name failslab, interval 1, probability 0, space 0, times 0 [ 126.708970] CPU: 0 PID: 8978 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 126.715858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 126.725251] Call Trace: [ 126.727912] dump_stack+0x185/0x1d0 [ 126.731597] should_fail+0x87b/0xab0 [ 126.735395] should_failslab+0x279/0x2a0 [ 126.739550] __kmalloc+0xc2/0x350 [ 126.743096] ? __keyctl_dh_compute+0xb61/0x1ef0 [ 126.747853] __keyctl_dh_compute+0xb61/0x1ef0 [ 126.752428] ? kstrtouint_from_user+0x373/0x410 [ 126.757168] keyctl_dh_compute+0x22e/0x260 [ 126.761455] ? SyS_keyctl+0x76/0xa0 [ 126.765112] SYSC_keyctl+0xd31/0x1830 [ 126.769005] ? syscall_return_slowpath+0xe9/0x700 [ 126.773904] ? fput+0x25c/0x2e0 [ 126.777266] ? SYSC_write+0x2f0/0x360 [ 126.781148] SyS_keyctl+0x76/0xa0 [ 126.784690] do_syscall_64+0x309/0x430 [ 126.788634] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 126.793610] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 126.797115] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 126.798819] RIP: 0033:0x455389 [ 126.798836] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 126.798871] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 126.798889] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 126.798908] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 126.798924] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 2018/04/22 09:01:10 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:10 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@ipx, &(0x7f0000000000)=0x80, 0x800) r5 = syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0x2, 0x200000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000640)={0x2, 0x0, 0x0, 0x1}) symlinkat(&(0x7f0000000700)='./file0\x00', r5, &(0x7f0000000740)='./file0\x00') ioctl$DRM_IOCTL_AGP_FREE(r5, 0x40206435, &(0x7f0000000680)={0x5, r6, 0x10000, 0x6}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="57000000255d673885fc8adebb1a3d31df4c7b0a1e97f545dfe919a4c9b5c46de698264221c6bed29a3c98732434fb438ad918d2ba4a70fb1be520ff1a529640826babb3b704035b13326f3c1a0b1da65fe68a4ec03f6961b1207506000000b1d61948fbb4c4e3c2081b2170b0fff7604b7631541cab97222199002a3bf427eb83e8466339cb162f5800000000000000"], &(0x7f00000000c0)=0x5f) socketpair(0x11, 0x801, 0x88, &(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNGETSNDBUF(r9, 0x800454d3, &(0x7f0000000580)) r10 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_int(r10, 0x29, 0x43, &(0x7f0000000300), &(0x7f0000000340)=0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000280)={r7, 0x5}, &(0x7f0000000480)=0x8) r12 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000340)={r11, 0xbd}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r12, r12}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) ioctl$TUNSETNOCSUM(r8, 0x400454c8, 0x1) [ 126.798952] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000002 [ 126.847381] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 2018/04/22 09:01:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='\x00', 0x4000, 0x110) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x101000, 0x0) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x20110, r0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:11 executing program 7 (fault-call:5 fault-nth:3): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:11 executing program 6: unshare(0x40600) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2020c440, 0x0) r1 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000fff)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x5d) 2018/04/22 09:01:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0xffffff49, r0) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000000)={0x4, 0x0, 0x0, 0xffff, 0x7}, 0xc) [ 127.309972] FAULT_INJECTION: forcing a failure. [ 127.309972] name failslab, interval 1, probability 0, space 0, times 0 [ 127.321424] CPU: 1 PID: 8996 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 127.328306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.337692] Call Trace: [ 127.340336] dump_stack+0x185/0x1d0 [ 127.344007] should_fail+0x87b/0xab0 [ 127.347778] should_failslab+0x279/0x2a0 [ 127.351932] __kmalloc_track_caller+0x208/0xcb0 [ 127.356664] ? dh_data_from_key+0x272/0x3e0 [ 127.361026] ? rcu_all_qs+0x32/0x1f0 [ 127.364799] kmemdup+0x95/0x140 [ 127.368136] dh_data_from_key+0x272/0x3e0 [ 127.372383] __keyctl_dh_compute+0x3cb/0x1ef0 [ 127.376951] ? kstrtouint_from_user+0x373/0x410 [ 127.381689] keyctl_dh_compute+0x22e/0x260 [ 127.385984] ? SyS_keyctl+0x76/0xa0 [ 127.389643] SYSC_keyctl+0xd31/0x1830 [ 127.393545] ? syscall_return_slowpath+0xe9/0x700 [ 127.398448] ? fput+0x25c/0x2e0 [ 127.401822] ? SYSC_write+0x2f0/0x360 [ 127.405704] SyS_keyctl+0x76/0xa0 [ 127.409250] do_syscall_64+0x309/0x430 [ 127.413202] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 127.418182] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 127.423400] RIP: 0033:0x455389 [ 127.426612] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 127.434360] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 127.441656] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 127.448952] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 127.456245] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 127.463542] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000003 2018/04/22 09:01:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x00') ioctl$fiemap(r0, 0x40086602, &(0x7f0000000040)=ANY=[@ANYBLOB="01000100000061a5dcd300000000000000af71"]) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000140), 0xc) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x8) inotify_init1(0x80000) 2018/04/22 09:01:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:11 executing program 2: clock_gettime(0x4000000003, &(0x7f0000097000)={0x0, 0x0}) clock_nanosleep(0x1000000000000002, 0x0, &(0x7f0000c87000)={0x0, r0}, &(0x7f00000d6000)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000139000), &(0x7f0000e81fba)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r1, 0x15) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={0x3, {0x2, 0x4e22, @broadcast=0xffffffff}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10, 0x3, 0x6, 0x81, 0x0, &(0x7f0000000100)='veth0\x00', 0xd7, 0x5, 0xd775}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10000, 0x60) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @multicast1, @multicast2}, &(0x7f00000000c0)=0xc) restart_syscall() 2018/04/22 09:01:11 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r0 = open(&(0x7f0000aa0000)='./file0\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x800000000402, 0xffffffffffffffff) readv(r0, &(0x7f00000013c0)=[{&(0x7f00000003c0)=""/4096, 0x1000}], 0x1) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000000)=[0x7, 0x9, 0x6, 0x1, 0xffffffff, 0xfff, 0x3], 0x7, 0x9, 0x100000000, 0x5, 0xa155, 0x9873, {0x7, 0x1, 0x1, 0x6, 0xfffffffffffffff7, 0x5, 0x6, 0x4, 0x9, 0x1, 0x8, 0x6, 0x60000000, 0x7f, "565529164dca3f383731694d570316dad18587de209394dd39f334392d3a0bf9"}}) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x6, 0x4) 2018/04/22 09:01:11 executing program 7 (fault-call:5 fault-nth:4): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:11 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00004da000), 0x4) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r4 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x3}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f00000001c0)={r5, 0x3}, 0x8) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000040)={@in={{0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}}, 0xac, 0x3, 0x2, "785cd26ab195257f5cfe90e06436e500980f732ae72f540f58cda44a2ec0fcdd674d7d62e0df6d5e4e36f678ab162707268e4d92e930aea7a6f004bcb797c98a31d3e2bc547ec4b9f09e77ec0edf79b8"}, 0xd8) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000475026)={0xfff}, 0x4) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r6, 0x107, 0x12, &(0x7f000007affc), 0x4) 2018/04/22 09:01:11 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='security.ima\x00', &(0x7f0000000040)=""/72, 0x48) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000140), &(0x7f0000000180)=0xc) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x17a896ff, 0xf8ed1d906259b32a) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) [ 127.655179] FAULT_INJECTION: forcing a failure. [ 127.655179] name failslab, interval 1, probability 0, space 0, times 0 [ 127.666641] CPU: 0 PID: 9029 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 127.673516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 127.682903] Call Trace: [ 127.685578] dump_stack+0x185/0x1d0 [ 127.689259] should_fail+0x87b/0xab0 [ 127.693042] should_failslab+0x279/0x2a0 [ 127.697212] __kmalloc_track_caller+0x208/0xcb0 [ 127.701943] ? dh_data_from_key+0x272/0x3e0 [ 127.706570] ? rcu_all_qs+0x32/0x1f0 [ 127.710346] kmemdup+0x95/0x140 [ 127.713693] dh_data_from_key+0x272/0x3e0 [ 127.717943] __keyctl_dh_compute+0x453/0x1ef0 [ 127.722517] ? kstrtouint_from_user+0x373/0x410 [ 127.727262] keyctl_dh_compute+0x22e/0x260 [ 127.731564] ? SyS_keyctl+0x76/0xa0 [ 127.735228] SYSC_keyctl+0xd31/0x1830 [ 127.739130] ? syscall_return_slowpath+0xe9/0x700 [ 127.744042] ? fput+0x25c/0x2e0 [ 127.747405] ? SYSC_write+0x2f0/0x360 [ 127.751297] SyS_keyctl+0x76/0xa0 [ 127.754844] do_syscall_64+0x309/0x430 [ 127.758792] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 127.763771] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 127.768986] RIP: 0033:0x455389 [ 127.772200] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 127.779947] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 127.787241] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 127.794548] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:11 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:11 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r0}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f00000000c0)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff03}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) r2 = accept$ipx(0xffffffffffffff9c, &(0x7f0000000040), &(0x7f0000000080)=0x10) dup3(r1, r2, 0x80000) 2018/04/22 09:01:11 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x40000000007fc) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000001000)={0xaa}) r1 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x1000)=nil, 0x1000}, 0x1}) r2 = creat(&(0x7f0000005000)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r2, 0xc08c5336, &(0x7f0000000080)={0xfffffffffffffff9, 0x8001, 0x5, 'queue0\x00'}) write$sndseq(r2, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) creat(&(0x7f0000b58ff8)='./file1\x00', 0x0) rename(&(0x7f0000bed000)='./file0\x00', &(0x7f0000704000)='./file1\x00') mount(&(0x7f0000286000)='./file1\x00', &(0x7f00000feff8)='./file0\x00', &(0x7f000067dffa)='romfs\x00', 0x2001000, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f0000001ff0)={&(0x7f0000011000/0x3000)=nil, 0x3000}) [ 127.801841] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 127.809133] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000004 2018/04/22 09:01:11 executing program 2: clock_gettime(0x4000000003, &(0x7f0000097000)={0x0, 0x0}) clock_nanosleep(0x1000000000000002, 0x0, &(0x7f0000c87000)={0x0, r0}, &(0x7f00000d6000)) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000139000), &(0x7f0000e81fba)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r1, 0x15) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={0x3, {0x2, 0x4e22, @broadcast=0xffffffff}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10, 0x3, 0x6, 0x81, 0x0, &(0x7f0000000100)='veth0\x00', 0xd7, 0x5, 0xd775}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10000, 0x60) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) getsockopt$inet_mreqsrc(r2, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @multicast1, @multicast2}, &(0x7f00000000c0)=0xc) restart_syscall() 2018/04/22 09:01:11 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) link(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='./file0\x00') r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) add_key$user(&(0x7f00000007c0)='user\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000140)="e6c3f3d5ab25fee607141c9a98bbcfa043dfae5dec27520e0358983371ec57089efa2be6c502b6d5ba88d7a29e4384a4acde7c1a67e3d267b0e8ddf41b9d1953fa2bb1ef276c54a7a84bbe5857fa5c14d5034eedfe4a1121", 0xffffffffffffff74, r1) r5 = syz_open_dev$vcsa(&(0x7f0000000a00)='/dev/vcsa#\x00', 0x8, 0x200) setsockopt$ALG_SET_AEAD_AUTHSIZE(r5, 0x117, 0x5, 0x0, 0xfc6) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r6 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x7fffffff, 0x2000) accept4$ipx(r6, &(0x7f0000000300), &(0x7f0000000340)=0x10, 0x63fbad4ed4844869) add_key(&(0x7f0000000600)='id_legacy\x00', &(0x7f0000000640)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000680)="d49edbd150a632e6fe64db07b4733c7e48cf7319b629dded873c32904be338f60758da6009478e354982fde5a57ad8f5286c4fc93feb9e84acd5f9db563846410cd14c3f13360c778a5a731184f04ecde1e936929d498e97ab7c161eac7b78093cf33e3e21746e66c4d5cad892b3e38d27116e58e7a77510616f765b1caaad95c760a6ebfb11c589289f3e9fefc2a2def6b10fcbdab8a6cd2cdedeef8316ad9b29f5d06a9343046385b80720af0ddc585d700b108326e74fcb6fe65b23325106144833b17813f634daafa0b673a27bc07fa504eef7b17cc7bbfc2092fd71cb1d204aa2c68b391524812d70392cc0759d1bf36ac96f2bba88df00b926b19c04", 0xff, r0) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r6, 0x800442d2, &(0x7f0000000580)={0x4, &(0x7f0000000500)=[{0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @dev}, {0x0, 0x0, 0x0, @link_local}, {0x0, 0x0, 0x0, @link_local}]}) 2018/04/22 09:01:11 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:11 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000240)='/dev/input/mouse#\x00', 0xfff, 0x1) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000000080)=""/5, 0x5, &(0x7f0000000040)={&(0x7f0000000000)={'digest_null\x00'}}) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000280)=0x8) 2018/04/22 09:01:11 executing program 6: r0 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, &(0x7f0000000200)=0x80, 0x80800) r2 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x82) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'\x00', 0x2001}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000002c0)={0x0, 0x2c, "87de1aa8beeb971be545272bc4a52c804c2782586f7d3ec180b2c60d2dbf6b16bbf295aff0fbe0dd1b9481ca"}, &(0x7f0000000340)=0x34) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000240)={r3, 0x61, "23b81b378f0222d74016a2d0a25842761a56103ecb65640a90a81bda2ed9fbb7c49a556ef8b962f53861560d13e372befe340e10f66f032882a9d163ec67e9487490a378e7582fb468d4dad6c6c170e62d0faab4fb900222f174a631b7274d01ad"}, &(0x7f0000000080)=0x69) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000380)={r3, 0x0, 0x10000, 0x10000, 0x0, 0xce}, 0x14) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.current\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r5, 0x84, 0x76, &(0x7f0000000300)={r4, 0x8}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xc, &(0x7f0000000140), 0xffffffffffffffa1) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x1) socket$netlink(0x10, 0x3, 0x13) ioperm(0x0, 0x1000, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/status\x00', 0x0, 0x0) clone(0x0, &(0x7f0000667000), &(0x7f0000752000), &(0x7f0000000000), &(0x7f00009f4fff)) io_setup(0xba, &(0x7f00000000c0)) close(r2) 2018/04/22 09:01:12 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:12 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f00000000c0)=""/5, 0x5, &(0x7f0000000140)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000002780)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000002740)={&(0x7f0000000240)=ANY=[]}, 0x1}, 0x0) sendmmsg(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)}}, {{&(0x7f00000044c0)=@in={0x2, 0x0, @broadcast=0xffffffff}, 0x10, &(0x7f0000000000), 0x0, &(0x7f0000000080), 0x78}}], 0x4000000000002ed, 0x0) sendmsg(r0, &(0x7f0000001400)={&(0x7f00000000c0)=@can={0x1d}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000140)="695a80175154f96be05832e0eb18772809c4d540f4dd5bad664879de6e3eb6db1808b14411fb48488e11cc9c4c5defd529a3bc6a303d50005e6039073a703b6af8b6817992a1d82019d7a7799243399e0298ffb113344ebcc48921188dcdddd6c5051053f11e48512d8493b332ed993c805329ba63f96dc61b3e0a19aa45e87e339f2b0b0f455e9f79b01048b2ed27106a757823b84d1d67afa2161783f8e1d948d0e1966e83d8b27ddc805df92185c0763f52f3112895de4250684cc60133ed99dae826ce56822affef52746af45b8569f68951f64f9f33580b2e555245c1731769b76625d260256a2ff7ae", 0xec}, {&(0x7f0000000240)="c71a284b4d6b67c96c8005b97575847db6c0fcc0315bb59dfeeda9fa8316002c83e230a67c81adb85d8d3d21732d5d97af05b01e7fc25694d6e0291656d284ba60ef3013d6a39a0d1b459e1b384698154530eede341685facd1c1252bf8517c24bad9216b8", 0x65}], 0x2, &(0x7f0000001440)=ANY=[@ANYBLOB="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"], 0x10e8, 0x4000}, 0x20000000) 2018/04/22 09:01:12 executing program 7 (fault-call:5 fault-nth:5): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:12 executing program 1 (fault-call:1 fault-nth:0): r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:12 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x80a02, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) syz_open_dev$amidi(&(0x7f0000002dc0)='/dev/amidi#\x00', 0xfffffffffffff800, 0x40000) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x200, 0x0) socketpair$inet(0x2, 0x0, 0x1b, &(0x7f0000002f00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = accept4$inet(r0, 0x0, &(0x7f0000002ec0)=0xffffffffffffff24, 0x800) fsync(r1) [ 128.378945] FAULT_INJECTION: forcing a failure. [ 128.378945] name failslab, interval 1, probability 0, space 0, times 0 [ 128.390323] CPU: 0 PID: 9091 Comm: syz-executor1 Not tainted 4.16.0+ #85 [ 128.397198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.406579] Call Trace: [ 128.409214] dump_stack+0x185/0x1d0 [ 128.412896] should_fail+0x87b/0xab0 [ 128.416689] should_failslab+0x279/0x2a0 [ 128.420825] __kmalloc_node+0x22e/0x1190 [ 128.424936] ? kmsan_set_origin_inline+0x6b/0x120 [ 128.429820] ? kvmalloc_node+0x1a1/0x2e0 [ 128.433927] kvmalloc_node+0x1a1/0x2e0 [ 128.437858] getxattr+0x20b/0x6f0 [ 128.441364] ? __fdget+0x4e/0x60 [ 128.444805] ? __fget_light+0x56/0x710 [ 128.448754] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 128.454187] ? __fget_light+0x6b9/0x710 [ 128.458233] ? SYSC_fgetxattr+0x17d/0x2e0 [ 128.462461] SYSC_fgetxattr+0x1fe/0x2e0 [ 128.466530] SyS_fgetxattr+0x65/0x90 [ 128.470337] do_syscall_64+0x309/0x430 [ 128.474281] ? SYSC_lgetxattr+0x2f0/0x2f0 [ 128.478476] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 128.483691] RIP: 0033:0x455389 [ 128.486898] RSP: 002b:00007f5b0d2ccc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000c1 [ 128.494646] RAX: ffffffffffffffda RBX: 00007f5b0d2cd6d4 RCX: 0000000000455389 [ 128.501940] RDX: 0000000020000240 RSI: 0000000020000040 RDI: 0000000000000013 [ 128.509236] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 128.516532] R10: 00000000000000a6 R11: 0000000000000246 R12: 0000000000000014 2018/04/22 09:01:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:12 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r2, 0x402c5342, &(0x7f0000000300)={0x18b2, 0x3, 0x40, {0x0, 0x1c9c380}, 0x85b, 0x100}) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r4 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x480) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) sendfile(r4, r2, &(0x7f0000000480), 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f0000000140)={0x1, 0x5, 0x8, {r5, r6+10000000}, 0x1, 0x9}) r7 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r8 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000580), 0x0, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r7, r8, r8}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:12 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000002bc0)='/dev/hwrng\x00', 0x14300, 0x0) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000002c00), &(0x7f0000002c40)=0x4) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f000058f000)="440d05a103001d000000000020", 0xd) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f000069d000), &(0x7f00006ccffc)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@mcast1, @in6}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) [ 128.523827] R13: 0000000000000098 R14: 00000000006f3ee0 R15: 0000000000000000 [ 128.619311] FAULT_INJECTION: forcing a failure. [ 128.619311] name failslab, interval 1, probability 0, space 0, times 0 [ 128.630745] CPU: 1 PID: 9108 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 128.637622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.647004] Call Trace: [ 128.649640] dump_stack+0x185/0x1d0 [ 128.653314] should_fail+0x87b/0xab0 [ 128.657087] should_failslab+0x279/0x2a0 [ 128.661201] __kmalloc_track_caller+0x208/0xcb0 [ 128.665912] ? dh_data_from_key+0x272/0x3e0 [ 128.670271] ? rcu_all_qs+0x32/0x1f0 [ 128.674041] kmemdup+0x95/0x140 [ 128.677382] dh_data_from_key+0x272/0x3e0 [ 128.681623] __keyctl_dh_compute+0x4e2/0x1ef0 [ 128.686209] ? kstrtouint_from_user+0x373/0x410 [ 128.690944] keyctl_dh_compute+0x22e/0x260 [ 128.695252] ? SyS_keyctl+0x76/0xa0 [ 128.698908] SYSC_keyctl+0xd31/0x1830 [ 128.702807] ? syscall_return_slowpath+0xe9/0x700 [ 128.707712] ? fput+0x25c/0x2e0 [ 128.711076] ? SYSC_write+0x2f0/0x360 [ 128.714953] SyS_keyctl+0x76/0xa0 [ 128.718491] do_syscall_64+0x309/0x430 [ 128.722436] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 128.727411] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 128.732626] RIP: 0033:0x455389 [ 128.735833] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 128.743582] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 128.750876] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 128.758188] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 128.765484] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 128.772791] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000005 2018/04/22 09:01:12 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000440)={@in6={{0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}, 0x0, 0x5, 0x0, "ba7e305b22384b108388f0c36c33d1aac65804755ca97d0cd1b2753b6c3b3b22125cbd5e098bebbc046917d762580009e2ba8f6da5e71990db0af1c2000000f83cb080729bcdeffbe600f9937223e174"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000240)={@in={{0x2, 0x4e21, @multicast1=0xe0000001}}, 0x909, 0x3, 0x3, "111d6c1ba6050dd77cf3f2f09d1cb02a25988f1ea9c5be7d9801641c99b0def45ac625ada3316175a9d341111c181811e12c196e1ab99946e5e47e0594e415670d1330cd611c3974c55bb4d50000e111"}, 0xd8) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000040)={@in6={{0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff]}}}, 0x0, 0x0, 0x0, "411b3f1c08455047284bea37cf1ab7534db964b7958943c7db1b29d39d5221fac53a751f6f97a5f406473879b8171ae0d09086cb18d602ee628a185531290242710b99b8401772c02989f80629dc1d9e"}, 0xd8) 2018/04/22 09:01:12 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000432000/0x3000)=nil, 0x3000, 0x4, 0x32, r0, 0x0) r1 = add_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000080)="64b9e3434e0c5f470000000053a8b7d9ba4b389aa8", 0x15, 0xfffffffffffffffd) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$DRM_IOCTL_MODE_SETCRTC(r2, 0xc06864a2, &(0x7f0000000100)={&(0x7f00000000c0)=[0x2], 0x1, 0x20, 0xff, 0x7ff, 0x3, 0x0, {0x4, 0x200000, 0xfffffffffffffffa, 0x5, 0x3, 0xfffffffffffffff9, 0xa440, 0x100000000, 0x100000001, 0x5, 0x399bc000, 0x3, 0x9, 0x2, "a925835a3ce5b5c0a1e90d9e251670b4a63086e0b00a40248353e689ed5a5d48"}}) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000040)={&(0x7f0000a3dffa)={'digest_null\x00'}}) 2018/04/22 09:01:12 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) migrate_pages(0x0, 0x5, &(0x7f0000000000), &(0x7f0000000040)) r0 = getpid() sched_getparam(r0, &(0x7f0000000080)) 2018/04/22 09:01:12 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x23fc, 0x0) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r5 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7, 0x2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r5, 0x0, 0x41, &(0x7f0000000140)={'security\x00', 0x2, [{}, {}]}, 0x48) 2018/04/22 09:01:12 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, 0x0, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:12 executing program 1 (fault-call:1 fault-nth:1): r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:12 executing program 7 (fault-call:5 fault-nth:6): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:12 executing program 6: mount(&(0x7f00006f9ff8)='./file0\x00', &(0x7f0000000080)='..', &(0x7f00000001c0)="6566612a5af5c1c48d7e59bf4fe5712bb94cd2d0da2ceeb5ee7a1a361a636444d281e2b3f5446c6a95e2d8901447148deed1d8cc95e955ebffb450032b5734d73b7dba5da00a657289d6c82e373a8bac14c2258671f570852880c5e500463d34de08264f1ffc07cc9279a1f96889768e38d1bd04074f951701ba3b76f49e59a66665d9aec8ef29e020af36c75f0052b6632473ceabb57ff02c19ce7643a99ae9a00abcea2e295c0b9ba34b43923b6a42eaabc12cbe1d00119ce73046f26c54e66ef5a81e5590c02eb4742d38cff9", 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f00000002c0)={@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x3, 0x2, {0xa, 0x84, 0xfffffffffffffc01, @mcast2={0xff, 0x2, [], 0x1}, 0x1}}}, {&(0x7f00000000c0)=""/161, 0xa1}, &(0x7f0000000040), 0xa}, 0xa0) [ 128.968137] FAULT_INJECTION: forcing a failure. [ 128.968137] name failslab, interval 1, probability 0, space 0, times 0 [ 128.979523] CPU: 0 PID: 9133 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 128.986398] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 128.995786] Call Trace: [ 128.998437] dump_stack+0x185/0x1d0 [ 129.002126] should_fail+0x87b/0xab0 [ 129.005897] should_failslab+0x279/0x2a0 [ 129.010066] __kmalloc+0xc2/0x350 2018/04/22 09:01:13 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x10000, 0x0) ioctl$TIOCMBIS(r0, 0x5416, &(0x7f00000000c0)=0xaa) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="4790dae1555fc1716fa0c672458dcdb633536ad3d53a39f9b7f0e5de56e67ef92ef0269299ce3a99f06d2897a406fb0dee58b651d238b8c70f59957e964515f1466e81f33dcd7d7ddf6f46aedd10ad80ac04205ae8466b15cb254c3c912f798daf3546fdadf2002d97999dc47365322d355f7595d9c9ec4e230b7e93769b988a8c0060eb10089e9df19b1df92bce265eee74fb0a1f82d5a8b8b3c49f4fb7f90e9121cf40392662f0415626f07125136fc03103fca99a3e3b1ab675f414371d4d495859114ee49f058a7ed924714ab7ad4955e9dcc8dca1b9e37d8302819ff55143e4ca6e4ca6968bb660967174fd5aeb64"], &(0x7f0000000240)=""/166, 0xffffff02) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000000)={0x3e, 0xfffffffffffffffa, 0x3b}) 2018/04/22 09:01:13 executing program 2: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) write(r0, &(0x7f0000000140)="164690f112641916d8bd2a53e1151eb1ecdbbc5e2c7e2c928643a4494a951b43284c0c36ce8a4d1ef0f4f99f53eabf195349f232d39c7177a860d712cca4bcd126b4388fb84de6b5", 0x48) r1 = getuid() ioctl$TUNSETOWNER(r0, 0x400454cc, r1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0x11, r0, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000040), 0x8) [ 129.013606] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 129.019063] ? crypto_dh_key_len+0x85/0xf0 [ 129.023385] ? __keyctl_dh_compute+0x58a/0x1ef0 [ 129.028151] __keyctl_dh_compute+0x58a/0x1ef0 [ 129.032748] ? kstrtouint_from_user+0x373/0x410 [ 129.037509] keyctl_dh_compute+0x22e/0x260 [ 129.041812] ? SyS_keyctl+0x76/0xa0 [ 129.045483] SYSC_keyctl+0xd31/0x1830 [ 129.049390] ? syscall_return_slowpath+0xe9/0x700 [ 129.054312] ? fput+0x25c/0x2e0 [ 129.057677] ? SYSC_write+0x2f0/0x360 [ 129.061559] SyS_keyctl+0x76/0xa0 [ 129.065102] do_syscall_64+0x309/0x430 [ 129.069071] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 129.074051] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 129.079269] RIP: 0033:0x455389 [ 129.082487] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 129.090236] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 129.097546] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 129.104848] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:13 executing program 3: add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r0 = request_key(&(0x7f0000000480)='.request_key_auth\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000500)='/dev/vcs\x00', 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000540)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x8000, 0x0) ioctl$KDGKBSENT(r6, 0x4b48, &(0x7f00000000c0)={0xffffffffffff39e4, 0x4, 0x8b0}) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 129.112150] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 129.119459] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000006 2018/04/22 09:01:13 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) unshare(0x40600) r0 = eventfd2(0x0, 0x0) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000080), &(0x7f00000000c0), 0x8) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:13 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r2 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:13 executing program 5: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000100)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000140)={r1, r2}) 2018/04/22 09:01:13 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0xfffffffffffffffc, 0x0) ioctl$KDGKBLED(r0, 0x80045113, &(0x7f0000000fff)) pkey_alloc(0x0, 0x1) 2018/04/22 09:01:13 executing program 6: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x4000105, &(0x7f000052cf69), &(0x7f0000850ffc), &(0x7f0000001540), &(0x7f0000000000)) r0 = getpgid(0xffffffffffffffff) r1 = perf_event_open$cgroup(&(0x7f00000000c0)={0x7, 0x70, 0x9, 0xdd, 0x4, 0x1000, 0x0, 0x4, 0x800, 0x4, 0x80000001, 0x4, 0x0, 0x7, 0x3, 0xc0, 0x1f, 0x8, 0x1, 0x1, 0x4, 0x7, 0x3ff, 0x2, 0x5, 0x9, 0x7e74, 0xaa, 0x3, 0x8, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, 0x2, 0x0, 0x8001, 0x0, @perf_config_ext={0x18a, 0x9}, 0x8004, 0x81, 0xfffffffffffffffc, 0x7, 0x8b, 0x3, 0x62a5}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x6b8, 0x4, 0x1, 0x81, 0x0, 0x2, 0x84, 0xb, 0x7, 0x4, 0x7, 0x7, 0x7fffffff, 0x1, 0x200, 0xf9, 0x10, 0xc32, 0x84, 0x7fffffff, 0xb305, 0x6, 0x7, 0x7ff, 0x100, 0x80000001, 0x50000000000, 0x8, 0x3f, 0x20, 0x0, 0x1, 0xffffffffffffff59, 0x5, 0x1, 0xfffffffffffff00d, 0x0, 0xffff, 0x4, @perf_bp={&(0x7f0000000000), 0x6}, 0x8000, 0x8000, 0x7fff, 0x4, 0xe1, 0x2, 0xa418}, r0, 0x1, r1, 0xa) 2018/04/22 09:01:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_triestat\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 2018/04/22 09:01:13 executing program 7 (fault-call:5 fault-nth:7): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:13 executing program 3: r0 = add_key(&(0x7f0000000280)='blacklist\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = syz_open_dev$sndmidi(&(0x7f0000000140)='/dev/snd/midiC#D#\x00', 0x3, 0x400000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r2, 0x40042409, 0x0) r3 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r3) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@remote, @in6=@ipv4={[], [], @remote}}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) r5 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r4) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) socket$inet6_sctp(0xa, 0x1, 0x84) rename(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') keyctl$dh_compute(0x17, &(0x7f0000000100)={r5, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 129.440792] FAULT_INJECTION: forcing a failure. [ 129.440792] name failslab, interval 1, probability 0, space 0, times 0 [ 129.452333] CPU: 1 PID: 9177 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 129.459216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 129.468610] Call Trace: [ 129.471258] dump_stack+0x185/0x1d0 [ 129.474949] should_fail+0x87b/0xab0 [ 129.478732] should_failslab+0x279/0x2a0 [ 129.482851] __kmalloc+0xc2/0x350 [ 129.486412] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 129.491868] ? crypto_create_tfm+0x10a/0x640 [ 129.496352] ? crypto_alg_extsize+0x66/0xc0 [ 129.500758] crypto_create_tfm+0x10a/0x640 [ 129.505109] crypto_alloc_tfm+0x3a9/0x710 [ 129.509375] crypto_alloc_kpp+0x99/0xb0 [ 129.513460] __keyctl_dh_compute+0x90e/0x1ef0 [ 129.518052] ? kstrtouint_from_user+0x373/0x410 [ 129.522804] keyctl_dh_compute+0x22e/0x260 [ 129.527094] ? SyS_keyctl+0x76/0xa0 [ 129.530758] SYSC_keyctl+0xd31/0x1830 [ 129.534671] ? syscall_return_slowpath+0xe9/0x700 [ 129.539586] ? fput+0x25c/0x2e0 [ 129.542953] ? SYSC_write+0x2f0/0x360 [ 129.546841] SyS_keyctl+0x76/0xa0 [ 129.550381] do_syscall_64+0x309/0x430 [ 129.554321] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 129.559296] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 129.564511] RIP: 0033:0x455389 [ 129.567715] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 129.575468] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 129.582767] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 2018/04/22 09:01:13 executing program 2: unshare(0x10a00) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000200)={0x9, 0xc85, 0x5, 0x4e6, 0x2, [{0x4, 0x28c4, 0x3f, 0x0, 0x0, 0x100}, {0x3, 0x400, 0x8, 0x0, 0x0, 0x2000}]}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xc4, 0x10200) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=ANY=[@ANYBLOB='d\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="140b2b9abd7000fcdbdf250100000014000200080002004e22000008000400040000000c000300080001000200000028000100080004004e240000080004000100000014000300000000000000010800040001000100000000000000000000"], 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x40010) 2018/04/22 09:01:13 executing program 6: r0 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x7142, 0x400) ioctl$int_out(r0, 0x2, &(0x7f0000000180)) r1 = socket$inet(0x2, 0x3, 0x2) r2 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000d11000)=0x3fb, 0x4) r3 = fcntl$dupfd(r2, 0x0, r2) listen(r3, 0x404) listen(r1, 0x20) capset(&(0x7f0000594ff8)={0x19980330}, &(0x7f0000244000)) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r5 = shmget$private(0x0, 0x4000, 0x10, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_LOCK(r5, 0xb) bind$llc(r4, &(0x7f0000000040)={0x1a, 0x324, 0x800, 0x9, 0x6, 0x7}, 0x10) setsockopt$inet_int(r1, 0x0, 0xd2, &(0x7f000003affc), 0x3c) getsockopt$inet6_mreq(r4, 0x29, 0x15, &(0x7f0000000000)={@mcast1, 0x0}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000100)={@empty, 0x1, r6}) 2018/04/22 09:01:13 executing program 1: getpgid(0x0) fcntl$getown(0xffffffffffffffff, 0x9) fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:13 executing program 0: mmap(&(0x7f00003e5000/0x2000)=nil, 0x2000, 0x8, 0x30, 0xffffffffffffffff, 0xfffffffffffffffe) pipe(&(0x7f0000000000)) syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x3ff, 0x458434eeb0e9d9f) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) [ 129.590067] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 129.597362] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 129.604657] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000007 2018/04/22 09:01:13 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, 0x0) r2 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2, r1}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:13 executing program 5: r0 = syz_open_pts(0xffffffffffffffff, 0x400) read(r0, &(0x7f0000000000)=""/91, 0x5b) r1 = socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_generic(r1, &(0x7f0000004fc8)={&(0x7f000000aff4)={0x10}, 0xc, &(0x7f0000008000)={&(0x7f0000000080)=ANY=[@ANYBLOB="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", @ANYRES32], 0x20}, 0x1}, 0x0) 2018/04/22 09:01:13 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = syz_open_dev$dmmidi(&(0x7f0000003880)='/dev/dmmidi#\x00', 0x3, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r3, 0x800448d2, &(0x7f0000003980)={0x1, &(0x7f00000038c0)=[{}]}) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f00000000c0)={'team0\x00', {0x2, 0x4e21}}) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r6 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r6, 0x800448d2, &(0x7f0000000000)={0x6, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}]}) [ 129.839892] netlink: 'syz-executor5': attribute type 1 has an invalid length. 2018/04/22 09:01:14 executing program 7 (fault-call:5 fault-nth:8): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:14 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) unshare(0x40600) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000000), 0x4) 2018/04/22 09:01:14 executing program 1: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x200000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001a80)={{{@in=@loopback, @in=@local}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) geteuid() bind$can_raw(r0, &(0x7f0000000040)={0x1d}, 0x10) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') setsockopt$inet6_buf(r1, 0x29, 0xff, &(0x7f0000000300)="0093df3f2ebb45156fdc61727c9ca28a54584d2c6fccac15481e1cbc59ba794fde6f7a61003831894a95a0d8975b928243e1c09dbe7667a77a415d61dfd91e9d6ddd30788151103f71de8ce50e5b77763db7e0bbb70998087ea0a44faf31b2d534b7f517203e01c94ac3683764bfdfe9ee39739cfd3881c3c9a513d3dcd99c8c1d76ced35e6027aaba293728079379a04f7d8b80e5ad403822c0ab44e2199836e707141e070e8c1797bd565b4a53afbff3d8ca98404f3846423bed43c88b25ab99bca0d00bc88c2979c9a78db7c382f0c9c85acd96cfb66d8af86e6583768cd49c", 0xe1) fgetxattr(r1, &(0x7f0000000080)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) fdatasync(r0) syz_open_dev$tun(&(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x80000) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'team_slave_0\x00', 0x1}) 2018/04/22 09:01:14 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80002, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x5, 0x4, 0x322, 0x1000, 0x7, 0x401, 0x6, r1}, 0x20) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={r1, 0x7fff}, &(0x7f0000000180)=0x8) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:14 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r1) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:14 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000000)="ff020400001b000500000000000000000000000000000205", 0x18) sendto$inet6(r0, &(0x7f0000000040)='I', 0x1, 0x40000c4, &(0x7f0000000080)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x6}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000000c0)=0x2, 0x4) 2018/04/22 09:01:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:14 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00007a3ff8)='./file0\x00', &(0x7f00004f5ff8)='./file0\x00', &(0x7f00000e1000)='ramfs\x00', 0x0, &(0x7f0000c81ffe)) socketpair$unix(0x1, 0x9, 0x0, &(0x7f0000000200)={0x0, 0x0}) symlink(&(0x7f0000000100)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00') r2 = accept$inet(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, @multicast2}, &(0x7f0000000080)=0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) ioprio_get$pid(0x1, r3) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000000c0)={0x3, 0x7ff, 0x4, 0x4, 0x80}, 0x14) sendmmsg(r1, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 130.104493] FAULT_INJECTION: forcing a failure. [ 130.104493] name failslab, interval 1, probability 0, space 0, times 0 [ 130.115998] CPU: 0 PID: 9227 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 130.122879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.132268] Call Trace: [ 130.134926] dump_stack+0x185/0x1d0 [ 130.138609] should_fail+0x87b/0xab0 [ 130.142397] should_failslab+0x279/0x2a0 [ 130.146561] __kmalloc+0xc2/0x350 [ 130.150078] ? mpi_alloc+0x58/0x290 [ 130.153792] mpi_alloc+0x58/0x290 [ 130.157364] mpi_read_raw_data+0x265/0xd60 [ 130.161649] dh_set_secret+0x215/0x620 [ 130.165639] __keyctl_dh_compute+0xcf9/0x1ef0 [ 130.170229] ? kstrtouint_from_user+0x373/0x410 [ 130.174959] ? dh_exit+0x30/0x30 [ 130.178386] keyctl_dh_compute+0x22e/0x260 [ 130.182686] ? SyS_keyctl+0x76/0xa0 [ 130.186352] SYSC_keyctl+0xd31/0x1830 [ 130.190258] ? syscall_return_slowpath+0xe9/0x700 [ 130.195183] ? fput+0x25c/0x2e0 [ 130.198545] ? SYSC_write+0x2f0/0x360 2018/04/22 09:01:14 executing program 4: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r1) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) [ 130.202431] SyS_keyctl+0x76/0xa0 [ 130.205973] do_syscall_64+0x309/0x430 [ 130.209922] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 130.214903] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 130.220121] RIP: 0033:0x455389 [ 130.223337] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 130.231093] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 130.238395] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 130.245694] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:14 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x81, 0x40000) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x7f, 0x220100) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x2, 0x7, 0x0, 0x4f, 0x0, 0x7e9, 0x20010, 0x2, 0xc8, 0x9ef, 0x7, 0x6, 0x8, 0x2, 0x1f, 0x24c, 0x3, 0x0, 0x200, 0x80, 0x1, 0x4, 0x5, 0x7, 0x100, 0x2, 0x1f, 0x1ff, 0x2, 0x7fffffff, 0x547, 0x3f4, 0x7, 0xff, 0x1, 0x5, 0x0, 0x2, 0x2, @perf_config_ext={0x9, 0x1}, 0x100, 0x3, 0xfffffffffffffffc, 0x6, 0x80000000, 0x0, 0x5ec}, r0, 0x7, r1, 0x1) unshare(0x8000400) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001fec)={0x5, 0x84, 0xff, 0x1}, 0x14) mmap(&(0x7f000000d000/0x1000)=nil, 0x1000, 0x1, 0x32, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f000000cff9)={r2, 0x18, &(0x7f000000c000)}, 0x10) [ 130.252991] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 130.260292] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000008 2018/04/22 09:01:14 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='smaps\x00') readv(r0, &(0x7f0000001740)=[{&(0x7f00000002c0)=""/175, 0xaf}, {&(0x7f0000000000)=""/133, 0x85}, {&(0x7f0000000540)=""/4096, 0x1000}], 0x3) 2018/04/22 09:01:14 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1, 0x101000) pread64(r0, &(0x7f0000000000)=""/56, 0x38, 0x0) 2018/04/22 09:01:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x410000000000000a) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x101, 0x0, 0x6, 0xffff, 0x7, 0x22af, 0x8, 0xffffffffffffff00, 0x4b2a, 0x8, 0x7, 0x2}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ptrace$setregs(0xaa7d15caad6b1c5a, r1, 0x2, &(0x7f0000000100)="6970ef91f9c9ac79aa047d19ed8bfc9d98bde23263bc659475e9cf08c10b72db360c5f682abe67f0b5694578bff8ee0e3db09f8f6b07e117ba3e2772e9e431502d2d36d28423c3877486") recvmsg$kcm(r0, &(0x7f0000001480)={&(0x7f0000000340)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001440)}, 0x0) write(r0, &(0x7f000077f000), 0xfd1f) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000000)={0x7fffffff, 0x1, 0xbe2b, 0x0, 0x7, 0xb0c, 0xffffffffffffa454, 0x20, 0xffffffffffff5bb5, 0x680e}, 0xb) 2018/04/22 09:01:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) exit_group(0x400) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000640)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000600)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r4 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000340)='user\x00', r0) r5 = add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000004c0)="366f5fbf4b2c38f9bc906e55b7fd8be8100bb7c7be798dd08935302d7ea6626c4a9742dc571104231b10084e72636178cb2e6e079a761ed79f6be5b599040299274bad", 0x43, r4) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x103, 0x0) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000580), &(0x7f00000005c0)=0x8) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r7 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x100000001, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r7, 0xc08c5335, &(0x7f0000000280)={0xc7, 0x8000, 0x0, 'queue0\x00', 0x4fd}) 2018/04/22 09:01:14 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x100, 0x0) recvfrom$inet6(r0, &(0x7f0000000200)=""/58, 0x3a, 0x1, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x1}, 0x1c) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000340)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000040)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/rt_cache\x00') r3 = syz_open_procfs(r1, &(0x7f0000000080)='net/igmp\x00') r4 = fanotify_init(0x7f, 0x800) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r4) getsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000140), &(0x7f0000000180)=0x4) 2018/04/22 09:01:14 executing program 7 (fault-call:5 fault-nth:9): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:14 executing program 2: syz_emit_ethernet(0x3e, &(0x7f00000001c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "50a09c", 0x2, 0xffffff88, 0x0, @remote={0xfe, 0x80, [], 0xbb}, @local={0xfe, 0x80, [], 0xaa}, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000000040)) r0 = socket$packet(0x11, 0x3, 0x300) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x2) [ 130.627759] FAULT_INJECTION: forcing a failure. [ 130.627759] name failslab, interval 1, probability 0, space 0, times 0 [ 130.639189] CPU: 1 PID: 9275 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 130.646056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 130.655425] Call Trace: [ 130.658053] dump_stack+0x185/0x1d0 [ 130.661730] should_fail+0x87b/0xab0 [ 130.665501] should_failslab+0x279/0x2a0 [ 130.669661] __kmalloc+0xc2/0x350 [ 130.673173] ? mpi_alloc+0xe3/0x290 [ 130.676875] mpi_alloc+0xe3/0x290 [ 130.680423] mpi_read_raw_data+0x265/0xd60 [ 130.684716] dh_set_secret+0x215/0x620 [ 130.688706] __keyctl_dh_compute+0xcf9/0x1ef0 [ 130.693290] ? kstrtouint_from_user+0x373/0x410 [ 130.698013] ? dh_exit+0x30/0x30 [ 130.701444] keyctl_dh_compute+0x22e/0x260 [ 130.705741] ? SyS_keyctl+0x76/0xa0 [ 130.709418] SYSC_keyctl+0xd31/0x1830 [ 130.713325] ? syscall_return_slowpath+0xe9/0x700 [ 130.718251] ? fput+0x25c/0x2e0 [ 130.721613] ? SYSC_write+0x2f0/0x360 [ 130.725493] SyS_keyctl+0x76/0xa0 [ 130.729032] do_syscall_64+0x309/0x430 [ 130.732973] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 130.737950] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 130.743166] RIP: 0033:0x455389 [ 130.746372] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 130.754116] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 130.761411] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 130.768700] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') readv(r0, &(0x7f00000008c0)=[{&(0x7f0000000080)=""/119, 0x77}, {&(0x7f0000000100)=""/67, 0x43}, {&(0x7f0000000300)=""/232, 0xe8}, {&(0x7f00000001c0)=""/65, 0x41}, {&(0x7f0000000400)=""/87, 0x57}, {&(0x7f0000000480)=""/145, 0x91}, {&(0x7f0000000540)=""/211, 0xd3}, {&(0x7f0000000640)=""/98, 0x62}, {&(0x7f00000006c0)=""/214, 0xd6}, {&(0x7f00000007c0)=""/241, 0xf1}], 0xa) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) 2018/04/22 09:01:14 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) fremovexattr(r0, &(0x7f0000000000)=@random={'btrfs.', 'security.evm\x00'}) 2018/04/22 09:01:14 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1=0xe0000001, @loopback=0x7f000001}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2=0xe0000002, @dev={0xac, 0x14, 0x14, 0x17}}, 0xc) syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1ff, 0x8, &(0x7f00000014c0)=[{&(0x7f0000000100)="079d8d015761ccd5be5f8d7f5395c7ea42b780454a98e0fabe8bf6bbf0f3c9070d2aa05c7b08f3748a0a931e87cfc2ecbdcbb526a0b53a754cd0d502954c910c0595f44f42d972a9dada89ecc381c0f61c0fc0", 0x53, 0x6a7}, {&(0x7f0000000180)="9b941f05ea14247310b5dc2576dfa5a0839e6d7dacdd408a8887407610548ae30ec43b35a8d9efd3e7d1c705482a99e9acb574bed5b7f24a0cd6197fe6a1c0b4623ef7d5d4778716d115bdc25ec87deae5e1d590d9b4a063f61792771b4eeaa36558c0cff6ff87791eb11e4242793392a614b36aef7670bd60ef5fba58c7d1bb0787956b2e92a13ed947b12a23634b98c49e52b357176682aad3e8daaa975603cf3861734145334d89f3803bb2671db65f9e9f3aed67a13f78f4ac22eb59c7504fd7a0133324ba8fd9d76ee273eb424eafbd2f4af9e3bb1e62615f1d561939c3a8d23d25d7fa7de82c9585648906f5a9537fbe42295f44662724b586ac18ac3540a5f717387025c47bb5344d116f20497d4174d4036e83d1f3674b0df703d56af4bd7fdc0cdf6d9958e84ffa87b86f69eb8018f41c0da1d67a01fc725ac864d407c953475170f7c6b4922ed046b82777415a19447f7f58f4c2d1a40f9791b05dbbeafc6e261ecc7325e489a4d0288fdd34e54803817dce228522bbd7786380fe450441fabbbafd1b1ba348712020d44cd11f00be2eab903194f3c865d5a2c6b6f76d2acbe9b197c2d96e31cf77e1358f21bc7b8a46a4f4a1c62872e5f82f9151948961aef423bf2c0bb446d40c1ef6d93b19d8dae988aff753ab84105ab68f542ba04b91f93776c6f79faf352a2f373ce2f90c8a9885fe84453e23ecaf71c10a0213d3c5dfb6619cc7f3f973e53a98ffcb08903acfb9b6705c5bb0f2d9082a113d474882fea3cafedae6dbd6188a215c3ab7a93da7c1050d4f935d9cca5dbb04b67c8c1e89105ce4afecabd64de3b52756c8bf7056129811131dc70a6675e3c20b605f0359a4f369aa9ff61bef3d3134fb2868a94c66a855fb665b9af85a0c9da1701bf1dc7051b5f34c280401114c2cb3b9c316b1ad040af135222f13e0d4368bc8f5d535b5c1624751b6272e528cac98ccfd048089158eda6ce64c1d62849ae7e28c7289cd1d1252e56bb55e2bc2376648f3512464e01f1b6b6e9f9cdddafe61d084076d8ac6883e04d5a774a64e53f27d54a2a960b9219ae0795acc80330675436c4ecfccd38878c57ad653cc2720a8a24dc02c81f6d9907316e4ccad8ae7d76b1bc45e8a488f47ca3e23de1c56dace6d914266b9c22d603a0431f0524eca2e77dd803725aa32a3d4f8e6a3c0060f8474bfb67dcd768308647257eff919f6cd4ee0f8e17cd614c7476bd97986bf60037f346272dc75e6d0f6adee1ec5a726f17b057488b900013d4a60e35268c4f71eba6437fe7e46cbb7f0bf83cd65e654f607011587a974b99c1f0568e83a571590a50d74548eaa8433eb614eb8deb04896943b23224dfd3b736410b675ac40b98030e60df058f0a2350ebde419df2a073ca742ae0b227ffbc264dd8ebf702aac1e618fb3b2febc5b7c0669ab4a3b5d46c01d493d534123938fcbaff13b020f54c2f0cdb2f2c46d9ab1ebaa7205e41ebcaa0a5041e3ecad028dd7482203c387c601af46054c0e819b3accdb99d96d70827b19ff8b7adc80bacc106f2e61278e31c33b02750636aaef70c7c1a75865ca0922573a9e6cde6a3e7701d7589288f9e4fe5d88afb197ec3270773a44e2a397fca84c0233063cdb50cdabcdc5794021e2de9ab8ad368ec750959ae72b400d6d7a74abd8ee485b62f6b863c70c66828d3c1db57757281fbb87d764296bdecbfd6276f0a9661847f755232a07518bea12ac71fe3d878acba2f8a1cefe0911814ae1299b21c37e410de4ee5e12bff5650cdec100bef45c0f2d7030e594f06f93a6b5751336c468746003ad332e97fed7e7f512be21cac769cffe007618cd54c09df7374f6357800fd7bf7f1ca0099ec71c84049d5b75a6c40bc86dfc76e400ddc1e89785b7b4901396bf9f10734f4028c16300cfbba8ec34fd1a9a456a3caf942d04743089d142d9be23b4ea9d14747f8673ab7018661f62b8fab28ee6a4051c6fd0501a22e73af92634fdae9a1860387e66693a8e68edc8693c8ad2ddbd17c70b5059bb1af0d3e0c06a258d818aeb461df1ee346156bcbedf6b5a2bbab60580795b8afeae58d3fe3482cf423ea2f29d2c01e2aa521b438e2ec84bd0192616331103277673c6408bccdf4302b15171d579689c8ed31f41c50dc5d4aee1df25dcba02e5c216459dd1c8ca90364e7c2ac6a9375b82878b5312f994ef0e81e676ae1f7d8a4ee24417c4a44262102c8d7a947a1d271d5d53af70b20cce3d00b9e8c8cf592c464c669825bfce2d4a8b35542a89e049263969b34c6e13c608bbbd8a9d6f81814a0d0fe910c78de64936a53fbfe9f0f442e27b96af736f0e5f5da2f9933b307efcb2fc52cd6445d1fab0e9688ce27180971f6ef5bb946100d8477485d1bbf97f68c609446e82354cfa013ee5a6f8cf8b5b3120267dd03131e635d9f0b64f3f4928d2cd3526fd566c31844c3eff6478b912ae5fefc031a4f9098620468a99d44de4de59571edefc73199692673715ef9ee024a95407db617a2a2df15fde4fee13747c1b7ba4bbc5289bba4862b318d8b85d1a3e6558589f2eb9a22c4828291f2704e8a0d24a681cbff65f0dd1895a917cc8d56d0fb9bd451161193d0fc475a3b949e0db95bd55a06be1fcf61ff4a69059eb3aa976c596f0b3c13afac9fbdffef380eba1dd134f1b46f4a0b99571928240a314d578b90ec703ff168b66dcb620405899638a6d6ff28caf68fb6a15183fced97158c05e95d14247dfb0c72a7579f6374baf818c7a34717428879d4734bcc93b11b33d42891c7bb637b0d213aa6dff142d73f9e4a1851bcffba959762afab0628ff230ed20afe452d68969aecfb492dbf9e85916f52e529322e759c4f1030fdc4ccc22c15a69cf50d6ae5a72886fabb8d0f78a147200effcb519387ccf3e2274ca38da5a0f16f0e352c0c8db0ea2d766b5ee3d99da27e26c5c94c974290bca7a202c2e0112b4edd81c7540e38d8207f08e15f8db980048c2b28b12882c11318c6922a1a282294f4cc121d2daf68b537030d87a3e902626013d65c172323a817b0b3eb4d6a83e2ac8db1667b4ef1dd023e72b991cfb71d82f8d901fe1f9de3e9dab48d43c7a3d2f8c6950c4396f44861b400a7d802dc31cce7d34da510abfa030a1fefcf09f413d2c32b3250cc9b606d74afac305cf6f66b25c7670bc039fafe290c3226d53afe47971f43d94a6a8f7625ee2bf9433f2a9953c3e164c1f504cb24aefa3ee78f6079a08a8b914be706cd5e5913aa4f7a663d08ebb55534113caddd8f6745a46a4e624d5a6cf88bc1966f442ff5fd7b07c47743091bf2d53c8b585c5a5ae6e3ed331698da31f634976f0a8d4774a0dfd86cd846b84ad56d22b622c9ae31dd43d132b75b4126962764086aea7e4c75d67abc50a9523d4ebb3aee96dae9630d2debee0c82d858dea925a3f6a1bde891cf368358ad5ada0c2456ce5a590f6e456620dd3f26d9c559484b3271f78400629dde51f2c8389456acac82fc0c4b6d01471e18457c8462fba4ffd3f8bd17e124b0ce635dde6c724b78f09591bacc3b4d2cdd26f7d3dc25226dc43f849451b30925fdf5f4c74dc0a55d4748169bb1f415566753a894603688cc616879762cc7b1e22ea6b3022a6efeed088ac7d8923d3c3c1725c9a8161cf00c04028f850d2da15df6273e2ce2e1cf9836c7bf6e772ed808795cf1efe993f8fe1e6a4af6e1ebca49d90675350e668106658533d75f639a576cdd7a433c5f635c57ee3322324f88fd52c0fe18fed8e39a098b551e7823ed673578e17ca5dffe38d8a149e5beb300bfac02b3d5df7fab6f65cd55f964adf9cd0e14152ff16902d444d5c73bb89d27d56aad0857d802482a6b63f90411ae288532d32e04d56643bf61e3860983ef5603a97e2c2bc8ab962f5d1784aca8655bb8a36af10f44e7c14d45f2c404645dfb044a502fc0e5ca34c051be0a4921958abcf8f6cc99d3915799a5a90c27338a06e188344b7bd2154724b664629965ebc1b5f60179de347b3b8a4d75ff7784c28a3332725b811f11dd29f7023b8bc733f2ec5c4dbe5d60bc3c2a17acfd9d8a6072072302a0b5c15e65fe02e98ee9e120c349aa52b70fc0afa2781d22e38ceaf9a304bda9d656088183849905bbc29987f3e34bc50e5875e754a52078df7504659ee53bbccbfa88a8a53ab4310da440a596ede2c29b8e07d5a432de605a9d7e058dd229d65acd6ad6c6358a779f657d95d0f9082208498e7e29ac22d65e77408774a341837c703224117eadf8be7f7c911d41f1b6010484a744cbc353b942853a24924bfc085be9510c280ba05bd362b9c42bd17986f9863f128ff2d3a59e498433590eebcef52e2a3e042ca1a5478444c114f9dda0cfeecdba4708af218a7a9a9c902953dfd6508ff42c1fdf20bba2c1ff575a2a5637b6318fa1697ba68d3ed059f0d251150c1e160973723e38af919fc6e96acba710fc5a1ac7668c5faba1a302f1e05d54d16ebf8cbaf2e4fb75ca2735ca3a8751ec72f88d8797188ac8e03ae5fa0a79e1e14a358f8b7cdfd746a3dc6e08422d9cb58e81a6c394ff37ef901aef7ff46807a9e488dc09c80237b9f1085ceaaf9429971cce231e13bda9c1b4f69323ca063af7226208233787e4c6ab3dfeba2c23002240306cfa2ff7ee7d228d40c954b58bd0742016ba99194d1df08f0732b6511c09b4ec2550fdd2ec04609a9f3ec8d9d15f0bce598df3fbe7b74c7219663c2cf0946b71e9afe7b2ab3936ea487a8325f9797b84fd175e9d5bc9efd6533ffb1a6324be11cd4a1ee3e39519adc639b789fb3bf1fb01e15f73c4c822b98d52f7aeeae89d75bfaf1c7e557c3998814f2da6477926438ec13bd915c597735908f36a3b895c9a39da30e25c8048445a784c9618610e50128499c29441fce3273237b8c752ad766fa7386a7d61b725e3811af2d36e03e48fa9ad23e91910635499c2ab67c85996f0f93cab9f22a3941d1a9475fa2218a042cc13cf803359b8e9def8d85ea0ee871738ac06fce92c4a232a66e82d88daf56b212b3dac3f12c96b339bf03393a62862e51ae3a6cb237e512119012e76d07b11afd89d48599a4193a750c1235fcd257a8c544273384eb1255ae9a8ad22c87cf087a8a62227ca442c4a20943a8e10b040c06b17efe10414789f2c03664c75ca39d8ea6ab7564eddc997b33e83716b148b04b4f5120e4c56128c4eb6a41912db79dc40c1c5e9b10aad8b2cce763646e08a87705d5380602403825cd3308c0940b659a951ae0f4247abb4a292cddea28df18c00305fc31256e409935cc4d568a6f9e1e5610a1f017e0f4e5cb203dfc82ebbe6260cdf9acc235544e7178cc677d651f3de28215949e96e57a1e6627d1aa637d9d4ae98606e3fa2e448dac998e66e028418735da0c59a526548039dac1a71c90020532d3c4a02496f9b939a282c82222af7529d97c3806900c532a84b450399256d726efd503d755dad9bc845c1d558a21439191e663d7b418de9caed633567208f971354a50b1d70ffbc74bebe377ad9d9b825d0700b472ee0481d2b28ab2b37bbc67f27e0ee1c9271849d8f4fc4928ef09cbc5e8055cc4eb93f5b0f8b0c7b618efbfafcc4097530a12647e1bb33f7e924dc274366b3640e9cb007feadd68ac53d9cf6b7ad0871633e9dcecfd9a46f510fc4f8727cafb9dba87e45524b185616604aed33a782cd2ce4a43b2a1346ffe7bf3bd2670e252c58af22a0d960b1a082e62ab879ada461aaedca4760cd3d2ac1ac68f085539561eaad002d671f46154aee9", 0x1000, 0xeebc}, {&(0x7f0000001180)="1909a2b6634097c3d9fae9c0c1b035be3cf2d7b5ed68685413be", 0x1a, 0x8}, {&(0x7f00000011c0)="0eb97cfbcf4eda5b8b63a0c6e35fc3ca6ccd90df4b9112235588967d239ab7295e2de56925e2bc6362e103ea96123402ad7112c95cd8073494ec13c50300eceeda64a4af3c4f4101969748", 0x4b, 0x5}, {&(0x7f0000001240)="4ca50f6c163d4fb1fb5a0a5e75662238c8b841417b123b530f043a5c4dba468a20bf462f104cd3b57df429012030c8dc8e7bf653ff4e3459576a02491b21f39d464a9244621d344d89f2bf8825c97582dc4f496d826249e3e550de9fb5ada720a9dde604512cc329b11a7892befbeaa2a170b59e48439fab14959043dab98f9feceb93b01fc3c12ec379ef53761e5860e0927fabbf8a4d672d5e7782f5bfb29c05c80517313944850f4f38", 0xab, 0xd091}, {&(0x7f0000001300)="7efdf3aaa384ce3e93c6f571371a46b8d5e13e8591e4538ff852314df5d267806b1e7dfaaeeafd5c7579d17abee76f57b580048677fca3d0b5b6cacf94c13e86b2846c9b7d1f192d84a03f13f7fb86633f16046ded222f93bda96300d7c652fea723b389af72e9fb243c558f3ac13bb2", 0x70, 0x6}, {&(0x7f0000001380)="352399a62901ce5de1b26d53d369efe22d82f2", 0x13, 0x7fffffff}, {&(0x7f00000013c0)="cc423a21911b93f415efe76e3a9b10280639a94dde527dd5c125499268392d312f897b385bf00334c95b5f286f34c6c5632e60f20444923ee5c80a4ec48e6db3bd70332ac97a20c6b729e5e1fc9000a6eb8b2960337737cb430ae641f8835993c5c693002dc2c6a760e70b0344f9d458aa26d8d4d92b5b4713a857a93f7743f818d739c4526072b5a099c81e51e1d5c12b1a95a43cb55565694693a1a4bbc4d1b8890fb1846db4778e8274312128071a8f7bee4639acd98ff1a8a285822aa7dbc642764a558c0e789359bc0ec64961beca79a433d081f35d2a77f4e022576422fcac4906d20ca024826a3af85fa3f71613", 0xf1, 0x5}], 0x0, &(0x7f0000001580)={[{@utf8='utf8', 0x2c}, {@fmask={'fmask', 0x3d, [0x36, 0x32, 0x31, 0x31, 0x35, 0x36, 0x37]}, 0x2c}, {@fmask={'fmask', 0x3d, [0x32, 0x37, 0x34, 0x33, 0x37, 0x34, 0x36, 0x1000, 0x30, 0x30]}, 0x2c}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, [0x39, 0x31, 0x0, 0x32]}, 0x2c}, {@fmask={'fmask', 0x3d, [0x37, 0x37, 0x32, 0x30, 0x35, 0x34]}, 0x2c}, {@show_sys_files_no={'show_sys_files=no', 0x3d, [0x34, 0x7f, 0x3f, 0x78, 0x37]}, 0x2c}, {@fmask={'fmask', 0x3d, [0x35, 0x35, 0x33, 0x33, 0x34, 0x34]}, 0x2c}, {@errors_continue='errors=continue', 0x2c}, {@fmask={'fmask', 0x3d, [0x30, 0x34, 0x33, 0x32, 0x32]}, 0x2c}]}) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000001640)={@local={0xac, 0x14, 0x14, 0xaa}, @multicast2=0xe0000002, @multicast1=0xe0000001}, 0xc) llistxattr(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)=""/9, 0x9) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/16, &(0x7f00003d3000)=0x10) 2018/04/22 09:01:14 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) rt_sigreturn() r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, &(0x7f0000000600)="d293a7659c70e5305a33077a746e588944e3e2667d48fb59dec989f25671341d3ab46e60419d7e53b0ba67ddf2c8c653f1d2a6bd7ec598268f4a4096832cd51044e577ce38e8111fb8eaa58866666696871e5873df875997aad51b521fca62b80d03ce36551d5e238d01fbf471a1f2fc346e3f59a98ebaac7a2a557aa14ba4047295d309156456e5c4ab0f360eb2660ddaf0a41c27e7e88263bd75a65296f26e29301fe6ac3a5266", 0xa8, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:14 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001000)={0xffffffffffffffff}) r2 = getpid() getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r1, &(0x7f0000ca1fc8)={&(0x7f00008dd000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f000032eff0), 0x0, &(0x7f0000000180)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}], 0x20}, 0x0) fcntl$setown(r0, 0x8, r2) [ 130.775992] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 130.783292] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000009 2018/04/22 09:01:14 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x400000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x88000020}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="cc000000", @ANYRES16=r1, @ANYBLOB="040029bd7000fbdbdf2507000000080005003cf100000800040000800000ff000500080000002c00030008000500e0000001080003000100000008000400030000000800030001000000080004000600000008000400040000001c000100081001000a0000000800090076000200080002002b00000008000600457f000008000500a10d00003800030008000800020000000800040001800000080007004e2000001400020073797a6b616c6c657231000000000000080001000100000008000500cd00000019d32aa96a104d424efad605be522544e897dcd601c9c4fd9f5f95541cbbebb4642ca03e12f3fecff839982d0521e802c2a393ca734e9f92142609f6aa09f80fc998f4bbe8d9aa3f053a4a61442ef8a1d89d73d03a34bff295a921c6e5d4c2d239894b77de14237ef9a0452c6f80ef52c8596c9505841e5266c5ea36e40489c47ddcc4352f67a43aa15bab5b83eb306a83e06e2fe10df84e4c491bd9ac167683a3bba5d58c038b435e2491d862798a9c75ed4663544b15eec99bc98971981aa56b392b024744"], 0xcc}, 0x1, 0x0, 0x0, 0x10}, 0x20040004) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'digest_null\x00'}}) 2018/04/22 09:01:15 executing program 5: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2302c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 2018/04/22 09:01:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$KDGKBTYPE(r4, 0x4b33, &(0x7f00000000c0)) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:15 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440), 0x0, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:15 executing program 0: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:15 executing program 7 (fault-call:5 fault-nth:10): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:15 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x400000005452, &(0x7f0000000100)=0x4) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000002c40)=@sco, 0x80, &(0x7f0000003000), 0x0, &(0x7f0000003080)=""/95, 0xffffffffffffffd9}}], 0x1, 0x0, 0x0) shutdown(r1, 0x1) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000080)) 2018/04/22 09:01:15 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect(r0, &(0x7f0000002000)=@ethernet, 0x10) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x1d}, 0x10, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="050000002304000000d8693222ed25b100000000000000d596bf6b4eafc53ff8960d124ae1293fb67223cabec54d40f7567855953baba9549286f120da48aa3fa9687967146f29eec8df0dbca535666ab3f2b864e423cad51b37f05e41e99fde078e0b1d5166c14419107bf15eb970d2c38de8e3407ad19c5c7c1557bf67c175177218297105d887adaddaf1abe79fcdb54ccfbe462efa06b65490dafeb860ba4154d797608c7d40a72b48a958b89ff1e33d44355151ef1db552072196233dcf0e9e5109c6f9caef4e4e", @ANYRES64=0x7530, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="00000020010000000000000000000000e2809087a9e45cb2"], 0x5}, 0x1}, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2e4, 0x0) connect$rds(r1, &(0x7f0000000040)={0x2, 0x4e22, @broadcast=0xffffffff}, 0x10) 2018/04/22 09:01:15 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/177, 0xb1) [ 131.477900] FAULT_INJECTION: forcing a failure. [ 131.477900] name failslab, interval 1, probability 0, space 0, times 0 [ 131.489284] CPU: 0 PID: 9337 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 131.496152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.505533] Call Trace: [ 131.508177] dump_stack+0x185/0x1d0 [ 131.511853] should_fail+0x87b/0xab0 [ 131.515635] should_failslab+0x279/0x2a0 [ 131.519790] __kmalloc+0xc2/0x350 [ 131.523307] ? mpi_alloc+0x58/0x290 [ 131.527027] mpi_alloc+0x58/0x290 [ 131.530595] mpi_read_raw_data+0x265/0xd60 [ 131.534891] dh_set_secret+0x2c2/0x620 [ 131.538889] __keyctl_dh_compute+0xcf9/0x1ef0 [ 131.543480] ? kstrtouint_from_user+0x373/0x410 [ 131.548210] ? dh_exit+0x30/0x30 [ 131.551638] keyctl_dh_compute+0x22e/0x260 [ 131.555979] ? SyS_keyctl+0x76/0xa0 [ 131.559640] SYSC_keyctl+0xd31/0x1830 [ 131.563540] ? syscall_return_slowpath+0xe9/0x700 [ 131.568449] ? fput+0x25c/0x2e0 [ 131.571810] ? SYSC_write+0x2f0/0x360 [ 131.575695] SyS_keyctl+0x76/0xa0 [ 131.579248] do_syscall_64+0x309/0x430 [ 131.583195] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 131.588168] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 131.593382] RIP: 0033:0x455389 [ 131.596592] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 131.604340] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 131.611632] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 131.618927] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:15 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, 0x0) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:15 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) exit(0xbfa) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:15 executing program 5: unshare(0x400) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='oom_score\x00') pread64(r0, &(0x7f0000000080)=""/176, 0xb0, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='pids.max\x00', 0x2, 0x0) 2018/04/22 09:01:15 executing program 0: socket$vsock_stream(0x28, 0x1, 0x0) mmap(&(0x7f0000800000/0x1000)=nil, 0x1000, 0x3000001, 0x10, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) [ 131.626230] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 131.633531] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000a 2018/04/22 09:01:15 executing program 1: r0 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000680)=@nat={'nat\x00', 0x19, 0x2, 0x298, [0x200003c0, 0x0, 0x0, 0x200004b0, 0x200004e0], 0x0, &(0x7f0000000380), &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x9, 0x20, 0x805, 'syzkaller0\x00', 'dummy0\x00', 'ip6tnl0\x00', 'bcsf0\x00', @empty, [0x0, 0x0, 0xff, 0x0, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x14}, [0xff, 0x0, 0xff, 0xff, 0xff, 0xff], 0x70, 0x70, 0xc0}}, @common=@log={'log\x00', 0x28, {{0x0, "be56c6d4d4c9185b9dfa248cd54cc4e0c40100bd96eccc324210c06032f2", 0x4}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x1, [{{{0x1f, 0x14, 0x88f7, 'ip_vti0\x00', 'veth1_to_bond\x00', 'veth1\x00', 'bridge_slave_1\x00', @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, [0xff, 0xff, 0xff], @empty, [0x0, 0xff, 0xff, 0x0, 0xff], 0x70, 0xe0, 0x118}, [@snat={'snat\x00', 0x10, {{@random="19ddc9c96ac1"}}}, @arpreply={'arpreply\x00', 0x10, {{@empty, 0xffffffffffffffff}}}]}, @snat={'snat\x00', 0x10}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff}]}, 0x310) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000300)={0x2, {0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, {0x2, 0x4e20, @loopback=0x7f000001}, {0x2, 0x4e21, @loopback=0x7f000001}, 0x50, 0x3, 0x1, 0x100000001, 0xfffffffffffff33f, &(0x7f0000000200)='team0\x00', 0x9, 0x1, 0x7fffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') clock_adjtime(0x2, &(0x7f0000000080)={0x8, 0xc7ad, 0x10000000000, 0xee, 0x40, 0x7f, 0xffffffffffff8000, 0x1, 0x9, 0xfffffffffffffff7, 0x5, 0x10001, 0x4c, 0x800, 0xba0, 0x0, 0xffffffff, 0x8, 0x5, 0x2, 0x4122, 0x10001, 0x80, 0x2, 0x8, 0x9}) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000000)={0x0, 0x2, 0x1, {0x5, 0x10001}, {0x40000000, 0x3ff}, @const={0x3, {0x3, 0xe1, 0x6, 0x20c}}}) fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:15 executing program 7 (fault-call:5 fault-nth:11): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:15 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:15 executing program 2: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x141042, 0x0) fstat(r0, &(0x7f0000000fbc)) sigaltstack(&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000280)) rt_sigaction(0x7, &(0x7f0000000040)={0x42a535, {0xfffffffffffffffc}}, &(0x7f0000c69000), 0x8, &(0x7f0000893000)) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)="6e65e026cdc17000") 2018/04/22 09:01:15 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x10010000000000, 0x32, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0xeb62, @local={0xfe, 0x80, [], 0xaa}, 0x7}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000180)={r1, @in={{0x2, 0x4e23, @rand_addr=0x9}}, [0xee6, 0x1, 0x815, 0x182, 0x6, 0x81, 0x80000000, 0x3, 0x0, 0x1, 0x5, 0x101, 0x4, 0x1000000000, 0x7fff]}, &(0x7f0000000280)=0x100) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'rmd160-generic\x00'}, 0x0, 0xffffffffffffffc5}) 2018/04/22 09:01:15 executing program 5: r0 = memfd_create(&(0x7f0000002901)='dev ', 0x0) fallocate(r0, 0x0, 0xa7b3, 0x1) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)='\a', 0x1}], 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000000)="0ca63f57a262989fe33860bc8a1ef539", 0x10) lseek(r0, 0x2, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0xa4, &(0x7f0000000040)=[@in={0x2, 0x4e20, @multicast1=0xe0000001}, @in={0x2, 0x4e21, @multicast2=0xe0000002}, @in={0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}, @in6={0xa, 0x4e23, 0xfffffffffffff000, @local={0xfe, 0x80, [], 0xaa}, 0x100000000}, @in={0x2, 0x4e24, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e22, @multicast2=0xe0000002}, @in6={0xa, 0x4e23, 0x8000, @dev={0xfe, 0x80, [], 0x20}, 0xe2}, @in6={0xa, 0x4e22, 0x1, @mcast2={0xff, 0x2, [], 0x1}, 0xff}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000180)={r1, 0x7}, &(0x7f0000000200)=0x8) [ 131.912303] FAULT_INJECTION: forcing a failure. [ 131.912303] name failslab, interval 1, probability 0, space 0, times 0 [ 131.923718] CPU: 1 PID: 9366 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 131.930601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 131.939990] Call Trace: [ 131.942639] dump_stack+0x185/0x1d0 [ 131.946318] should_fail+0x87b/0xab0 [ 131.950092] should_failslab+0x279/0x2a0 [ 131.954258] __kmalloc+0xc2/0x350 [ 131.957770] ? mpi_alloc+0xe3/0x290 2018/04/22 09:01:15 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80000, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) splice(r0, &(0x7f0000000040), r1, &(0x7f00000000c0), 0xe452, 0x0) r2 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r2, &(0x7f0000000080)={0xa}, 0x1c) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x7, 0x0, 0xd5, 0x0, 0x0, 0x0, 0x0, {0x0, @in6={{0xa}}}}, &(0x7f0000000240)=0xb0) sendmmsg(r2, &(0x7f0000000140), 0x1f8aeba99eb8f3e, 0x0) [ 131.961466] mpi_alloc+0xe3/0x290 [ 131.965018] mpi_read_raw_data+0x265/0xd60 [ 131.969311] dh_set_secret+0x2c2/0x620 [ 131.973308] __keyctl_dh_compute+0xcf9/0x1ef0 [ 131.977892] ? kstrtouint_from_user+0x373/0x410 [ 131.982617] ? dh_exit+0x30/0x30 [ 131.986048] keyctl_dh_compute+0x22e/0x260 [ 131.990343] ? SyS_keyctl+0x76/0xa0 [ 131.994021] SYSC_keyctl+0xd31/0x1830 [ 131.997930] ? syscall_return_slowpath+0xe9/0x700 [ 132.002843] ? fput+0x25c/0x2e0 [ 132.006209] ? SYSC_write+0x2f0/0x360 2018/04/22 09:01:16 executing program 5: r0 = socket$inet6(0xa, 0x6, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000040)) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000180)={@ipv4={[], [0xff, 0xff]}, @dev={0xfe, 0x80, [], 0x1f}, @dev={0xfe, 0x80}, 0x0, 0x69f, 0x3, 0x0, 0x0, 0xfffffffffffffffc}) [ 132.010092] SyS_keyctl+0x76/0xa0 [ 132.013641] do_syscall_64+0x309/0x430 [ 132.017609] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 132.022592] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 132.027815] RIP: 0033:0x455389 [ 132.031025] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 132.038771] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 132.046073] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 132.053369] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000300)=""/166, 0xa6) r1 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000000c0)="9ed0ff7989534b6dd65cc667333f71e4beac7b8dcf072cf9bcfdcd3c4a1c5c6f6177036e1c724abc66df4ab55d25b36527bdd2bae4caa3141ec5991666715d2a506b9972f1371f1aad6809b9c87269ebe1258eceaecd77ca92920040d929ff52907fe617c0d68258fbf963391569bdf362427e30150c8a183c10b73b8e951d6bd22025177fd1db742b7eb5538c4e3dc20b4c490d7a675350676e", 0x9a, 0x0) keyctl$link(0x8, r1, 0x0) statx(r0, &(0x7f0000000280)='./file0\x00', 0x4400, 0xfff, &(0x7f0000000480)) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000003c0)={0x4, 0x2, 'client1\x00', 0xffffffff80000001, "bf947ce541870b42", "93b70323a11bbf5e490cc8c7a11745fa97abf643c329fefb4eeccd1f9a1ace46", 0x8001, 0xac87}) [ 132.060659] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 132.067948] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000b 2018/04/22 09:01:16 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:16 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r0, 0x400000005452, &(0x7f0000000100)=0x4) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000002c40)=@sco, 0x80, &(0x7f0000003000), 0x0, &(0x7f0000003080)=""/95, 0xffffffffffffffd9}}], 0x1, 0x0, 0x0) shutdown(r1, 0x1) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000080)) 2018/04/22 09:01:16 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000000c0)={r1, 0x0, 0x5, [0x25c9, 0x9, 0x100000001, 0x7fffffff, 0x9]}, 0x12) 2018/04/22 09:01:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') msgget(0x0, 0x100) fgetxattr(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="f04a8cfafc73f9aa7851d66643114452553167000185667b"], &(0x7f0000000240)=""/166, 0xfffffffffffffef3) recvfrom(r0, &(0x7f0000000080)=""/238, 0xee, 0x2040, &(0x7f00000001c0)=@rc={0x1f, {0x6, 0x7, 0xd3f, 0x400, 0x7fff, 0x7c}}, 0x80) 2018/04/22 09:01:16 executing program 2: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) syz_mount_image$ntfs(&(0x7f0000001580)='ntfs\x00', &(0x7f00000015c0)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB='uid=<']) r0 = getpgid(0x0) r1 = getpid() tgkill(r0, r1, 0x19) mount(&(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)='./file0\x00', &(0x7f0000001700)='tmpfs\x00', 0x0, &(0x7f0000001740)) 2018/04/22 09:01:16 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000013000)={0x1, 0x10000007a, 0xa, 0x1000000000000008}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f0000014000)='A', &(0x7f0000012000)}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f000000b000)={r0, &(0x7f0000000000), &(0x7f0000000040)="b07e8cd29371d5ee64a59db3f6e1b7e945e0a56be13c7ef2ddb365edf6bc84494476de3900bd1af3c7e5a189fd013ffc1fad7fb27b6fdc9a8f6cbc4f89896ebd5d5578"}, 0xfffffffffffffde1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f000000a000)={r0, &(0x7f0000008000), &(0x7f0000016f02)=""/254}, 0x18) 2018/04/22 09:01:16 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:16 executing program 7 (fault-call:5 fault-nth:12): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) [ 132.773689] FAULT_INJECTION: forcing a failure. [ 132.773689] name failslab, interval 1, probability 0, space 0, times 0 [ 132.785189] CPU: 1 PID: 9410 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 132.792088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 132.801558] Call Trace: [ 132.804200] dump_stack+0x185/0x1d0 [ 132.807876] should_fail+0x87b/0xab0 [ 132.811644] should_failslab+0x279/0x2a0 [ 132.815815] __kmalloc+0xc2/0x350 [ 132.819325] ? mpi_alloc+0x58/0x290 [ 132.823032] mpi_alloc+0x58/0x290 [ 132.826592] mpi_read_raw_data+0x265/0xd60 [ 132.830880] dh_set_secret+0x375/0x620 [ 132.834861] __keyctl_dh_compute+0xcf9/0x1ef0 [ 132.839444] ? kstrtouint_from_user+0x373/0x410 [ 132.844168] ? dh_exit+0x30/0x30 [ 132.847589] keyctl_dh_compute+0x22e/0x260 [ 132.851881] ? SyS_keyctl+0x76/0xa0 [ 132.855539] SYSC_keyctl+0xd31/0x1830 [ 132.859445] ? syscall_return_slowpath+0xe9/0x700 [ 132.864356] ? fput+0x25c/0x2e0 [ 132.867714] ? SYSC_write+0x2f0/0x360 [ 132.871591] SyS_keyctl+0x76/0xa0 [ 132.875137] do_syscall_64+0x309/0x430 [ 132.879081] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 132.884062] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 132.889276] RIP: 0033:0x455389 [ 132.892485] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 132.900235] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 132.907529] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 132.914822] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:16 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000001100)='/dev/dsp#\x00', 0x5c, 0x10080) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000001140)=0x400) r1 = socket$inet_dccp(0x2, 0x6, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$EVIOCGSND(r2, 0x8040451a, &(0x7f00000000c0)=""/4096) getsockopt$inet_int(r1, 0x10d, 0xa8, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000010c0)=0x2, 0x4) 2018/04/22 09:01:16 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, 0x0, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:16 executing program 0: mmap(&(0x7f0000a5c000/0x9000)=nil, 0x9000, 0xfffffffffffffffd, 0x40000000000035, 0xffffffffffffffff, 0x3) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x100, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000040)={0x0, r0, 0x7b2aa5fe965b6a34, 0x1}, 0x14) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:16 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000001140)='net\x00') mlockall(0x1) exit(0x0) r1 = semget$private(0x0, 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000000)={0x7, 0x1ae2, 0x2076, 0x0, 0x9, 0x20}) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000140)=""/4096) getdents64(r0, &(0x7f0000000080)=""/140, 0x8c) semget$private(0x0, 0x3, 0x4) 2018/04/22 09:01:16 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000080)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0x2b) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) ppoll(&(0x7f0000000040)=[{r0, 0x4}], 0x1, &(0x7f0000000100)={r1, r2+30000000}, &(0x7f0000000140), 0x8) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0xc0b5, 0x200}) [ 132.922117] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 132.929410] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000c 2018/04/22 09:01:16 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) truncate(&(0x7f0000000000)='./file0\x00', 0x1) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:17 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') preadv(r0, &(0x7f0000000800)=[{&(0x7f0000000980)=""/224}, {&(0x7f0000000580)=""/242}, {&(0x7f0000000140)=""/8}, {&(0x7f0000000680)=""/211}, {&(0x7f00000001c0)=""/76}, {&(0x7f0000000780)=""/17}, {&(0x7f00000007c0)=""/12}], 0x1619, 0x4000000000) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xd, 0x2, 0x3ff, 0xfffffffffffffffe, 0xffffffffffffffff, r0, 0x7f98}, 0x2da) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000080)=""/61) 2018/04/22 09:01:17 executing program 7 (fault-call:5 fault-nth:13): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:17 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 133.302486] FAULT_INJECTION: forcing a failure. [ 133.302486] name failslab, interval 1, probability 0, space 0, times 0 [ 133.313934] CPU: 1 PID: 9452 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 133.320803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 133.330178] Call Trace: [ 133.332821] dump_stack+0x185/0x1d0 [ 133.336499] should_fail+0x87b/0xab0 [ 133.340269] should_failslab+0x279/0x2a0 [ 133.344429] __kmalloc+0xc2/0x350 [ 133.347936] ? mpi_alloc+0xe3/0x290 [ 133.351641] mpi_alloc+0xe3/0x290 [ 133.355198] mpi_read_raw_data+0x265/0xd60 [ 133.359492] dh_set_secret+0x375/0x620 [ 133.363476] __keyctl_dh_compute+0xcf9/0x1ef0 [ 133.368061] ? kstrtouint_from_user+0x373/0x410 [ 133.372792] ? dh_exit+0x30/0x30 [ 133.376215] keyctl_dh_compute+0x22e/0x260 [ 133.380510] ? SyS_keyctl+0x76/0xa0 [ 133.384171] SYSC_keyctl+0xd31/0x1830 [ 133.388075] ? syscall_return_slowpath+0xe9/0x700 [ 133.392986] ? fput+0x25c/0x2e0 [ 133.396354] ? SYSC_write+0x2f0/0x360 [ 133.400233] SyS_keyctl+0x76/0xa0 [ 133.403773] do_syscall_64+0x309/0x430 [ 133.407718] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 133.412698] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 133.417916] RIP: 0033:0x455389 [ 133.421123] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 133.428857] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 133.436137] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 133.443426] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 133.450696] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 133.457961] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000d 2018/04/22 09:01:17 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:17 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000000040)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}}) 2018/04/22 09:01:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f000067efe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, &(0x7f00005a0fff)='8', 0x1, 0x0, &(0x7f00007bcfe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000002780)={0x0, 0x0, 0x1400004000020030}, 0xc) sendto$inet6(r0, &(0x7f0000000080)='{', 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040), 0x20) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000140), 0xfffffff5) sendto$inet6(r0, &(0x7f00000000c0)='t', 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x20}, [{}]}, 0x58) sendto$inet6(r0, &(0x7f0000000700)="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", 0x601, 0x0, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x8140, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f0000000100)={0x1ff, 0x3, 0x10000, 0x0, 0x9, 0x7}) 2018/04/22 09:01:17 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getpeername$unix(r3, &(0x7f0000000300), &(0x7f0000000280)=0x6e) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000180)="4ca57e8c4f53fb08f63e5cc567936d7c", 0x10) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f0000000000), &(0x7f0000000140)=0x6) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:17 executing program 1: fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x9) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x4}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f00000000c0)={0x8001, r1}) 2018/04/22 09:01:17 executing program 7 (fault-call:5 fault-nth:14): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:17 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) truncate(&(0x7f0000000000)='./file0\x00', 0x1) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:17 executing program 6: r0 = socket(0x10, 0x3, 0x10000) write(r0, &(0x7f0000951000)="2400000032001f1546f9ff7f0000055b090007010c00020050ff01000293727599afd4cb", 0x24) fcntl$addseals(r0, 0x409, 0x9) [ 134.012408] FAULT_INJECTION: forcing a failure. [ 134.012408] name failslab, interval 1, probability 0, space 0, times 0 [ 134.023831] CPU: 0 PID: 9473 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 134.030696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.040072] Call Trace: [ 134.042707] dump_stack+0x185/0x1d0 [ 134.046379] should_fail+0x87b/0xab0 [ 134.050146] should_failslab+0x279/0x2a0 [ 134.054267] __kmalloc+0xc2/0x350 [ 134.057828] ? __keyctl_dh_compute+0x1253/0x1ef0 [ 134.062663] ? __keyctl_dh_compute+0x1033/0x1ef0 [ 134.067496] __keyctl_dh_compute+0x1253/0x1ef0 [ 134.072167] ? kstrtouint_from_user+0x373/0x410 [ 134.076902] keyctl_dh_compute+0x22e/0x260 [ 134.081191] ? SyS_keyctl+0x76/0xa0 [ 134.084846] SYSC_keyctl+0xd31/0x1830 [ 134.088735] ? syscall_return_slowpath+0xe9/0x700 [ 134.093637] ? fput+0x25c/0x2e0 [ 134.096997] ? SYSC_write+0x2f0/0x360 [ 134.100871] SyS_keyctl+0x76/0xa0 [ 134.104408] do_syscall_64+0x309/0x430 [ 134.108351] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 134.113329] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 134.118546] RIP: 0033:0x455389 [ 134.121757] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 134.129504] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 134.136796] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 134.144083] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 134.151366] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 2018/04/22 09:01:18 executing program 0: r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x0, @multicast2}, &(0x7f0000000180)=0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000280)='ip6_vti0\x00', 0x10) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x3f, r0, 0x0) r1 = syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x1000, 0x100) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000300)={0x0, 0x81}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e20, 0x2af6, @mcast1={0xff, 0x1, [], 0x1}, 0x100000001}}}, 0x84) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0, 0xc1}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000080)={r4, 0x2}, &(0x7f00000000c0)=0x8) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f00000001c0)={&(0x7f0000a3dffa)={'digest_null\x00'}}) socket$vsock_dgram(0x28, 0x2, 0x0) connect$rds(r3, &(0x7f0000000240)={0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 2018/04/22 09:01:18 executing program 5: r0 = memfd_create(&(0x7f0000000140)='userloppp1ptoc\'\x00', 0x2) fcntl$addseals(r0, 0x409, 0xa) fallocate(r0, 0x3, 0x0, 0x100000001) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x5fb) 2018/04/22 09:01:18 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x400400, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000000c0)=0x1) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000100)) connect$ipx(r0, &(0x7f0000000100)={0x4, 0x2, 0x40, "ff6a22e0b8c7", 0x7}, 0x10) fgetxattr(r2, &(0x7f0000000000)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) creat(&(0x7f0000000040)='./file0\x00', 0x90) clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) select(0x40, &(0x7f0000000180)={0x8, 0x6, 0x3, 0x9, 0xa000, 0x3, 0xfff, 0x3}, &(0x7f00000001c0)={0x7027, 0x8, 0x3, 0xfd, 0x4, 0x2, 0x5, 0xcdb1}, &(0x7f0000000200)={0x8, 0x7, 0x8, 0x5, 0x3, 0x7, 0x3, 0x1}, &(0x7f0000000340)={r3, r4/1000+30000}) 2018/04/22 09:01:18 executing program 6: getpgid(0xffffffffffffffff) r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x5, 0x400000) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000140)={{0xa, 0x4e23, 0x1c, @ipv4={[], [0xff, 0xff], @rand_addr=0xfb5}}, {0xa, 0x4e20, 0x101000000000, @dev={0xfe, 0x80, [], 0x13}, 0x4}, 0x4, [0xf8c, 0x4, 0xced9, 0x1, 0x0, 0x266, 0x6, 0xfffffffffffff451]}, 0x5c) r1 = epoll_create(0x401) sync_file_range(r1, 0x5, 0x4, 0x2) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f00000001c0)) r2 = gettid() r3 = memfd_create(&(0x7f0000000040)='\x00', 0x2) ioctl$EVIOCSKEYCODE_V2(r3, 0x40284504, &(0x7f0000000080)={0xf8e7, 0x16, 0x5aba, 0x20, "5c92f5473fdcc5e48c221911820c747b0daea8dfa1b9a6109c6b2e4a4a6fd1e9"}) r4 = syz_open_procfs(r2, &(0x7f00000000c0)='net/rt_acct\x00') ioctl$fiemap(r4, 0xc020660b, &(0x7f0000000000)={0xffffffff000, 0x8}) [ 134.158660] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000e 2018/04/22 09:01:18 executing program 4 (fault-call:5 fault-nth:0): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) geteuid() 2018/04/22 09:01:18 executing program 7 (fault-call:5 fault-nth:15): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) [ 134.363858] FAULT_INJECTION: forcing a failure. [ 134.363858] name failslab, interval 1, probability 0, space 0, times 0 [ 134.375250] CPU: 0 PID: 9503 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 134.382208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.391670] Call Trace: [ 134.394311] dump_stack+0x185/0x1d0 [ 134.397991] should_fail+0x87b/0xab0 [ 134.401765] should_failslab+0x279/0x2a0 [ 134.405894] __kmalloc_track_caller+0x208/0xcb0 [ 134.410660] ? strndup_user+0x134/0x1f0 [ 134.414697] memdup_user+0x7c/0x200 [ 134.418423] strndup_user+0x134/0x1f0 [ 134.422330] __keyctl_dh_compute+0x804/0x1ef0 [ 134.426917] ? kstrtouint_from_user+0x373/0x410 [ 134.431638] ? kmsan_set_origin+0x9e/0x160 [ 134.435934] keyctl_dh_compute+0x22e/0x260 [ 134.440231] ? SyS_keyctl+0x76/0xa0 [ 134.443899] SYSC_keyctl+0xd31/0x1830 [ 134.447801] ? syscall_return_slowpath+0xe9/0x700 [ 134.452698] ? fput+0x25c/0x2e0 [ 134.456059] ? SYSC_write+0x2f0/0x360 [ 134.458358] FAULT_INJECTION: forcing a failure. [ 134.458358] name failslab, interval 1, probability 0, space 0, times 0 [ 134.459932] SyS_keyctl+0x76/0xa0 [ 134.460014] do_syscall_64+0x309/0x430 [ 134.460069] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 134.483490] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 134.488689] RIP: 0033:0x455389 [ 134.491881] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 134.499604] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 134.506880] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 2018/04/22 09:01:18 executing program 1: gettid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x74, &(0x7f0000000080)=[@in6={0xa, 0x4e21, 0x7, @mcast1={0xff, 0x1, [], 0x1}, 0x100000000}, @in={0x2, 0x4e21, @multicast2=0xe0000002}, @in6={0xa, 0x4e24, 0x2, @loopback={0x0, 0x1}, 0x7}, @in6={0xa, 0x4e22, 0x1f, @empty, 0xfffffffffffffffc}, @in={0x2, 0x4e23, @multicast2=0xe0000002}]}, &(0x7f0000000140)=0x10) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f00000003c0)={0x2b, @dev={0xac, 0x14, 0x14, 0x1d}, 0x4e23, 0x2, 'fo\x00', 0x10, 0x80, 0x1}, 0x2c) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={r1, @in6={{0xa, 0x4e23, 0x9, @ipv4={[], [0xff, 0xff], @dev={0xac, 0x14, 0x14, 0xa}}, 0x9}}}, &(0x7f0000000180)=0x84) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000640)=0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000680)={0x7ff, 0x666e, 0xbf, 0x9, [], [], [], 0xacd, 0xffff, 0x2, 0x9, "9a091bc96bce116be66bfc5baf23434b"}) r3 = syz_open_procfs(r2, &(0x7f00000004c0)="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") fgetxattr(r3, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) [ 134.514154] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 134.521424] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 134.528697] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000000 [ 134.536001] CPU: 1 PID: 9507 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 134.542867] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 134.552237] Call Trace: [ 134.554869] dump_stack+0x185/0x1d0 [ 134.558546] should_fail+0x87b/0xab0 2018/04/22 09:01:18 executing program 6: mkdir(&(0x7f000002bff8)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file0/bus\x00', 0x0) r1 = open$dir(&(0x7f000001bff4)='./file0/bus\x00', 0x0, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x1, 0x200) mmap(&(0x7f000000a000/0x4000)=nil, 0x4000, 0x3, 0x100000000a012, r1, 0x0) mlock2(&(0x7f0000009000/0x2000)=nil, 0x2000, 0x1) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000080)="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") inotify_add_watch(r0, &(0x7f0000001080)='./file0/bus\x00', 0x20000000) munlockall() [ 134.562311] should_failslab+0x279/0x2a0 [ 134.566426] __kmalloc+0xc2/0x350 [ 134.569975] ? __keyctl_dh_compute+0x133a/0x1ef0 [ 134.574809] __keyctl_dh_compute+0x133a/0x1ef0 [ 134.579471] ? kstrtouint_from_user+0x373/0x410 [ 134.584202] keyctl_dh_compute+0x22e/0x260 [ 134.588486] ? SyS_keyctl+0x76/0xa0 [ 134.592149] SYSC_keyctl+0xd31/0x1830 [ 134.596038] ? syscall_return_slowpath+0xe9/0x700 [ 134.600943] ? fput+0x25c/0x2e0 [ 134.604305] ? SYSC_write+0x2f0/0x360 [ 134.608180] SyS_keyctl+0x76/0xa0 2018/04/22 09:01:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$random(&(0x7f0000000080)='/dev/random\x00', 0x0, 0x80) write(r5, &(0x7f0000000480)="db208be9010bef30ab8e909a84b90de24f931f42c679248768c02d525c156729c62abf3e947249802d543af6d989c4c9b52275aadaf4c155545acd893c91a5fcbf1ed1ea2219d94550a555659a525a6d499a96240045a378900fb9ac66c425d2e0da589e0974c68b355e42fa11fa8558263300af2d8b7c16edc5f21ea75ce2e3027ef6bf4d2c3eaad601d0e8cf3658c6cf102322788643c4ed10286e48fe11ec26ad94c1b90b316a85913ee1cc68576a52c76c36a9287077b45642b4b5e43b730fb13bfa282a57", 0xc7) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r0) [ 134.611719] do_syscall_64+0x309/0x430 [ 134.615654] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 134.620617] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 134.625834] RIP: 0033:0x455389 [ 134.629042] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 134.636790] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 134.644083] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 134.651379] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:18 executing program 5: r0 = socket$inet6(0xa, 0x80001, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000040)=""/5, &(0x7f0000000080)=0x5) getsockopt(r0, 0x84, 0x17, &(0x7f0000000000)=""/8, &(0x7f0000fecffc)=0x8) r1 = dup2(r0, r0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000180)={0x3, r1}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000100)) ioctl$sock_netrom_SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000140)) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f00000002c0)=""/114) socketpair$inet(0x2, 0x0, 0x6, &(0x7f00000000c0)) [ 134.658671] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 134.665964] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000f 2018/04/22 09:01:18 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$random(&(0x7f0000000080)='/dev/random\x00', 0x0, 0x80) write(r5, &(0x7f0000000480)="db208be9010bef30ab8e909a84b90de24f931f42c679248768c02d525c156729c62abf3e947249802d543af6d989c4c9b52275aadaf4c155545acd893c91a5fcbf1ed1ea2219d94550a555659a525a6d499a96240045a378900fb9ac66c425d2e0da589e0974c68b355e42fa11fa8558263300af2d8b7c16edc5f21ea75ce2e3027ef6bf4d2c3eaad601d0e8cf3658c6cf102322788643c4ed10286e48fe11ec26ad94c1b90b316a85913ee1cc68576a52c76c36a9287077b45642b4b5e43b730fb13bfa282a57", 0xc7) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r0) 2018/04/22 09:01:18 executing program 4 (fault-call:5 fault-nth:1): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:18 executing program 1: r0 = dup(0xffffffffffffffff) bind$nfc_llcp(r0, &(0x7f0000000080)={0x27, 0x1, 0x2, 0x2, 0x3, 0xffffffff80000001, "f6763cfd9cac7d28fca1bef50e51d6863ce65594e526627db09fffd9719dad426b93af06d3544eb80cd82d6f178281772a29629c3b6ccc1966e8124624ce1f", 0x12}, 0x60) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:18 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, @multicast2}, &(0x7f00000000c0)=0x10, 0x80000) lseek(r2, 0x0, 0x6) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000580), 0x0, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)={0xffffffffffffffff}) fcntl$getownex(r6, 0x10, &(0x7f0000000180)={0x0, 0x0}) ptrace$getregs(0xe, r7, 0x1000, &(0x7f0000000600)=""/4096) 2018/04/22 09:01:18 executing program 7 (fault-call:5 fault-nth:16): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:18 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) truncate(&(0x7f0000000000)='./file0\x00', 0x1) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:18 executing program 6: r0 = memfd_create(&(0x7f0000033ff3)='\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = dup2(r1, r0) fremovexattr(r2, &(0x7f00000000c0)=@random={'system.', 'posix_acl_access%user#selfbdevcpuset\x00'}) 2018/04/22 09:01:18 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000580)=@generic, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)=""/158, 0x9e}], 0x1, &(0x7f0000000480)=""/16, 0x10, 0x2}, 0x60) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in=@rand_addr, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r1}, 0x10, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="07000000470f00000010000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0100004001000000040000000d030000410c258c346aec6da29b75326119797221b360cdd567145a0984cf87331b045fdb2c0e43998a09920dbafaa16b3a75e497a5431ceef49f2c4492e9839e5fcdce"], 0x80}, 0x1, 0x0, 0x0, 0x20000000}, 0x8050) [ 135.006699] FAULT_INJECTION: forcing a failure. [ 135.006699] name failslab, interval 1, probability 0, space 0, times 0 [ 135.019180] CPU: 1 PID: 9551 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 135.026056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.035438] Call Trace: [ 135.038073] dump_stack+0x185/0x1d0 [ 135.041746] should_fail+0x87b/0xab0 [ 135.045522] should_failslab+0x279/0x2a0 [ 135.049634] __kmalloc+0xc2/0x350 2018/04/22 09:01:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@random={'btrfs.', '-$(}\x00'}, &(0x7f0000000240)=""/166, 0xa6) [ 135.053168] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 135.058582] ? crypto_create_tfm+0x10a/0x640 [ 135.063021] ? crypto_alg_extsize+0x66/0xc0 [ 135.067422] crypto_create_tfm+0x10a/0x640 [ 135.071757] crypto_alloc_tfm+0x3a9/0x710 [ 135.076010] crypto_alloc_shash+0x99/0xb0 [ 135.080250] __keyctl_dh_compute+0x9c5/0x1ef0 [ 135.084833] ? kstrtouint_from_user+0x373/0x410 [ 135.089547] ? kmsan_set_origin+0x9e/0x160 [ 135.093833] keyctl_dh_compute+0x22e/0x260 [ 135.098124] ? SyS_keyctl+0x76/0xa0 [ 135.101785] SYSC_keyctl+0xd31/0x1830 2018/04/22 09:01:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, @dev}, &(0x7f00000000c0)=0x1c) getsockopt$IP_VS_SO_GET_SERVICE(r5, 0x0, 0x483, &(0x7f0000000140), &(0x7f0000000280)=0x68) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 135.105677] ? syscall_return_slowpath+0xe9/0x700 [ 135.110582] ? fput+0x25c/0x2e0 [ 135.113947] ? SYSC_write+0x2f0/0x360 [ 135.117829] SyS_keyctl+0x76/0xa0 [ 135.121373] do_syscall_64+0x309/0x430 [ 135.125315] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 135.130291] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 135.135506] RIP: 0033:0x455389 [ 135.138717] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 135.146466] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 2018/04/22 09:01:19 executing program 6: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="020100000a00000000000000000000000200130000000000000000000000000003000600000000000200000000000000000000000000000003de05000000000002000000e00000010000000000000000e52760367a507246a70c961278220ac2988f674bc015e60562771990b321f4480e76ca5ffb39aaee6c3ccee15403fb91a7e2c1ade06f9c99daefc879a2376927a5b13690bf80f2966cef1a7cb115a2be80486346d1a6758b9d37bd9020a1bbbf57f4577d29943b3e6e2f1a388a2b39b1034d18cb90af691c7a407066e46205f29fdf447c8359b8549f6a68562b1da04f0c340e8b7fdf68fecb283de6df5f367f4306c1"], 0x50}, 0x1}, 0x0) 2018/04/22 09:01:19 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xd9, 0x800) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000040)={{0x9, 0x5, 0x9, 0x2, 0x7f, 0x6}, 0x3f, 0x7, 0x7, 0x7, 0xb6a, "7b193b7658b61ce80e205eb139c46cddf27a16a64fe812ce2bca8a1ba9dfdb4b88b63494f545a5aa25e89478a50351e77435d7425da4318e96df0e50808604ed42e4dc069c6993c93bb89078551e021183bf981ab50dda56d365974c757012f6c82b7fc37dcc08634fb5911070562ca7e78377ddd424c77ca721b32ffb414063"}) socketpair$inet(0x2, 0x7, 0x1, &(0x7f0000000140)) [ 135.153758] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 135.161061] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 135.168352] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 135.175649] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000001 [ 135.183692] could not allocate digest TFM handle poly1305 [ 135.201942] FAULT_INJECTION: forcing a failure. [ 135.201942] name failslab, interval 1, probability 0, space 0, times 0 [ 135.213368] CPU: 1 PID: 9544 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 135.220240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.229620] Call Trace: [ 135.232260] dump_stack+0x185/0x1d0 [ 135.235945] should_fail+0x87b/0xab0 [ 135.239763] should_failslab+0x279/0x2a0 [ 135.243891] __kmalloc+0xc2/0x350 [ 135.247387] ? mpi_alloc+0x58/0x290 [ 135.251069] mpi_alloc+0x58/0x290 2018/04/22 09:01:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x40) [ 135.254563] ? dh_compute_value+0x3f/0x5f0 [ 135.258842] dh_compute_value+0x8b/0x5f0 [ 135.262994] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 135.268529] ? dh_set_secret+0x620/0x620 [ 135.272688] ? dh_set_secret+0x620/0x620 [ 135.276856] __keyctl_dh_compute+0x158a/0x1ef0 [ 135.281528] keyctl_dh_compute+0x22e/0x260 [ 135.285832] ? SyS_keyctl+0x76/0xa0 [ 135.289495] SYSC_keyctl+0xd31/0x1830 [ 135.293391] ? syscall_return_slowpath+0xe9/0x700 [ 135.298298] ? fput+0x25c/0x2e0 [ 135.301668] ? SYSC_write+0x2f0/0x360 2018/04/22 09:01:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_VERSION(r5, 0xc0406400, &(0x7f0000000180)={0xdb, 0xffffffffffff7f7a, 0x701, 0x1d, &(0x7f00000000c0)=""/29, 0x37, &(0x7f0000000140)=""/55, 0x95, &(0x7f0000000480)=""/149}) [ 135.305548] SyS_keyctl+0x76/0xa0 [ 135.309099] do_syscall_64+0x309/0x430 [ 135.313047] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 135.318025] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 135.323244] RIP: 0033:0x455389 [ 135.326454] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 135.334201] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 135.341493] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 135.348880] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:19 executing program 5: syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @empty, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1=0xe0000001, {[@ra={0x94, 0x6, 0x10001}]}}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "025c1c", 0x0, "289bbc"}}}}}}, &(0x7f0000000040)) chroot(&(0x7f0000000000)='./file0\x00') 2018/04/22 09:01:19 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000419ff4)='./file0/bus\x00', 0x0) fcntl$getown(r0, 0x9) r1 = open$dir(&(0x7f000002c000)='./file0/bus\x00', 0x0, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/185, 0xffffffffffffffe5}], 0x1, 0x4000000000000000) write$vnet(r0, &(0x7f0000000040)={0x1, {&(0x7f0000000500)=""/4096, 0x1000, &(0x7f0000000100)=""/167}}, 0x68) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)) truncate(&(0x7f00000000c0)='./file0/bus\x00', 0x4) [ 135.356176] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 135.363470] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000010 2018/04/22 09:01:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x2d2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={r1, 0x2c, &(0x7f00000000c0)=[@in6={0xa, 0x4e24, 0x22d, @local={0xfe, 0x80, [], 0xaa}, 0x4203}, @in={0x2, 0x4e22, @rand_addr=0x7}]}, &(0x7f0000000140)=0x10) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) truncate(&(0x7f0000000000)='./file0\x00', 0x1) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:19 executing program 7 (fault-call:5 fault-nth:17): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:19 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001480)=ANY=[], &(0x7f0000008000)='syzkaller\x00', 0x7, 0x7f, &(0x7f0000008000)=""/127}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x5, &(0x7f0000003000)=@framed={{0x18}, [@alu={0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0xfffffffffffffffd}], {0x95}}, &(0x7f0000002ff6)='syzkaller\x00', 0x7e0, 0xe7, &(0x7f0000002f19)=""/231, 0x2000000000000}, 0xfffffffffffffe31) 2018/04/22 09:01:19 executing program 6: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r0 = socket(0x11, 0x4000000000080003, 0xfffffffffffff800) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) write$binfmt_elf64(r0, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0xb97, 0x6f05, 0xff, 0x7, 0x2, 0x6, 0x7fffffff, 0x388, 0x40, 0x73, 0x1, 0x78, 0x38, 0x1, 0x7fff, 0x9}, [{0x60000007, 0x0, 0x9, 0x8001, 0x8001, 0x7, 0x100, 0x100}, {0x2, 0x17a, 0x400, 0x800, 0x225d, 0x73, 0x0, 0x100}], "677b74fe54b58b54567dc0603c1b07f5ae93b7ddfcd50af82f95de53d800cd3e0228ace6c701ea8e2fde8d4308f5caf23a2ad89267396a9edfeb5618f8d2b96b8f1515deb91dbabff8edd6319855f55c79139435c0bc", [[], [], [], [], [], [], [], []]}, 0x906) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_1\x00', 0x0}) bind$packet(r0, &(0x7f0000000480)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) r2 = msgget$private(0x0, 0x8) msgctl$MSG_INFO(r2, 0xc, &(0x7f0000000080)=""/50) 2018/04/22 09:01:19 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) r0 = add_key(&(0x7f00000003c0)='trusted\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000440)="e3f125046149bab5fffcb51d49a2d6cf335930130b5508aac24635f52accc66beac46863df2dbc9870", 0x29, 0xfffffffffffffffd) r1 = request_key(&(0x7f0000000380)='pkcs7_test\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000080)='digest_null\x00', r0) r2 = add_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0xfffffdc6, 0xfffffffffffffffa) r3 = request_key(&(0x7f0000000180)='cifs.spnego\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200)='digest_null\x00', 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000240)={r1, r2, r3}, &(0x7f0000000280)=""/85, 0x55, &(0x7f0000000340)={&(0x7f0000000300)={'ghash-clmulni\x00'}}) semget(0x2, 0x3, 0x10) 2018/04/22 09:01:19 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/29, 0x1d) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) 2018/04/22 09:01:19 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xbd) 2018/04/22 09:01:19 executing program 4 (fault-call:5 fault-nth:2): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) [ 135.736348] FAULT_INJECTION: forcing a failure. [ 135.736348] name failslab, interval 1, probability 0, space 0, times 0 [ 135.747709] CPU: 1 PID: 9605 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 135.754581] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.763963] Call Trace: [ 135.766600] dump_stack+0x185/0x1d0 [ 135.770277] should_fail+0x87b/0xab0 [ 135.774044] should_failslab+0x279/0x2a0 [ 135.778194] __kmalloc+0xc2/0x350 [ 135.781734] ? __keyctl_dh_compute+0xb61/0x1ef0 2018/04/22 09:01:19 executing program 3: pause() r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) truncate(&(0x7f0000000000)='./file0\x00', 0x1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 135.786489] __keyctl_dh_compute+0xb61/0x1ef0 [ 135.791070] ? kstrtouint_from_user+0x373/0x410 [ 135.795818] keyctl_dh_compute+0x22e/0x260 [ 135.800110] ? SyS_keyctl+0x76/0xa0 [ 135.803767] SYSC_keyctl+0xd31/0x1830 [ 135.807656] ? syscall_return_slowpath+0xe9/0x700 [ 135.812548] ? fput+0x25c/0x2e0 [ 135.815905] ? SYSC_write+0x2f0/0x360 [ 135.819781] SyS_keyctl+0x76/0xa0 [ 135.823326] do_syscall_64+0x309/0x430 [ 135.827272] ? keyctl_restrict_keyring+0x4e0/0x4e0 2018/04/22 09:01:19 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x3, 0x100) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000180)={0xfffffffffffffff7, 0x100}) syz_open_dev$sndtimer(&(0x7f0000000240)='/dev/snd/timer\x00', 0x0, 0x4000) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setrlimit(0x7, &(0x7f0000becff0)) unshare(0x400) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000100)) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000001c0)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000200)={r3, 0x80000, r0}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r2, 0x408c5333, &(0x7f0000000040)={0x7, 0x6, 0xff, 'queue0\x00', 0x809}) [ 135.832252] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 135.837469] RIP: 0033:0x455389 [ 135.840681] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 135.848429] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 135.855724] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 135.863650] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 135.870945] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 135.878240] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000002 2018/04/22 09:01:19 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 135.964206] FAULT_INJECTION: forcing a failure. [ 135.964206] name failslab, interval 1, probability 0, space 0, times 0 [ 135.975612] CPU: 1 PID: 9622 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 135.982483] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 135.991858] Call Trace: [ 135.994498] dump_stack+0x185/0x1d0 [ 135.998185] should_fail+0x87b/0xab0 [ 136.002005] should_failslab+0x279/0x2a0 [ 136.006172] __kmalloc+0xc2/0x350 [ 136.009727] ? dh_compute_value+0x347/0x5f0 2018/04/22 09:01:20 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000180)=0x0) r1 = getpgid(r0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r2, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) [ 136.014095] ? mpi_alloc_limb_space+0x6f/0xb0 [ 136.018642] mpi_alloc_limb_space+0x6f/0xb0 [ 136.023007] mpi_powm+0x233/0x56f0 [ 136.026582] ? __msan_poison_alloca+0x15c/0x1d0 [ 136.031329] ? trace_kmalloc+0xa3/0x2b0 [ 136.035348] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 136.040759] ? kmsan_set_origin+0x9e/0x160 [ 136.045062] ? mpi_alloc+0x1ad/0x290 [ 136.048830] dh_compute_value+0x347/0x5f0 [ 136.053068] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 136.058604] ? dh_set_secret+0x620/0x620 [ 136.062753] __keyctl_dh_compute+0x158a/0x1ef0 [ 136.067434] keyctl_dh_compute+0x22e/0x260 [ 136.071724] ? SyS_keyctl+0x76/0xa0 [ 136.075386] SYSC_keyctl+0xd31/0x1830 [ 136.079294] ? syscall_return_slowpath+0xe9/0x700 [ 136.084208] ? fput+0x25c/0x2e0 [ 136.087565] ? SYSC_write+0x2f0/0x360 [ 136.091438] SyS_keyctl+0x76/0xa0 [ 136.094978] do_syscall_64+0x309/0x430 [ 136.098925] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 136.103906] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 136.109126] RIP: 0033:0x455389 2018/04/22 09:01:20 executing program 5: capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') [ 136.112340] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 136.120094] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 136.128096] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 136.135396] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 136.142694] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 136.149987] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000011 2018/04/22 09:01:20 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r2 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r2, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:20 executing program 4 (fault-call:5 fault-nth:3): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:20 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_default\x00', &(0x7f0000000200)='security.evm\x00', 0xd, 0x3) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0x7, 0x5, 0xff, 0x9, 0x0, 0xbdd, 0x120, 0x5, 0x3, 0x1, 0x4, 0x100000001, 0xffffffffffffff81, 0xe14, 0x8, 0xdc, 0xffffffff80000000, 0x100000000, 0x9, 0x5, 0x9, 0x0, 0x9, 0x1f, 0x7, 0x1, 0xffff, 0xff, 0x0, 0x1, 0x400, 0x1, 0x400, 0xd035, 0x1ff, 0x7, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0xf201, 0xfff, 0x9e0a, 0x3, 0x4, 0x6, 0x9}, r1, 0xb, r0, 0x2) 2018/04/22 09:01:20 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="2f6578650000e7050236") getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0)=r1, 0x4) fdatasync(r0) 2018/04/22 09:01:20 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, 0x0) r2 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:20 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)) r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs(r0, &(0x7f0000000040)='net/mcfilter\x00') setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000000)={0xcc}, 0x1) 2018/04/22 09:01:20 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x5, 0x101000) getsockopt$inet_dccp_buf(r2, 0x21, 0xf, &(0x7f0000000480)=""/220, &(0x7f00000000c0)=0xdc) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:20 executing program 7 (fault-call:5 fault-nth:18): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:20 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x801) fcntl$setstatus(r0, 0x4, 0x400) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000080)={0x7f, 0x7, 0x6, 0x13, &(0x7f0000000040)=""/19, 0xe4, &(0x7f0000000140)=""/228, 0xa5, &(0x7f0000000240)=""/165}) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) ioctl$DRM_IOCTL_CONTROL(r1, 0x40086414, &(0x7f00000000c0)={0x0, 0x200}) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) syz_open_dev$sg(&(0x7f0000000300)='/dev/sg#\x00', 0x8, 0x400) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000440)) r3 = getegid() fchownat(r0, &(0x7f0000000400)='./file0\x00', r2, r3, 0x1000) [ 136.919287] FAULT_INJECTION: forcing a failure. [ 136.919287] name failslab, interval 1, probability 0, space 0, times 0 [ 136.930666] CPU: 1 PID: 9665 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 136.937534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 136.946911] Call Trace: [ 136.949546] dump_stack+0x185/0x1d0 [ 136.953235] should_fail+0x87b/0xab0 [ 136.957014] should_failslab+0x279/0x2a0 [ 136.961141] __kmalloc_track_caller+0x208/0xcb0 [ 136.965868] ? dh_data_from_key+0x272/0x3e0 [ 136.970232] ? rcu_all_qs+0x32/0x1f0 [ 136.974008] kmemdup+0x95/0x140 [ 136.977193] FAULT_INJECTION: forcing a failure. [ 136.977193] name failslab, interval 1, probability 0, space 0, times 0 [ 136.977368] dh_data_from_key+0x272/0x3e0 [ 136.992731] __keyctl_dh_compute+0x3cb/0x1ef0 [ 136.997289] ? kstrtouint_from_user+0x373/0x410 [ 137.002022] keyctl_dh_compute+0x22e/0x260 [ 137.006299] ? SyS_keyctl+0x76/0xa0 [ 137.009939] SYSC_keyctl+0xd31/0x1830 [ 137.013811] ? syscall_return_slowpath+0xe9/0x700 [ 137.018706] ? fput+0x25c/0x2e0 [ 137.022045] ? SYSC_write+0x2f0/0x360 [ 137.025892] SyS_keyctl+0x76/0xa0 [ 137.029398] do_syscall_64+0x309/0x430 [ 137.033312] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 137.038259] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 137.043454] RIP: 0033:0x455389 [ 137.046644] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 137.054364] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 137.061635] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 137.068906] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 137.076177] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 137.083449] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000003 [ 137.090752] CPU: 0 PID: 9667 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 137.097615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 137.106989] Call Trace: [ 137.109625] dump_stack+0x185/0x1d0 [ 137.113304] should_fail+0x87b/0xab0 [ 137.117114] should_failslab+0x279/0x2a0 [ 137.121282] __kmalloc+0xc2/0x350 [ 137.124818] ? mpi_resize+0x254/0x450 [ 137.128683] mpi_resize+0x254/0x450 [ 137.132346] mpi_powm+0x1d59/0x56f0 [ 137.136056] dh_compute_value+0x347/0x5f0 [ 137.140293] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 137.145813] ? dh_set_secret+0x620/0x620 [ 137.149950] __keyctl_dh_compute+0x158a/0x1ef0 [ 137.154633] keyctl_dh_compute+0x22e/0x260 [ 137.158930] ? SyS_keyctl+0x76/0xa0 [ 137.162592] SYSC_keyctl+0xd31/0x1830 [ 137.166496] ? syscall_return_slowpath+0xe9/0x700 [ 137.171405] ? fput+0x25c/0x2e0 [ 137.174762] ? SYSC_write+0x2f0/0x360 [ 137.178637] SyS_keyctl+0x76/0xa0 [ 137.182182] do_syscall_64+0x309/0x430 [ 137.186124] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 137.191102] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 137.196327] RIP: 0033:0x455389 [ 137.199534] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 137.207295] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 2018/04/22 09:01:21 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x3, &(0x7f0000000080), &(0x7f0000013000)=0x4) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x2, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}, [0x8, 0xc1, 0x5, 0x400, 0x80000000, 0xfffffffffffffffe, 0x91, 0x401, 0x5, 0x8, 0xfffffffffffffffd, 0xc000, 0x8, 0xfffffffffffff001, 0x1]}, &(0x7f00000000c0)=0x100) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180)={r2, 0x7f000}, &(0x7f0000000040)=0xfffffffffffffde0) 2018/04/22 09:01:21 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x81, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={0x0, 0x6}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000080)={r1, 0x2}, 0x8) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x3, 0x543000) unshare(0x40600) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000001c0)) pwrite64(r0, &(0x7f0000000040), 0x0, 0x12) syz_open_dev$dspn(&(0x7f0000000180)='/dev/dsp#\x00', 0x2, 0x40) 2018/04/22 09:01:21 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r1) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:21 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000000)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) [ 137.214608] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 137.221907] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 137.229203] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 137.236497] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000012 2018/04/22 09:01:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = memfd_create(&(0x7f0000000000)='user\x00', 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000000c0)=0x8000000) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:22 executing program 4 (fault-call:5 fault-nth:4): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:22 executing program 0: keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:22 executing program 5: socketpair$inet6(0xa, 0x2, 0xc8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000040)={0x0, 0x3, 0x0, 0x180, 0x8}, &(0x7f00000000c0)=0x18) r2 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x4, 0x800) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f00000001c0), 0x2) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r1, 0x2}, 0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) r3 = socket(0x19, 0x1, 0x81) bind$vsock_stream(r3, &(0x7f0000000140)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r4, 0x0, 0x37, &(0x7f0000000200)=0x2, 0x1) 2018/04/22 09:01:22 executing program 2: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r1) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0x120, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) 2018/04/22 09:01:22 executing program 6: r0 = syz_open_dev$mice(&(0x7f0000d73ff0)='/dev/input/mice\x00', 0x0, 0x82) ioctl$int_in(r0, 0x5452, &(0x7f0000000100)=0x9) write(r0, &(0x7f0000000080), 0x0) 2018/04/22 09:01:22 executing program 7 (fault-call:5 fault-nth:19): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) [ 138.197652] FAULT_INJECTION: forcing a failure. [ 138.197652] name failslab, interval 1, probability 0, space 0, times 0 [ 138.204555] FAULT_INJECTION: forcing a failure. [ 138.204555] name failslab, interval 1, probability 0, space 0, times 0 [ 138.209141] CPU: 0 PID: 9708 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 138.227058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.236421] Call Trace: [ 138.239047] dump_stack+0x185/0x1d0 [ 138.242700] should_fail+0x87b/0xab0 [ 138.246443] should_failslab+0x279/0x2a0 [ 138.250586] __kmalloc_track_caller+0x208/0xcb0 [ 138.255294] ? dh_data_from_key+0x272/0x3e0 [ 138.259633] ? rcu_all_qs+0x32/0x1f0 [ 138.263371] kmemdup+0x95/0x140 [ 138.266671] dh_data_from_key+0x272/0x3e0 [ 138.270877] __keyctl_dh_compute+0x453/0x1ef0 [ 138.275432] ? kstrtouint_from_user+0x373/0x410 [ 138.280139] keyctl_dh_compute+0x22e/0x260 [ 138.284398] ? SyS_keyctl+0x76/0xa0 [ 138.288047] SYSC_keyctl+0xd31/0x1830 [ 138.291908] ? syscall_return_slowpath+0xe9/0x700 [ 138.296784] ? fput+0x25c/0x2e0 [ 138.300112] ? SYSC_write+0x2f0/0x360 [ 138.303951] SyS_keyctl+0x76/0xa0 [ 138.307451] do_syscall_64+0x309/0x430 [ 138.311363] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 138.316311] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 138.321515] RIP: 0033:0x455389 [ 138.324710] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 138.332431] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 138.339965] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 138.347237] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 138.354509] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 138.361779] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000004 [ 138.369080] CPU: 1 PID: 9706 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 138.375942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 138.385317] Call Trace: [ 138.387954] dump_stack+0x185/0x1d0 [ 138.391631] should_fail+0x87b/0xab0 [ 138.395448] should_failslab+0x279/0x2a0 [ 138.399609] __kmalloc+0xc2/0x350 [ 138.403154] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 138.408686] ? mpi_resize+0x2bc/0x450 [ 138.412529] ? mpi_alloc_limb_space+0x6f/0xb0 [ 138.417074] mpi_alloc_limb_space+0x6f/0xb0 [ 138.421486] mpi_powm+0x236d/0x56f0 [ 138.425200] dh_compute_value+0x347/0x5f0 [ 138.429439] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 138.434952] ? dh_set_secret+0x620/0x620 [ 138.439099] __keyctl_dh_compute+0x158a/0x1ef0 [ 138.443770] keyctl_dh_compute+0x22e/0x260 2018/04/22 09:01:22 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:22 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080)='fou\x00') mq_timedreceive(r0, &(0x7f00000001c0), 0x0, 0x40, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x400, 0x70bd26, 0x25dfdbfe, {0x2}, [@FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4, 0x5}, @FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_AF={0x8, 0x2, 0xa}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40800}, 0x4840) [ 138.448062] ? SyS_keyctl+0x76/0xa0 [ 138.451720] SYSC_keyctl+0xd31/0x1830 [ 138.455610] ? syscall_return_slowpath+0xe9/0x700 [ 138.460514] ? fput+0x25c/0x2e0 [ 138.463865] ? SYSC_write+0x2f0/0x360 [ 138.467706] SyS_keyctl+0x76/0xa0 [ 138.471199] do_syscall_64+0x309/0x430 [ 138.475131] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 138.480102] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 138.485329] RIP: 0033:0x455389 [ 138.488540] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 2018/04/22 09:01:22 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200000, 0x0) unshare(0x40600) pwrite64(r0, &(0x7f0000000000), 0xfffffffffffffe4f, 0x0) [ 138.496283] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 138.503578] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 138.510870] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 138.518163] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 138.525458] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000013 2018/04/22 09:01:22 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x4c91, 0x8001) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x40, 0x8000) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f0000000700)='/dev/snd/midiC#D#\x00', 0x4, 0x600200) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000040)=ANY=[@ANYBLOB="03dc9720", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000000c0)={r2, 0x3}, &(0x7f0000000140)=0x8) r3 = socket$key(0xf, 0x3, 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000640)={0x3, 0x5, 0x4, 'queue1\x00', 0x6dab}) sendmsg$key(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)=ANY=[@ANYBLOB="02030003130000000000b2000000000005000600000000000a0000008d000000000000000000000000000000000046d5430700000000000005000900ff0000000a40000012000000fe8000000000000000001000000000ff000001000400000002000100000000000000020c0000000005000500000000800a00000000000000ff020000000c800000000000000000010000000000000000"], 0x98}, 0x1}, 0x0) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280)="d10712fc1afbdd0d4bd1e9603cfc2269cee32d6c10ecaa1a9250c84b26b355eddc0ff65289e1824f8b92376800e39f6d82ce1190126a14f312f00181064682c09b4fe73aaed4b74036eea9f33f336398125fb9009bbbee50c114d4bfd69b2470358df082d1c739cb6258cb7891d3afac4a40c9b1f2c721d26e88b01180687e306c2c138e6aafcbb2303c2545122ad77d9e9136bdea0da62d574c49d14f5210225e259ea0f5d739a43a0bd13a7577acaa1e6938c6844aa75339da06c098c06419d551798492a2718d5ec2ee67ca37962082c5ce998f72827e222e", 0xda, 0xfffffffffffffff9) r5 = request_key(&(0x7f0000000380)='big_key\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000400)='security$\x00', 0xffffffffffffffff) r6 = request_key(&(0x7f0000000440)='asymmetric\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000004c0)='posix_acl_accesslomd5sum\x00', 0xfffffffffffffffa) keyctl$dh_compute(0x17, &(0x7f0000000500)={r4, r5, r6}, &(0x7f0000000540)=""/225, 0xe1, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000000)=""/8, &(0x7f0000000740)=""/158, &(0x7f0000000800)=""/220, 0x6000}) 2018/04/22 09:01:22 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) acct(&(0x7f0000000000)='./file0\x00') r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f00000000c0)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}, 0x0, 0xfffffffffffffe68}) 2018/04/22 09:01:22 executing program 6: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x200000, 0x0) unshare(0x40600) pwrite64(r0, &(0x7f0000000000), 0xfffffffffffffe4f, 0x0) 2018/04/22 09:01:22 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:22 executing program 4 (fault-call:5 fault-nth:5): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:22 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = memfd_create(&(0x7f0000000000)='user\x00', 0x0) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000000c0)=0x8000000) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 139.015819] FAULT_INJECTION: forcing a failure. [ 139.015819] name failslab, interval 1, probability 0, space 0, times 0 [ 139.027192] CPU: 0 PID: 9746 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 139.034066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.043456] Call Trace: [ 139.046097] dump_stack+0x185/0x1d0 [ 139.049777] should_fail+0x87b/0xab0 [ 139.053549] should_failslab+0x279/0x2a0 [ 139.057719] __kmalloc_track_caller+0x208/0xcb0 [ 139.062453] ? dh_data_from_key+0x272/0x3e0 [ 139.066818] ? rcu_all_qs+0x32/0x1f0 [ 139.070590] kmemdup+0x95/0x140 [ 139.073935] dh_data_from_key+0x272/0x3e0 [ 139.078173] __keyctl_dh_compute+0x4e2/0x1ef0 [ 139.082770] ? kstrtouint_from_user+0x373/0x410 [ 139.087511] keyctl_dh_compute+0x22e/0x260 [ 139.091806] ? SyS_keyctl+0x76/0xa0 [ 139.095468] SYSC_keyctl+0xd31/0x1830 [ 139.099372] ? syscall_return_slowpath+0xe9/0x700 [ 139.104288] ? fput+0x25c/0x2e0 [ 139.107652] ? SYSC_write+0x2f0/0x360 [ 139.111482] SyS_keyctl+0x76/0xa0 [ 139.114972] do_syscall_64+0x309/0x430 [ 139.118868] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 139.123806] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 139.129001] RIP: 0033:0x455389 [ 139.132197] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 139.139912] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 139.147175] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 139.154610] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 2018/04/22 09:01:23 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) pwrite64(r0, &(0x7f0000000300)="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", 0x1000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'TPROXY\x00'}, &(0x7f0000000100)=0x1e) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000180)=0x3f) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') fgetxattr(r1, &(0x7f00000000c0)=@random={'security.', 'net/sockstat6\x00'}, &(0x7f0000000240)=""/166, 0xa6) ioctl$VT_SETMODE(r0, 0x5602, &(0x7f0000000140)={0x2, 0x7fff, 0x307c, 0x1000, 0x8000}) 2018/04/22 09:01:23 executing program 7 (fault-call:5 fault-nth:20): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:23 executing program 6: r0 = socket(0x10, 0x807, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x810, r0, 0x0) write(r0, &(0x7f0000000080)="240104001a0025f00000000418edfc0e0a0b10bf6fe800fcff03dc0202ffff409b2a53c9153ed834ac49c75a000000000092fa7e4d0104c8bdba34cbceb9f1385c0a4f532232a930bea60aad9130a38f75501faa8efd6f4492b64d3d04a335030cad5c2a647d7578a8ddace5d071d9c1215b452e510a43916910e7a95b467f836a4467b85d", 0xcb23dd0d76953203) 2018/04/22 09:01:23 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:23 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000), 0x4) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x4001e, r1, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440), 0x0, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:23 executing program 4 (fault-call:5 fault-nth:6): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:23 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x101000, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000040)=0xd46d, 0x4) r1 = dup3(r0, r0, 0x80000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0xf3, "1fb3cc66e2912240fe8326671348bf2c3df5ee1546001049f7910279fb0b7b5df9ece69f8757b6a55701a436643f2cea7592f5440bd3ec6b6a29aebc23379fbee17cb5ab2694623189874a98d43aa9f5c343a844229a4dee4be7b93b636176303dcc2472cf4c8af853251d8c0cb0646a8fa9d2aca61af2ec604c6908b81ffbc9b8d134f02a9285c31d8fda2572cd64bbce92bd0bcf2fe560db05e30be02077810db1b28fd25954d888c079c44c08d35632cbae72540f2dcc7436f9c3c9f80070ccddf32cc0f06ce4685516922aba68eb42ef58bf881cbf6d96e5b97ce0c5531093612d6b8791824924aca6b49a54b956742e54"}, &(0x7f0000000180)=0xfb) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000001c0)={r2, 0x55, "0b0d3af3b3230c173da15a8f2bcb3bf27de85312f67974fc9fc9f2596f06b235bde5002c0838db60bd4689c150389d45ec6933e6d5f3c16774a7c3999d7b39c28636f730f75d52834f4e263ac7bf4169c90bf85fff"}, &(0x7f0000000240)=0x5d) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={r3, @in6={{0xa, 0x4e22, 0x9, @local={0xfe, 0x80, [], 0xaa}, 0x3}}, 0x80000000, 0x1, 0xffffffffffffffc0, 0x200, 0xd8}, 0x98) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000340)={r3, 0x6f, "53b680e9da13faa1a89fe973ef189d51f38d70543119a23095b5c2236da0c264d92c9b4f4afe952b8ccf0895aad888eacdb2584bfe5c3e16a5656af3e18005b67e64dd9c7a1be18b26217fde2f18927e036f549d52a7bdf3acd517a649406282b6f8db99b29aead271f4c5027fdf1c"}, &(0x7f00000003c0)=0x77) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000400)={'HL\x00'}, &(0x7f0000000440)=0x1e) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) recvfrom$packet(r1, &(0x7f0000000480)=""/64, 0x40, 0x100, &(0x7f0000000500)={0x11, 0x11, r4, 0x1, 0x7a, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000540)={r2, 0x1, 0x80, 0x337, 0xd9, 0x8}, &(0x7f0000000580)=0x14) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f00000005c0)=0x7, 0x4) setsockopt$sock_int(r1, 0x1, 0x2d, &(0x7f0000000600)=0xaaa, 0x4) ioctl$EVIOCGEFFECTS(r1, 0x80044584, &(0x7f0000000640)=""/119) pread64(r1, &(0x7f00000006c0)=""/239, 0xef, 0x5b) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000800)='fou\x00') sendmsg$FOU_CMD_ADD(r1, &(0x7f00000008c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x4020a210}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x1c, r5, 0x400, 0x70bd26, 0x25dfdbfb, {0x1}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x1c}, 0x1}, 0x40004) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000940)={0x4, &(0x7f0000000900)=[{0x8, 0x401, 0x10000, 0x9741}, {0x5, 0x3, 0xfffffffffffffb3c, 0x3}, {0x3, 0x3, 0x1, 0x7}, {0x81, 0x3, 0xc4c2, 0x9}]}, 0x10) r6 = syz_open_dev$vcsa(&(0x7f0000000980)='/dev/vcsa#\x00', 0x24e, 0x200) r7 = dup3(r0, r6, 0x80000) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f00000009c0)={0x6, {{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}, {{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}}, 0x108) readv(r0, &(0x7f0000001e00)=[{&(0x7f0000000b00)=""/225, 0xe1}, {&(0x7f0000000c00)=""/197, 0xc5}, {&(0x7f0000000d00)=""/41, 0x29}, {&(0x7f0000000d40)=""/4096, 0x1000}, {&(0x7f0000001d40)=""/183, 0xb7}], 0x5) getsockopt$inet6_dccp_int(r7, 0x21, 0x7, &(0x7f0000001e80), &(0x7f0000001ec0)=0x4) io_setup(0x80, &(0x7f0000001f00)=0x0) r9 = dup2(r6, r6) io_submit(r8, 0x4, &(0x7f0000003280)=[&(0x7f0000001fc0)={0x0, 0x0, 0x0, 0x7, 0x80000000, r7, &(0x7f0000001f40)="5413ff227b8f6c5a72ed252cf5b275f0d6d6e012900c55860ac00137049e0d3bd9dc26eedaf9908eaf929d827b7b60607f1a5fba112b73ce6094f2a4a961a9a6c854230c31597b256ca3bace774b7b1609f4", 0x52, 0xfa, 0x0, 0x0, r9}, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x8, 0xc63, r0, &(0x7f0000002000)="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", 0x1000, 0x3, 0x0, 0x1, r6}, &(0x7f0000003140)={0x0, 0x0, 0x0, 0xa, 0x8, r6, &(0x7f0000003040)="e33e39377c95950a120ec6ed093b64d8265cae465712b2cae9ae1e323c2b9ca9fc0c25d28bd998c037ea2c72d56949b22af63097878158faff33a741f1aad16b9fd9df0620c3c7abb5093d3c9f22ce36fc419338caba98209bc06884362fda69c5d65d0d7c400bbd794b9c20c26952c79e303601377d4ae9a66228bcc32521f3d8a3e5a76880c5610d5f12131f18855103a4633cc6fc0e84c3f469481bc31fe8cf1b3f78d8757d925caca98291396146b862858b51f6ab1235c60ba7f8e89e798959e1d63a3e", 0xc6, 0x100000001, 0x0, 0x0, r6}, &(0x7f0000003240)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, r1, &(0x7f0000003180)="84371d14255d92ffb181f564f2ba6d2afcbfcabe59ab0783bfa0140247d548ee3ec6755369af2c81ca7cdc9a25f46d5cf2fc591f5c30b5b971e309e47c950b84f2830b268397bbc2b241ae83e790655e255bf40c7b344d3c0a1a16e407d3313d201574a5be3c109a6eb5ed48d15e72d557f0d63e43cd1f9810fe8c01111a47ba6360ea6055a8158881977d831be1d22b3745d560867fc6cce09fa0a913b7dee7a25b64921d", 0xa5, 0x3, 0x0, 0x1, r1}]) syz_open_dev$sg(&(0x7f00000032c0)='/dev/sg#\x00', 0xa37, 0x2000) [ 139.161886] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 139.169147] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000005 setsockopt$inet_MCAST_MSFILTER(r6, 0x0, 0x30, &(0x7f0000003300)={0xfffffffffffffff9, {{0x2, 0x4e23, @loopback=0x7f000001}}, 0x0, 0x1, [{{0x2, 0x4e21, @multicast1=0xe0000001}}]}, 0x110) setsockopt$inet_sctp_SCTP_NODELAY(r7, 0x84, 0x3, &(0x7f0000003440)=0x7198, 0x4) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r9, 0x2405, r9) [ 139.282345] FAULT_INJECTION: forcing a failure. [ 139.282345] name failslab, interval 1, probability 0, space 0, times 0 [ 139.293811] CPU: 0 PID: 9773 Comm: syz-executor7 Not tainted 4.16.0+ #85 [ 139.301147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.310539] Call Trace: [ 139.313193] dump_stack+0x185/0x1d0 [ 139.316886] should_fail+0x87b/0xab0 [ 139.320660] should_failslab+0x279/0x2a0 [ 139.324786] __kmalloc+0xc2/0x350 [ 139.328341] ? __keyctl_dh_compute+0x1bae/0x1ef0 [ 139.333176] __keyctl_dh_compute+0x1bae/0x1ef0 [ 139.337844] keyctl_dh_compute+0x22e/0x260 [ 139.342138] ? SyS_keyctl+0x76/0xa0 [ 139.345796] SYSC_keyctl+0xd31/0x1830 [ 139.349691] ? syscall_return_slowpath+0xe9/0x700 [ 139.354600] ? fput+0x25c/0x2e0 [ 139.357960] ? SYSC_write+0x2f0/0x360 [ 139.361839] SyS_keyctl+0x76/0xa0 [ 139.365404] do_syscall_64+0x309/0x430 [ 139.369370] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 139.374347] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 139.379561] RIP: 0033:0x455389 2018/04/22 09:01:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, 0x0) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:23 executing program 6: r0 = socket$unix(0x1, 0x0, 0x0) getsockname$unix(r0, &(0x7f0000000080)=@abs, &(0x7f0000000100)=0x6e) r1 = socket$netlink(0x10, 0x3, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) mmap(&(0x7f0000e42000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x15, &(0x7f0000000000)={0x0, &(0x7f0000000040)}, 0x10) 2018/04/22 09:01:23 executing program 1: fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) r0 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@generic, &(0x7f0000000000)=0x80, 0x800) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000100)={0x77359400}, 0xfffffffffffffec8) [ 139.382769] RSP: 002b:00007f2f42cedc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 139.390515] RAX: ffffffffffffffda RBX: 00007f2f42cee6d4 RCX: 0000000000455389 [ 139.397807] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 139.405106] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 139.412400] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 139.419700] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000014 [ 139.448862] FAULT_INJECTION: forcing a failure. [ 139.448862] name failslab, interval 1, probability 0, space 0, times 0 [ 139.460238] CPU: 0 PID: 9779 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 139.467118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.476505] Call Trace: [ 139.479155] dump_stack+0x185/0x1d0 [ 139.482831] should_fail+0x87b/0xab0 [ 139.486620] should_failslab+0x279/0x2a0 [ 139.490776] __kmalloc+0xc2/0x350 [ 139.494319] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 139.500381] ? crypto_dh_key_len+0x85/0xf0 [ 139.504700] ? __keyctl_dh_compute+0x58a/0x1ef0 [ 139.509453] __keyctl_dh_compute+0x58a/0x1ef0 [ 139.514035] ? kstrtouint_from_user+0x373/0x410 [ 139.518765] keyctl_dh_compute+0x22e/0x260 [ 139.523057] ? SyS_keyctl+0x76/0xa0 [ 139.526719] SYSC_keyctl+0xd31/0x1830 [ 139.530606] ? syscall_return_slowpath+0xe9/0x700 [ 139.535514] ? fput+0x25c/0x2e0 [ 139.538877] ? SYSC_write+0x2f0/0x360 [ 139.542763] SyS_keyctl+0x76/0xa0 [ 139.546306] do_syscall_64+0x309/0x430 [ 139.550252] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 139.555234] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 139.560455] RIP: 0033:0x455389 [ 139.563665] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 139.571417] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 139.578712] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 139.586097] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 139.593394] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 139.600692] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000006 2018/04/22 09:01:23 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:23 executing program 0: r0 = syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x800) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000040)=""/139) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x831, r1, 0x3ffffffffd) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000280)=0x7) recvfrom(r0, &(0x7f0000000140)=""/74, 0x4a, 0x40002021, &(0x7f00000001c0)=@rc={0x1f, {0x6f, 0x100000001, 0x4, 0x7, 0x7f, 0xfffffffffffeffff}, 0x1}, 0x80) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) bind$ipx(r0, &(0x7f0000000240)={0x4, 0x6, 0x5, "51c7b1c01526", 0x400}, 0x10) socket$nl_route(0x10, 0x3, 0x0) 2018/04/22 09:01:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f00000000c0)=""/153) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b218da5", 0x29}], 0x1) 2018/04/22 09:01:23 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) getresuid(&(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000000180)) r5 = pkey_alloc(0x0, 0x1) pkey_free(r5) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) r6 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r7 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r6, r7, r7}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:23 executing program 1: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)=0x5, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) capget(&(0x7f00000000c0)={0x200f1526, r1}, &(0x7f0000000100)={0x4, 0x6, 0x0, 0x7, 0x8, 0xeeb6}) 2018/04/22 09:01:23 executing program 7 (fault-call:5 fault-nth:21): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:23 executing program 4 (fault-call:5 fault-nth:7): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:23 executing program 6: mmap(&(0x7f0000600000/0x4000)=nil, 0x4000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000ae4000)={0xaa}) unshare(0x400) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101100, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000040)=""/4096) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000f8dfe0)={{&(0x7f00007c3000/0x3000)=nil, 0x3000}, 0x1}) [ 139.761723] netlink: 'syz-executor5': attribute type 6 has an invalid length. [ 139.783421] FAULT_INJECTION: forcing a failure. [ 139.783421] name failslab, interval 1, probability 0, space 0, times 0 [ 139.794851] CPU: 0 PID: 9808 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 139.801721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 139.811099] Call Trace: [ 139.813731] dump_stack+0x185/0x1d0 [ 139.817401] should_fail+0x87b/0xab0 [ 139.821174] should_failslab+0x279/0x2a0 [ 139.825293] __kmalloc+0xc2/0x350 [ 139.828842] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 139.834259] ? crypto_create_tfm+0x10a/0x640 [ 139.838708] ? crypto_alg_extsize+0x66/0xc0 [ 139.843110] crypto_create_tfm+0x10a/0x640 [ 139.847454] crypto_alloc_tfm+0x3a9/0x710 [ 139.851708] crypto_alloc_kpp+0x99/0xb0 [ 139.855788] __keyctl_dh_compute+0x90e/0x1ef0 2018/04/22 09:01:23 executing program 6: unshare(0x40600) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb2, 0x4, 0x7}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000000), &(0x7f00000000c0)}, 0x20) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x13, 0x0, 0x0, 0x0, 0x20000000, 0x0}, 0x2c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x10}) socketpair$inet_smc(0x2b, 0x1, 0x0, &(0x7f0000000040)) 2018/04/22 09:01:23 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000140)="238c08aaa59dad804550bbbeff8c644da0dd9ff770577a356c68e3baab02a8732ed55ee7dab5b8b6e04f4826949d4eebf9d05c158567817272ec730e127a182ba310796bbe7839c7a635d856f6315e8c36995e0bb5964908afe3b581ee501b65610c121f4f49cd98dace9ea8a68668a36f5b6863d94e5ae577677c5d5bef3d81643af7bb6d43badf6b685078e43dc5ab94b47b927b075bc873cef69d8163230e91284a11783ee0698a1d0eb5fc0af0ffb4565a4665723166b3a5e16c1855db19aa662131b9adb9d88ed35ce7c2b3ba39728c6ee9ef66fbe4e6d8f25b41d27245ccf96d", 0xe3, 0xfffffffffffffff8) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280)="fbc4d08b93cdd4d999340073e77ab09f2282059f5f0fccbddc7805c9ccbb45d9fc692df1e8e6d8e8db0491988610964b0941a8e116ed1a059240fab65ac9c456b047cd6e3a1882ef69b81b47d3f7ba7ae6cecbc9377d986f58508084b76f63663c336b15a99770acf971fb1f72a853d0ba25e787f5e99b1a773e94d777f373d5fc8415842ec5a7711c454575ec357dac792ae9bc5fafbed0c488bf40", 0x9c, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000100)={r0, r1}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000000)={&(0x7f0000a3dffa)={'sha384-avx\x00'}}) [ 139.860358] ? kstrtouint_from_user+0x373/0x410 [ 139.865098] keyctl_dh_compute+0x22e/0x260 [ 139.869384] ? SyS_keyctl+0x76/0xa0 [ 139.873042] SYSC_keyctl+0xd31/0x1830 [ 139.876935] ? syscall_return_slowpath+0xe9/0x700 [ 139.881842] ? fput+0x25c/0x2e0 [ 139.885208] ? SYSC_write+0x2f0/0x360 [ 139.889089] SyS_keyctl+0x76/0xa0 [ 139.892636] do_syscall_64+0x309/0x430 [ 139.896575] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 139.901639] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 139.906856] RIP: 0033:0x455389 2018/04/22 09:01:23 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000000)={0x0, 0xfff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={r1, 0x4, 0x2}, &(0x7f0000000100)=0x8) 2018/04/22 09:01:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f00000000c0)=""/153) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b218da5", 0x29}], 0x1) [ 139.910065] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 139.917808] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 139.925100] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 139.932400] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 139.939701] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 139.946989] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000007 [ 140.025692] netlink: 'syz-executor5': attribute type 6 has an invalid length. 2018/04/22 09:01:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:24 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x15, &(0x7f0000000040)="f1c17b46", 0x4) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000000c0), 0xffffff5c, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x8002, 0x0) sendmsg$rds(r4, &(0x7f0000001e40)={&(0x7f0000000280)={0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000940)=""/194, 0xc2}], 0x1, &(0x7f0000001dc0)=[@rdma_args={0x48, 0x114, 0x1, {{0x3, 0xfffffffffffff800}, {&(0x7f0000000a40)=""/96, 0x60}, &(0x7f0000001d40)=[{&(0x7f0000000ac0)=""/202, 0xca}, {&(0x7f0000000bc0)=""/228, 0xe4}, {&(0x7f0000000cc0)=""/4096, 0x1000}, {&(0x7f0000001cc0)=""/17, 0x11}, {&(0x7f0000001d00)=""/4, 0x4}], 0x5, 0x40, 0x9}}], 0x48, 0x4000000}, 0x1) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:24 executing program 1: r0 = dup(0xffffffffffffff9c) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f00000005c0)={0x0, 0x800, 0x6, 0x40, 0x2, 0x3}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="e7000000448c2e840872c3ba42c145394b3c8c3242af8caca7dbcd38870858b45d10e6aa972e7ac2e23ceff421573870993d4b7a96ff271be28f9251c42e63647f09ac67ee0408b77a23fe0e52c2cdabb3929b9d50cd601e9aa2c4c1582ed17e3a52ec8e2fbaf7704451f9c7d172c5370447c02fe5727d03e7faf63d607ef32ad65a4b2526f73800bc576f8472d066c7afe2631136c18e426c8423038c658513d8c8a02c4c6335503795d775c222066c4fdbe4ba0100882a680ba829b6d9c7ffe67b8974d26ea020320f602fd3713e1e7f33aa67db1739f882e422f3cc6eedf73492066a197f4563b946cf"], &(0x7f0000000400)=0xef) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000440)={r1, @in6={{0xa, 0x4e22, 0x5cab, @remote={0xfe, 0x80, [], 0xbb}, 0x2}}, 0x3, 0xff, 0x10000, 0x10001, 0x80}, 0x98) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f0000000080)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffff9c, 0x84, 0x6d, &(0x7f0000000600)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f0000000000)=0xda) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000001c0)={r2, 0x101, 0x8}, &(0x7f0000000200)=0x8) bind$pptp(r0, &(0x7f0000000580)={0x18, 0x2, {0x3, @broadcast=0xffffffff}}, 0x1e) getsockname$ipx(r0, &(0x7f0000000500), &(0x7f0000000540)=0x10) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r3, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:24 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x0, 0x4000) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000040)=0xffffffffffffffff, 0x4) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x4, 0xaca, 0x8}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000140)={r1, @in={{0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}}}, 0x84) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:24 executing program 6: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) getresuid(&(0x7f00000000c0), &(0x7f0000000140)=0x0, &(0x7f0000000180)) r5 = pkey_alloc(0x0, 0x1) pkey_free(r5) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) r6 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r7 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r6, r7, r7}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:24 executing program 4 (fault-call:5 fault-nth:8): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f00000000c0)=""/153) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b218da5", 0x29}], 0x1) [ 140.377585] netlink: 'syz-executor5': attribute type 6 has an invalid length. [ 140.381411] FAULT_INJECTION: forcing a failure. [ 140.381411] name failslab, interval 1, probability 0, space 0, times 0 [ 140.396367] CPU: 1 PID: 9855 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 140.403240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.412626] Call Trace: [ 140.415273] dump_stack+0x185/0x1d0 [ 140.418955] should_fail+0x87b/0xab0 [ 140.422729] should_failslab+0x279/0x2a0 [ 140.426882] __kmalloc+0xc2/0x350 [ 140.430385] ? mpi_alloc+0x58/0x290 [ 140.434092] mpi_alloc+0x58/0x290 [ 140.437645] mpi_read_raw_data+0x265/0xd60 [ 140.441931] dh_set_secret+0x215/0x620 [ 140.445924] __keyctl_dh_compute+0xcf9/0x1ef0 [ 140.450513] ? kstrtouint_from_user+0x373/0x410 [ 140.455236] ? dh_exit+0x30/0x30 [ 140.458663] keyctl_dh_compute+0x22e/0x260 [ 140.462953] ? SyS_keyctl+0x76/0xa0 [ 140.466609] SYSC_keyctl+0xd31/0x1830 [ 140.470514] ? syscall_return_slowpath+0xe9/0x700 [ 140.475427] ? fput+0x25c/0x2e0 [ 140.478793] ? SYSC_write+0x2f0/0x360 [ 140.482674] SyS_keyctl+0x76/0xa0 [ 140.486224] do_syscall_64+0x309/0x430 [ 140.490169] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 140.495150] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 140.500366] RIP: 0033:0x455389 [ 140.503574] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 140.511321] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 140.518611] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 140.525899] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 140.533895] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 140.541193] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000008 2018/04/22 09:01:24 executing program 7: socket$inet(0x2, 0xe, 0xfffffffffffffffe) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:24 executing program 6: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mremap(&(0x7f00009b9000/0x2000)=nil, 0x2000, 0x3000, 0x3, &(0x7f0000178000/0x3000)=nil) mbind(&(0x7f0000024000/0xc00000)=nil, 0xc00000, 0x8001, &(0x7f0000c28000)=0x800003f, 0x5, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xfffffffffffffff9, 0x4000) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x20, &(0x7f0000000140)={@dev, @multicast2, 0x0}, &(0x7f0000000180)=0xc) r2 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in6=@ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4e20, 0x9, 0x4e21, 0x101, 0xa, 0xa0, 0x20, 0x3a, r1, r2}, {0xffffffff, 0xcb, 0xfff, 0xffffffff80000001, 0x8, 0x33fe, 0x80}, {0x5, 0x8, 0x51f, 0x16a}, 0x6, 0x0, 0x0, 0x0, 0x2, 0x3}, {{@in6=@ipv4={[], [0xff, 0xff], @rand_addr=0x5}, 0x4d3, 0x32}, 0xa, @in, 0x0, 0x3, 0x0, 0x4, 0x7fff, 0x1, 0x4}}, 0xe8) 2018/04/22 09:01:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)="9825d7069009fe16f79f6b5906047eea335aa34710c4722a323a00a3559fe603e43066c120fccabe7422663c4512efdea43d0000c649d71c083b564d526f630c767a06f6cc278ea2d4983d0d677a4aa32a030e962dfcc53795fe8562c3c9361da290c431edc49fc35434") setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000)={0x3955, 0x9, 0x8, 0x0, 0x6}, 0x14) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) accept$inet6(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, @mcast2}, &(0x7f00000000c0)=0x1c) socket$can_bcm(0x1d, 0x2, 0x2) 2018/04/22 09:01:24 executing program 0: mmap(&(0x7f0000951000/0x1000)=nil, 0x1000, 0x0, 0x8000000000033, 0xffffffffffffffff, 0x4000000000000000) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:24 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x101000, 0x2a) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0xfffffffffffffffd}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={0x0, 0xffffffffffff223e}, &(0x7f0000000540)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000580)={0x0, 0x22, "1c8e302e7868964f1312c4ba56007302e2cc61584f4f025e87551af986fcdd370a10"}, &(0x7f0000000940)=0x2a) unshare(0x4000) sendmsg$inet_sctp(r5, &(0x7f0000000a40)={&(0x7f00000000c0)=@in6={0xa, 0x4e22, 0x4, @empty, 0x40}, 0x1c, &(0x7f0000000140)=[{&(0x7f0000000480)="ec95f3953910090220fb3d21e447492b95af921379377bddfbe4b2511b70062e6419fc2cca6b918b9c891df42347add2eb8a700c3a769dde510670685734333d6e8f65a611bdd9d61317f5d433179d59554f04ef5382cfe1aee8ffc3fcf9a2073d410bd3d7d72cb33d1e3b64e6e14896ec5c5799aa7e073cbd4ea9c51c51b9005aadd71dd1a28ac5e4d4cf0e365fbff24dad06c58fff416aa58f761b1d4507", 0x9f}, {&(0x7f0000000600)="95e2d27653feb0c523a0e3e5c1ea3e93236bccc3f17564f401aa87753b56075892660edf28472ef53c66e11dd605aee58eeb4f0bc8f5c15f6fda226ca1ec134579193cf4691fa54ab735d4ec29346bed8bac7325f60d88e491df19c8913c7b397964c49131524b72c66f3e981bc2163dda6bff563955151fee26dc3a4bd3ea1ee5d0520d63df8e977eadfbf3c41d049223d87377", 0x94}, {&(0x7f00000006c0)="2d5577113d08557ae3166bfe8d07447dc5939f6dd8b5c3201904784c5fc34eebb66cd81a591be0b78e9e3c8a90942faccbc3c9aaaafa1a3a998ce3c8b277524b4788333195eb0c38124dec6563b1f6912ce0be4e73a6935312bcd84e1d425172ed05d4cc739cdd7915ce12a91d1b10e907948c29a77d6250cb59b6d9f037c0319c68e962b31bc536af6678f786d32857fe8a4cb3f93d864826272e0c19019ddeaecf", 0xa2}, {&(0x7f0000000780)="e2813f13abbeebc16f0650d0a569bc9a63b35492c93706a098932b66c99a8a2bfe3652c3d12e5d4d5b09af4a59877748dc2bb79f4441fada3fbc5c7c375e57cc807f9c6d3a64b6bc03606a9468ab794ff77714d03175334eca5858f2dd08eb54d1b2de086026f6283b63521393768517bf31fd6206b7625f393537adc6e75ae85a9828620daef70e866fcc510bb1aafafea1650c4d3e304f04c80f0ca8b0761bc51a00499fb28810931d08dee7d1a528", 0xb0}, {&(0x7f0000000840)="99df239cbef89fd94fd5e2325127a6a7dad0c1a2227f60da1b288504faa8ff8b3a36ce64d202fc9feaf297ef934f25a0206a8e0d6489b1c864746ebba34d4895645c220cbd12a104da65154c3312d04bf786a3d3ff4cdebb8b62c2839f76e64140316158c5b0506e47bb7634dfd7b8a9baa2265e19d916eb91db2cec3a6e11c0219056f59a2a104d7f133e5a32ffbd1882bff7d7a809b967038a7274c438ea57854a52c84f06c8cb562cf3d7859cbb99642716aa8e70423378fd3c953dc040fbe64af6ecd36a4e3170dbf725559ee0506d799b801c26f16a8883208d", 0xdc}], 0x5, &(0x7f0000000980)=[@sndinfo={0x20, 0x84, 0x2, {0x3, 0x8200, 0x1, 0x7, r6}}, @sndrcv={0x30, 0x84, 0x1, {0x10001, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2, 0x300000, r7}}, @sndinfo={0x20, 0x84, 0x2, {0x80000000, 0x4, 0x0, 0x7, r8}}, @init={0x18, 0x84, 0x0, {0x998, 0x5, 0x4, 0x4}}], 0xc0, 0x50}, 0x44000) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:24 executing program 4 (fault-call:5 fault-nth:9): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x8000) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f00000000c0)=""/153) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b218da5", 0x29}], 0x1) [ 140.668797] netlink: 'syz-executor5': attribute type 6 has an invalid length. 2018/04/22 09:01:24 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, 0x0, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:24 executing program 6: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r3, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:24 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000), &(0x7f00000000c0)=0xc) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) [ 140.806333] FAULT_INJECTION: forcing a failure. [ 140.806333] name failslab, interval 1, probability 0, space 0, times 0 [ 140.817734] CPU: 1 PID: 9883 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 140.824619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 140.834010] Call Trace: [ 140.836655] dump_stack+0x185/0x1d0 [ 140.840334] should_fail+0x87b/0xab0 [ 140.844123] should_failslab+0x279/0x2a0 [ 140.848318] __kmalloc+0xc2/0x350 [ 140.851835] ? mpi_alloc+0xe3/0x290 [ 140.855549] mpi_alloc+0xe3/0x290 [ 140.859107] mpi_read_raw_data+0x265/0xd60 [ 140.863404] dh_set_secret+0x215/0x620 [ 140.867396] __keyctl_dh_compute+0xcf9/0x1ef0 [ 140.871996] ? kstrtouint_from_user+0x373/0x410 [ 140.876723] ? dh_exit+0x30/0x30 [ 140.880150] keyctl_dh_compute+0x22e/0x260 [ 140.884452] ? SyS_keyctl+0x76/0xa0 [ 140.888113] SYSC_keyctl+0xd31/0x1830 [ 140.892012] ? syscall_return_slowpath+0xe9/0x700 [ 140.896919] ? fput+0x25c/0x2e0 [ 140.900275] ? SYSC_write+0x2f0/0x360 [ 140.904152] SyS_keyctl+0x76/0xa0 [ 140.907691] do_syscall_64+0x309/0x430 [ 140.911629] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 140.916602] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 140.921816] RIP: 0033:0x455389 [ 140.925027] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 140.932774] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 140.940078] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 140.947366] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 2018/04/22 09:01:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0c002bbd7000fbdbdf251000000030000200080002004e2100001400010000000000000000000000000000000001080008000008000008000900030b93000800050000001400080006000000000000000000000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:24 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x101440, 0x82) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0x1, &(0x7f0000000140)=0x2) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000180)={0x7, 0xe0, 0x3, 0x5, 0x401, 0xfffffffffffffff8, 0x1000}, 0xc) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x8000) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b218da5", 0x29}], 0x1) 2018/04/22 09:01:24 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4b, 0x400000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'gre0\x00', {0x2, 0x4e21, @rand_addr=0x81}}) listen$netrom(r0, 0x8000) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) [ 140.954656] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 140.961951] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000009 [ 141.049337] netlink: 'syz-executor5': attribute type 6 has an invalid length. 2018/04/22 09:01:25 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) r1 = getpid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000000)) getdents(r0, &(0x7f0000fadf2e)=""/72, 0x48) fcntl$dupfd(r0, 0x402, 0xffffffffffffffff) 2018/04/22 09:01:25 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00', 0x0}) recvfrom$packet(r2, &(0x7f0000000300)=""/117, 0x75, 0x40010121, &(0x7f00000006c0)={0x11, 0xf7, r3, 0x1, 0x0, 0x6, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x10}}, 0x14) r4 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x2) setsockopt$packet_buf(r4, 0x107, 0xf, &(0x7f0000000140)="3458eed58137911efcc26afac204cbd5a3cc4875f10f00d0843f581df62aec8f07065bf32ba538f4662c7d60584a897a6b7e82693509e2fb7da2cb4015d334f113680711fa136d783a97fb414e943460ac66fb82f6aa58b37d633f4f9e", 0x5d) r5 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r1) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r5, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') write$cgroup_subtree(r0, &(0x7f0000000040)={[{0x2f, 'memory', 0x20}]}, 0x8) fgetxattr(r0, &(0x7f0000000000)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0x331) 2018/04/22 09:01:25 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000000040)=""/5, 0xfffffd70, &(0x7f0000000080)={&(0x7f0000a3dffa)={'sha256-ssse3\x00'}, 0x0, 0xfffffffffffffee6}) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x5) 2018/04/22 09:01:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b218da5", 0x29}], 0x1) 2018/04/22 09:01:25 executing program 4 (fault-call:5 fault-nth:10): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:25 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000140)="028dcb1ad5e6c830135e5a7ed901d3fe283b29e1dbfd594a6c8aa8da6f1af096c25558b6eed2666ec08eda774342a34dbeaf20f7cc61e8f501bc37cd285ac39b25a1681e2c30c4668f499ddbdd49d07ca6a53f6162d5b9bcd356b185591363c0e509b95a1b93d10b2b93f59f7adc773bbefab669d67a29", 0x77, r1) [ 141.289498] netlink: 'syz-executor5': attribute type 6 has an invalid length. [ 141.341682] FAULT_INJECTION: forcing a failure. [ 141.341682] name failslab, interval 1, probability 0, space 0, times 0 [ 141.353220] CPU: 1 PID: 9932 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 141.360096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.369481] Call Trace: [ 141.372124] dump_stack+0x185/0x1d0 [ 141.375818] should_fail+0x87b/0xab0 [ 141.379587] should_failslab+0x279/0x2a0 [ 141.383751] __kmalloc+0xc2/0x350 [ 141.387267] ? mpi_alloc+0x58/0x290 [ 141.390980] mpi_alloc+0x58/0x290 [ 141.394527] mpi_read_raw_data+0x265/0xd60 [ 141.398815] dh_set_secret+0x2c2/0x620 [ 141.402794] __keyctl_dh_compute+0xcf9/0x1ef0 [ 141.407372] ? kstrtouint_from_user+0x373/0x410 [ 141.412102] ? dh_exit+0x30/0x30 [ 141.415529] keyctl_dh_compute+0x22e/0x260 [ 141.419830] ? SyS_keyctl+0x76/0xa0 [ 141.423496] SYSC_keyctl+0xd31/0x1830 [ 141.427399] ? syscall_return_slowpath+0xe9/0x700 [ 141.432308] ? fput+0x25c/0x2e0 [ 141.435668] ? SYSC_write+0x2f0/0x360 [ 141.439546] SyS_keyctl+0x76/0xa0 [ 141.443089] do_syscall_64+0x309/0x430 [ 141.447026] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 141.452001] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 141.457218] RIP: 0033:0x455389 [ 141.460433] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 141.468178] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 141.475482] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 141.482783] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 2018/04/22 09:01:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mq_timedreceive(r5, &(0x7f0000000000)=""/52, 0x34, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r5, 0x28, 0x6, &(0x7f0000000140)={r6, r7/1000+10000}, 0x10) 2018/04/22 09:01:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:25 executing program 2 (fault-call:5 fault-nth:0): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:25 executing program 6: r0 = syz_open_dev$tun(&(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0xffffffffffffffff) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'ifb0\x00', 0x3b03}) syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x12001) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000000)) 2018/04/22 09:01:25 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000080)={'digest_null\x00'}}) accept4$packet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x14, 0x800) 2018/04/22 09:01:25 executing program 5: writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b218da5", 0x29}], 0x1) [ 141.490081] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 141.497370] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000a [ 141.607953] FAULT_INJECTION: forcing a failure. [ 141.607953] name failslab, interval 1, probability 0, space 0, times 0 [ 141.619329] CPU: 1 PID: 9948 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 141.626203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 141.635583] Call Trace: [ 141.638228] dump_stack+0x185/0x1d0 [ 141.641910] should_fail+0x87b/0xab0 [ 141.645687] should_failslab+0x279/0x2a0 [ 141.649814] __kmalloc_track_caller+0x208/0xcb0 [ 141.654580] ? strndup_user+0x134/0x1f0 [ 141.658604] memdup_user+0x7c/0x200 [ 141.662320] strndup_user+0x134/0x1f0 [ 141.666222] __keyctl_dh_compute+0x804/0x1ef0 [ 141.670810] ? kstrtouint_from_user+0x373/0x410 [ 141.675534] ? kmsan_set_origin+0x9e/0x160 [ 141.679832] keyctl_dh_compute+0x22e/0x260 [ 141.684132] ? SyS_keyctl+0x76/0xa0 [ 141.687802] SYSC_keyctl+0xd31/0x1830 [ 141.691691] ? syscall_return_slowpath+0xe9/0x700 [ 141.696597] ? fput+0x25c/0x2e0 [ 141.699955] ? SYSC_write+0x2f0/0x360 [ 141.703802] SyS_keyctl+0x76/0xa0 2018/04/22 09:01:25 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) r5 = getpgrp(0xffffffffffffffff) sched_getscheduler(r5) 2018/04/22 09:01:25 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x619f, 0x22142) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000080)={0x7, 0xd2, &(0x7f0000000180)="e83c341e1ed3499221f4ca095bced843609432ad0cfad1a35ed0556f84f63dc37151a4d1eb8c9fa6ef1d3f0e04467d4a5466c011c9b7d2eedfddfeadb2c0e841290a1403556c09633aef4ff09eee6211f9cbac4f7195360574520337f11b33d42758404455ca58b95bcca3d6953b14a0267ab7ec5dfc3776a1e93564a712f4cb97767b0dd8a2c2410d3976a6deb31b9943db569c9d758d4a261e7e01e0c69d0a58c77943e7450bc32994741ec857efbddb5dd9bba5d5503b79047d0a51a3c53bd23fd7f4ce041e412b681db46069d676ef86"}) setsockopt$inet_buf(r0, 0x0, 0x10, &(0x7f00000000c0)="18000000020001000000be744bff8c88360000110218000008ff0000000000400a006a8807aacb59db01061947b3550400000900a1e20059fc21e3e00000000000040100080b01000000b121ad147dd78a8810d2c85839193a17b222f5423f38ecaa008b00cf81000006000000000000001c00f800000000e9f57406aa010b0400264a64d2078a1864c84310abea04aa54da2955aee65d7299bb5d1200b7760053502e0a7c731dc4e94a1ee10000007f000000000000000000000000000034d2", 0xc0) 2018/04/22 09:01:25 executing program 4 (fault-call:5 fault-nth:11): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) [ 141.707290] do_syscall_64+0x309/0x430 [ 141.711220] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 141.716196] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 141.721405] RIP: 0033:0x455389 [ 141.724609] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 141.732354] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 141.739645] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 141.747027] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:25 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) r0 = accept4$ax25(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000040)=0x10, 0x80000) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/212, 0xd4}], 0x1) [ 141.754323] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 141.761618] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000000 2018/04/22 09:01:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000080)={0x80, {{0xa, 0x4e22, 0x8, @mcast1={0xff, 0x1, [], 0x1}, 0x3}}}, 0x88) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000000)) 2018/04/22 09:01:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r0) fcntl$setsig(r1, 0xa, 0x3d) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:25 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b218da5", 0x29}], 0x1) 2018/04/22 09:01:25 executing program 0: r0 = socket$inet_icmp(0x2, 0x2, 0x1) mmap(&(0x7f000006b000/0x3000)=nil, 0x3000, 0x0, 0x3f, r0, 0x0) r1 = getpid() ptrace$getregset(0x4204, r1, 0x200, &(0x7f0000000040)={&(0x7f0000000000)=""/7, 0x7}) set_tid_address(&(0x7f0000000080)) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:25 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x3, 0x800) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000300)={0x0, 0x4349}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000480)={r4, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0x1, 0x8001}, &(0x7f0000000540)=0x90) r6 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x201, 0x0) ioctl$EVIOCGLED(r7, 0x80404519, &(0x7f0000000180)=""/55) r8 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f0000000640)={r5, 0x7fffffff, 0x7fffffff}, 0x8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0)={0x101, 0x0, 0xfffffffffffffff7, 0x671, 0xfb03}, 0x14) keyctl$dh_compute(0x17, &(0x7f0000000100)={r6, r8, r8}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) ioctl$VT_RESIZEX(r7, 0x560a, &(0x7f0000000000)={0x5, 0x0, 0x7, 0x1}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000580)=0x0) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000600)=r9) 2018/04/22 09:01:26 executing program 6: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) r5 = getpgrp(0xffffffffffffffff) sched_getscheduler(r5) 2018/04/22 09:01:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000), 0x0) 2018/04/22 09:01:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000000)={0x7f, 0x401, 0x2, 0x0, 0x1, 0xc0}) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000001c0)={0x2, 0x4, 0x100000000, 0x1}, 0x6) times(&(0x7f0000000100)) [ 142.276892] FAULT_INJECTION: forcing a failure. [ 142.276892] name failslab, interval 1, probability 0, space 0, times 0 [ 142.288290] CPU: 1 PID: 9999 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 142.295161] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.304541] Call Trace: [ 142.307180] dump_stack+0x185/0x1d0 [ 142.310854] should_fail+0x87b/0xab0 [ 142.314621] should_failslab+0x279/0x2a0 [ 142.318788] __kmalloc+0xc2/0x350 [ 142.322296] ? mpi_alloc+0xe3/0x290 [ 142.325998] mpi_alloc+0xe3/0x290 [ 142.329563] mpi_read_raw_data+0x265/0xd60 [ 142.333856] dh_set_secret+0x2c2/0x620 [ 142.337852] __keyctl_dh_compute+0xcf9/0x1ef0 [ 142.342443] ? kstrtouint_from_user+0x373/0x410 [ 142.347164] ? dh_exit+0x30/0x30 [ 142.350592] keyctl_dh_compute+0x22e/0x260 [ 142.354885] ? SyS_keyctl+0x76/0xa0 [ 142.358548] SYSC_keyctl+0xd31/0x1830 [ 142.362451] ? syscall_return_slowpath+0xe9/0x700 [ 142.367363] ? fput+0x25c/0x2e0 [ 142.370737] ? SYSC_write+0x2f0/0x360 [ 142.374625] SyS_keyctl+0x76/0xa0 [ 142.378173] do_syscall_64+0x309/0x430 [ 142.382121] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 142.387100] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 142.392305] RIP: 0033:0x455389 [ 142.395490] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 142.403214] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 142.410515] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 142.417798] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 2018/04/22 09:01:26 executing program 2 (fault-call:5 fault-nth:1): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:26 executing program 6: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x3, 0x800) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffff9c, 0x84, 0x75, &(0x7f0000000300)={0x0, 0x4349}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000480)={r4, @in={{0x2, 0x4e24, @loopback=0x7f000001}}, 0x1, 0x8001}, &(0x7f0000000540)=0x90) r6 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r7 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x201, 0x0) ioctl$EVIOCGLED(r7, 0x80404519, &(0x7f0000000180)=""/55) r8 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r7, 0x84, 0x7c, &(0x7f0000000640)={r5, 0x7fffffff, 0x7fffffff}, 0x8) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0)={0x101, 0x0, 0xfffffffffffffff7, 0x671, 0xfb03}, 0x14) keyctl$dh_compute(0x17, &(0x7f0000000100)={r6, r8, r8}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) ioctl$VT_RESIZEX(r7, 0x560a, &(0x7f0000000000)={0x5, 0x0, 0x7, 0x1}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000580)=0x0) ioctl$TIOCSPGRP(r3, 0x5410, &(0x7f0000000600)=r9) 2018/04/22 09:01:26 executing program 4 (fault-call:5 fault-nth:12): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:26 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000500)='dns_resolver\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580)="553cbd717612da34e9f42396eb6f3e3289a840f3a888d5a609e7e9128e51f33cd8ac4e675bb367913846e5387599358765503f6cae4deeefffd65b0e0bdfe8b8a924cb27cc33ec8707ec6addee56f6217e62acaa1ec8f92ebe1f8a5c481d04fc63a345689a0e9acb2d96eb6240d54521877b2907a4469886e20c2169681f905ebfae74765396f7d41a9937ee76b59d9ac348fee66de9db25c1b0e0e63b624ac0c57cdd6b8334173701d41c6cef0407bdbad6c6457516b72f47da", 0xba, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140)="e77c38c77fa2dafdddf15b68ed013bff7a207363a4eb36ff5ab14058f9b2bc9b187eb224683560e4bc9f34734b832ae42357b0b7b925fc94301ff682e3b3cab54a16e21a78dbcc1252f61181967c1948d04b2fd0401d15e1d3e7156db36064c4046a367014bf7cdb358981c334b23db50d688ed6fb8bff78e7dd2ec39211fa87b38199e06ddd2b3c922f9ee86b40ba55ba9f94167b506a97d12b5d0234a804409ba9218993e0d8b6a5619383a096ac52e281794a5f55548a1ec5d64701a59edc4685c60b4c784676087b421807d30614ca30aa8dfc27f8d4ad1d328833324e6b0cd39d9f005a2113c6fcde84e1e1b693f752086405cda6", 0xfffffffffffffeec, r0) r2 = add_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280)="7a2217dd4e5429a1273379136d1a42dea30aed85d5d7ac2d84be6ac225059a0becabbdc095cd861b45b24e0f668e705ac179be2e392b98285caac2e49b6eae6e3f4138f96e9598f2c707280221172896ef5b4381de189d7806785b3df7636487396b9d2ded2b6de0af9dd9bff32334", 0x6f, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r1, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000000)={'digest_null\x00'}}) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vcs\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000b00)={0x40, 0x1f, 0x8, 'queue1\x00', 0xca}) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000640)=@security={'security\x00', 0xe, 0x4, 0x448, 0xffffffff, 0x288, 0x128, 0x288, 0xffffffff, 0xffffffff, 0x3b0, 0x3b0, 0x3b0, 0xffffffff, 0x4, &(0x7f0000000040), {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@inet=@dccp={0x30, 'dccp\x00', 0x0, {0x4e22, 0x4e20, 0x4e22, 0x4e22, 0xf, 0x2, 0x7fff, 0x9}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x2, 0xffffffffffffff7f, 0x400, 0x83ee, 0x2, 0x6], 0x1ff, 0x1f, 0x7}, {0x1, [0xa02a, 0x277eb00e, 0x6, 0x5, 0x1f, 0x9], 0xfffffffffffffffc, 0x4, 0x600}}}}, {{@ip={@remote={0xac, 0x14, 0x14, 0xbb}, @rand_addr=0x100000000, 0x0, 0xffffffff, 'ipddp0\x00', 'erspan0\x00', {0xff}, {}, 0x2f, 0x3, 0x1}, 0x0, 0x100, 0x160, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @common=@unspec=@limit={0x48, 'limit\x00', 0x0, {0xfffffffffffffffe, 0x3ff, 0x40, 0x5, 0x10001, 0x7, 0x1f}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x59, [0xffff, 0x1, 0x6, 0x10000, 0x1, 0x5], 0x800, 0x6, 0x900000000}, {0x8, [0x5a3, 0x6, 0x9, 0xfffffffffffff738, 0x1000, 0x5], 0x7, 0xfff}}}}, {{@ip={@loopback=0x7f000001, @loopback=0x7f000001, 0xff000000, 0xff000000, 'ip6gre0\x00', 'ip6gretap0\x00', {0xff}, {0xff}, 0x2, 0x2, 0x6}, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@addrtype={0x30, 'addrtype\x00', 0x0, {0x100, 0x80, 0x1}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 0x66ee, 0xf, [0x39, 0x32, 0x30, 0x5, 0xe, 0x2c, 0x3f, 0x31, 0x3e, 0x3c, 0x2e, 0x2a, 0x3d, 0x12, 0x3b, 0x22], 0x2, 0x8, 0xff00000000000000}}}], {{[], 0x0, 0x70, 0x98}, {0x28, '\x00', 0x0, 0xfffffffffffffffe}}}}, 0x34c) getsockopt$inet6_udp_int(r3, 0x11, 0x66, &(0x7f0000000080), &(0x7f0000000440)=0x4) ioctl$EVIOCGPROP(r3, 0x80404509, &(0x7f0000000340)=""/217) 2018/04/22 09:01:26 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000580), 0xfffffefd, r2) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:26 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x10011, r0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000080)=[{0x3, 0xe4}], 0x1) 2018/04/22 09:01:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000), 0x0) 2018/04/22 09:01:26 executing program 3: add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r0 = add_key(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000480)="1bc59d8ceb914f643df67a0a64f53e165a6085fcea6d502a80aeb407f65228d6fadac1d7ab1688099a9be83e31bc7ced129cb7042fe116d094aa370b2ace6d0a52d9219cc4022f7bfa697868ece521492ed61f9cec5164de264fd6a627bbdfe58e65785841153e0e7f9e0200f2ab0e229e850d63cfa3515c408bb1bb3c86a424158ffcdd448c90af30c383073a30c48cdb7dc1bfaaf2e81be499337b832170af4632bfac6fabf43e0c6d24aa6b089a3234594d6a6e9acf7173e8b1698684aa92f778fdd615958fd04d9d7bd231a6954b5ddc1f474ee9c0b1debf2db037", 0xdd, 0xfffffffffffffff8) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 142.425083] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 142.432354] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000b [ 142.535310] FAULT_INJECTION: forcing a failure. [ 142.535310] name failslab, interval 1, probability 0, space 0, times 0 [ 142.546672] CPU: 0 PID: 10017 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 142.553634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.563014] Call Trace: [ 142.565650] dump_stack+0x185/0x1d0 [ 142.569326] should_fail+0x87b/0xab0 [ 142.573090] should_failslab+0x279/0x2a0 [ 142.577197] __kmalloc+0xc2/0x350 [ 142.580740] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 142.586157] ? crypto_create_tfm+0x10a/0x640 [ 142.590610] ? crypto_alg_extsize+0x66/0xc0 [ 142.595023] crypto_create_tfm+0x10a/0x640 [ 142.599367] crypto_alloc_tfm+0x3a9/0x710 [ 142.603639] crypto_alloc_shash+0x99/0xb0 [ 142.607871] __keyctl_dh_compute+0x9c5/0x1ef0 [ 142.612458] ? kstrtouint_from_user+0x373/0x410 [ 142.617182] ? kmsan_set_origin+0x9e/0x160 [ 142.621482] keyctl_dh_compute+0x22e/0x260 [ 142.625780] ? SyS_keyctl+0x76/0xa0 [ 142.629448] SYSC_keyctl+0xd31/0x1830 [ 142.633364] ? syscall_return_slowpath+0xe9/0x700 [ 142.638282] ? fput+0x25c/0x2e0 [ 142.641734] ? SYSC_write+0x2f0/0x360 [ 142.645611] SyS_keyctl+0x76/0xa0 [ 142.649154] do_syscall_64+0x309/0x430 [ 142.653102] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 142.658080] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 142.663304] RIP: 0033:0x455389 [ 142.666520] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 142.674270] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 2018/04/22 09:01:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000), 0x0) 2018/04/22 09:01:26 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) add_key$keyring(&(0x7f0000000280)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r2) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000580)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000700)="93e5c160da147c88e580ee656fb459e9e57249ebcfd1029a2bf6ca85826e84353e8870249965d5090076eb2bd5e311da4e318d002c6bb9ae2e1c711ed7000000000000000000000000b58a34729076e20867132453c915241097ac567c86bcad733e1545addd0bc6d1c627595422dc3a7e2fa2402511d02c85653665c966c3dfbe5b96db087ea291e0c8e81b4a44ff8e687a6dc41e93af1b5e72ff6dc45c09aaa2492ebfade611806e46c8bec6de4c6f4a0581ff42d94a5a12718912d71ecdc2cb79d0eb94e219962549b265934406faba234a74ccbd5120cab108af7a7463b2aa9c79000000000000000000", 0xec, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:26 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f00000000c0)=0x1e) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000000)={0x7f, 0x401, 0x2, 0x0, 0x1, 0xc0}) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f00000001c0)={0x2, 0x4, 0x100000000, 0x1}, 0x6) times(&(0x7f0000000100)) [ 142.681574] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 142.688871] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 142.696176] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 142.703482] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000001 [ 142.710982] could not allocate digest TFM handle poly1305 [ 142.728649] FAULT_INJECTION: forcing a failure. [ 142.728649] name failslab, interval 1, probability 0, space 0, times 0 [ 142.739988] CPU: 0 PID: 10022 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 142.746948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 142.756333] Call Trace: [ 142.758977] dump_stack+0x185/0x1d0 [ 142.762654] should_fail+0x87b/0xab0 [ 142.766426] should_failslab+0x279/0x2a0 [ 142.770584] __kmalloc+0xc2/0x350 [ 142.774098] ? mpi_alloc+0x58/0x290 [ 142.777807] mpi_alloc+0x58/0x290 [ 142.781370] mpi_read_raw_data+0x265/0xd60 2018/04/22 09:01:26 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000480)="a545bcc580c3eb0745ed646408ba103dfc21f4cc9eb5b21526b202057f908471425904d0de10b7120a4ba3e1bd83ee8e16101f428e741a73a903073b4f978c3d7537acae5f53d53bb34cf209a8f8177505f8e874dc3bd9d14f6c63482d1db69fa459f40fa128e08f9f86d5d75d55f0b7620c1d7a42bfe568b6686693e3a3a4a9b4b90ad1cbb4b9d85597d305d085b6c5aa8151099645fc778b9da1ec189d12d8ab897dae8b325565021d7f2d5b63e7ad", 0xb0, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000000)={&(0x7f0000a3dffa)={'sha512\x00'}}) [ 142.785659] dh_set_secret+0x375/0x620 [ 142.789654] __keyctl_dh_compute+0xcf9/0x1ef0 [ 142.794234] ? kstrtouint_from_user+0x373/0x410 [ 142.798958] ? dh_exit+0x30/0x30 [ 142.802381] keyctl_dh_compute+0x22e/0x260 [ 142.806671] ? SyS_keyctl+0x76/0xa0 [ 142.810332] SYSC_keyctl+0xd31/0x1830 [ 142.814234] ? syscall_return_slowpath+0xe9/0x700 [ 142.819150] ? fput+0x25c/0x2e0 [ 142.822514] ? SYSC_write+0x2f0/0x360 [ 142.826379] SyS_keyctl+0x76/0xa0 [ 142.829919] do_syscall_64+0x309/0x430 2018/04/22 09:01:26 executing program 6: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) mq_timedreceive(r5, &(0x7f0000000000)=""/52, 0x34, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r5, 0x28, 0x6, &(0x7f0000000140)={r6, r7/1000+10000}, 0x10) [ 142.833864] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 142.838841] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 142.844055] RIP: 0033:0x455389 [ 142.847261] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 142.855012] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 142.862310] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 142.869629] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 142.876926] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 2018/04/22 09:01:26 executing program 1: socketpair(0x3, 0x3, 0xc8b, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f00000000c0)=0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fremovexattr(r1, &(0x7f0000000000)=@random={'security.', 'security.evm\x00'}) fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000300)={0x4, {{0x2, 0x4e21, @broadcast=0xffffffff}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x20}}}}, 0x108) [ 142.884226] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000c 2018/04/22 09:01:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1) 2018/04/22 09:01:27 executing program 2 (fault-call:5 fault-nth:2): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:27 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) sendto$inet(r0, &(0x7f00000000c0), 0x0, 0x9800, &(0x7f0000653ff0)={0x2, 0x4e20}, 0x10) setsockopt$inet_int(r0, 0x0, 0xb, &(0x7f0000000000)=0xe8, 0x4) sendmmsg(r0, &(0x7f0000001b40)=[{{&(0x7f00000002c0)=@nl=@unspec, 0xc, &(0x7f0000000400), 0x1e1, &(0x7f0000000440)}}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000500), 0xfea8}], 0x9d, &(0x7f0000000200), 0x15d}}], 0x2, 0x8000) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000440)="01", 0x1, r1) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:27 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) fstat(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000780)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuseblk_mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x3001, r2, r3, 0x800, 0x0, 0x20000) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r5 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r4) r6 = syz_open_dev$vcsa(&(0x7f0000000480)='/dev/vcsa#\x00', 0x6, 0x20000) ioctl$VHOST_SET_VRING_ADDR(r6, 0x4028af11, &(0x7f0000000740)={0x3, 0x0, &(0x7f00000004c0)=""/194, &(0x7f0000000600)=""/201, &(0x7f0000000700)=""/62, 0xf000}) r7 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r5, r7, r7}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:27 executing program 0: r0 = socket$inet_icmp(0x2, 0x2, 0x1) write(r0, &(0x7f0000000000)="2394c4c3813eff6b7983ec9966e23e52ae5ff60ffab1e077f66a6056a8c05bc7527cfb6c8fbc5a2ee7a5b496661882d6ba42d3e15bc902582751715086aaee8a7f040791cbeac08317b64b24f7609d8d470fb33005fca2f66545052616e8036fbba60967ad6fefd975a71431be7369e2128f5e450778b325083e22ac8b3e353aaa2d6a7ec6ae6f4574bcc4f191be7cbf5c8211be24a34522d2f34cbfd198fc4f94aa5fdad80cbfb7683863d37d708a", 0xaf) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:27 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) 2018/04/22 09:01:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1) 2018/04/22 09:01:27 executing program 4 (fault-call:5 fault-nth:13): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) fgetxattr(r0, &(0x7f00000004c0)=@known='com.apple.FinderInfo\x00', &(0x7f0000000300)=""/232, 0xff78) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) getsockname$ax25(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={0x0, @dev}, &(0x7f0000000100)=0xc) r2 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x6, 0x0) sendmsg$nl_route(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@getlink={0x34, 0x12, 0x430, 0x70bd25, 0x7, {0x0, 0x0, 0x0, r1, 0x401, 0x2}, [@IFLA_NET_NS_FD={0x8, 0x1c, r0}, @IFLA_PHYS_PORT_ID={0xc, 0x22, "7b6f95ab1d"}]}, 0x34}, 0x1}, 0x20000000) bind$packet(r0, &(0x7f0000000140)={0x11, 0xff, r1, 0x1, 0x7ff, 0x6, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000600)=0x2, 0x4) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000400)) [ 143.403907] FAULT_INJECTION: forcing a failure. [ 143.403907] name failslab, interval 1, probability 0, space 0, times 0 [ 143.415442] CPU: 0 PID: 10069 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 143.422416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.431808] Call Trace: [ 143.434461] dump_stack+0x185/0x1d0 [ 143.438149] should_fail+0x87b/0xab0 [ 143.441929] should_failslab+0x279/0x2a0 [ 143.446121] __kmalloc+0xc2/0x350 [ 143.446211] ? __keyctl_dh_compute+0xb61/0x1ef0 2018/04/22 09:01:27 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1) [ 143.446285] __keyctl_dh_compute+0xb61/0x1ef0 2018/04/22 09:01:27 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000140)=0x9, &(0x7f00000001c0)=0x4) r2 = getuid() syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0x6, 0x400000) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000080)={0x5, 0x9991, r1, 0x3, r2, 0xef, 0x800, 0x2f4}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x200000, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:27 executing program 4 (fault-call:5 fault-nth:14): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) [ 143.446366] ? kstrtouint_from_user+0x373/0x410 2018/04/22 09:01:27 executing program 0: mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x5011, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000001c0)={&(0x7f0000000000)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000080)=""/109, 0x6d}], 0x1, &(0x7f0000000180)=""/30, 0x1e, 0x6}, 0x2000) getsockopt$inet_udp_int(r0, 0x11, 0x65, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@rand_addr}}, &(0x7f00000003c0)=0xe8) ioctl$sock_netrom_SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000440)) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000400)={r1, 0x1, 0x6, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff]}, 0x10) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000280)) [ 143.446428] keyctl_dh_compute+0x22e/0x260 [ 143.446478] ? SyS_keyctl+0x76/0xa0 [ 143.446507] SYSC_keyctl+0xd31/0x1830 [ 143.446594] ? syscall_return_slowpath+0xe9/0x700 [ 143.446649] ? fput+0x25c/0x2e0 [ 143.446719] ? SYSC_write+0x2f0/0x360 [ 143.446785] SyS_keyctl+0x76/0xa0 [ 143.446858] do_syscall_64+0x309/0x430 [ 143.446902] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 143.446942] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 143.446966] RIP: 0033:0x455389 [ 143.446983] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 143.447017] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 143.447036] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 143.447055] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 143.447072] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 143.447090] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000002 [ 143.456455] FAULT_INJECTION: forcing a failure. [ 143.456455] name failslab, interval 1, probability 0, space 0, times 0 [ 143.456490] CPU: 0 PID: 10074 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 143.456506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.456520] Call Trace: [ 143.456568] dump_stack+0x185/0x1d0 [ 143.456609] should_fail+0x87b/0xab0 [ 143.456654] should_failslab+0x279/0x2a0 [ 143.456743] __kmalloc+0xc2/0x350 [ 143.456775] ? mpi_alloc+0xe3/0x290 [ 143.456808] mpi_alloc+0xe3/0x290 [ 143.456847] mpi_read_raw_data+0x265/0xd60 [ 143.456897] dh_set_secret+0x375/0x620 [ 143.456990] __keyctl_dh_compute+0xcf9/0x1ef0 [ 143.457076] ? kstrtouint_from_user+0x373/0x410 [ 143.457119] ? dh_exit+0x30/0x30 [ 143.457165] keyctl_dh_compute+0x22e/0x260 [ 143.457213] ? SyS_keyctl+0x76/0xa0 [ 143.457240] SYSC_keyctl+0xd31/0x1830 [ 143.457335] ? syscall_return_slowpath+0xe9/0x700 [ 143.457394] ? fput+0x25c/0x2e0 [ 143.457467] ? SYSC_write+0x2f0/0x360 [ 143.457537] SyS_keyctl+0x76/0xa0 [ 143.457616] do_syscall_64+0x309/0x430 [ 143.457663] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 143.457701] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 143.457724] RIP: 0033:0x455389 [ 143.457741] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 143.457774] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 143.457792] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 143.457810] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 143.457827] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 143.457845] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000d [ 143.622916] FAULT_INJECTION: forcing a failure. [ 143.622916] name failslab, interval 1, probability 0, space 0, times 0 [ 143.622956] CPU: 1 PID: 10091 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 143.622970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 143.622983] Call Trace: [ 143.623031] dump_stack+0x185/0x1d0 [ 143.623073] should_fail+0x87b/0xab0 [ 143.623120] should_failslab+0x279/0x2a0 [ 143.623167] __kmalloc+0xc2/0x350 [ 143.623256] ? __keyctl_dh_compute+0x1253/0x1ef0 [ 143.623320] ? __keyctl_dh_compute+0x1033/0x1ef0 [ 143.623386] __keyctl_dh_compute+0x1253/0x1ef0 [ 143.623464] ? kstrtouint_from_user+0x373/0x410 [ 143.623526] keyctl_dh_compute+0x22e/0x260 [ 143.623575] ? SyS_keyctl+0x76/0xa0 [ 143.623603] SYSC_keyctl+0xd31/0x1830 [ 143.623689] ? syscall_return_slowpath+0xe9/0x700 [ 143.623743] ? fput+0x25c/0x2e0 [ 143.623826] ? SYSC_write+0x2f0/0x360 [ 143.623893] SyS_keyctl+0x76/0xa0 [ 143.623964] do_syscall_64+0x309/0x430 [ 143.624009] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 143.624050] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 143.624074] RIP: 0033:0x455389 2018/04/22 09:01:28 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x2, 0x32, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$inet6(r0, &(0x7f0000000140)=""/225, 0xe1, 0x40002020, 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) keyctl$assume_authority(0x10, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:28 executing program 4 (fault-call:5 fault-nth:15): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:28 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) 2018/04/22 09:01:28 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x582, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000340)={0x1d5, 0x401, 0x0, 0x994, 0x1, 0x4, 0x2, 0x883, 0x200, 0x81}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000000)='net/udplite\x00') fgetxattr(r2, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) getpgrp(r1) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f0000000180)={@hci={0x1f, r3, 0x1}, {&(0x7f0000000100)=""/61, 0x3d}, &(0x7f0000000140), 0x20}, 0xa0) socket$inet_dccp(0x2, 0x6, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) 2018/04/22 09:01:28 executing program 2 (fault-call:5 fault-nth:3): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da00040200000000", 0x15}], 0x1) 2018/04/22 09:01:28 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000000000)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x101000, 0x0) ioctl$TIOCEXCL(r5, 0x540c) [ 143.624089] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 143.624121] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 143.624139] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 143.624157] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 143.624176] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 143.624193] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000e [ 144.250571] FAULT_INJECTION: forcing a failure. [ 144.250571] name failslab, interval 1, probability 0, space 0, times 0 [ 144.262017] CPU: 0 PID: 10106 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 144.268981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.278370] Call Trace: [ 144.281019] dump_stack+0x185/0x1d0 [ 144.284717] should_fail+0x87b/0xab0 [ 144.288495] should_failslab+0x279/0x2a0 [ 144.292618] __kmalloc+0xc2/0x350 [ 144.296174] ? __keyctl_dh_compute+0x133a/0x1ef0 2018/04/22 09:01:28 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) [ 144.301020] __keyctl_dh_compute+0x133a/0x1ef0 [ 144.305685] ? kstrtouint_from_user+0x373/0x410 [ 144.310432] keyctl_dh_compute+0x22e/0x260 [ 144.315080] ? SyS_keyctl+0x76/0xa0 [ 144.318740] SYSC_keyctl+0xd31/0x1830 [ 144.322633] ? syscall_return_slowpath+0xe9/0x700 [ 144.327540] ? fput+0x25c/0x2e0 [ 144.330908] ? SYSC_write+0x2f0/0x360 [ 144.334788] SyS_keyctl+0x76/0xa0 [ 144.338331] do_syscall_64+0x309/0x430 [ 144.342277] ? keyctl_restrict_keyring+0x4e0/0x4e0 2018/04/22 09:01:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da00040200000000", 0x15}], 0x1) [ 144.347262] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 144.352485] RIP: 0033:0x455389 [ 144.355693] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 144.363440] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 144.370733] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 144.378029] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 144.385328] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 144.392623] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000f [ 144.417079] FAULT_INJECTION: forcing a failure. [ 144.417079] name failslab, interval 1, probability 0, space 0, times 0 [ 144.428452] CPU: 1 PID: 10114 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 144.435409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.444808] Call Trace: [ 144.447449] dump_stack+0x185/0x1d0 [ 144.451131] should_fail+0x87b/0xab0 [ 144.454906] should_failslab+0x279/0x2a0 [ 144.459074] __kmalloc_track_caller+0x208/0xcb0 [ 144.463813] ? dh_data_from_key+0x272/0x3e0 [ 144.468178] ? rcu_all_qs+0x32/0x1f0 [ 144.471948] kmemdup+0x95/0x140 [ 144.475293] dh_data_from_key+0x272/0x3e0 [ 144.479540] __keyctl_dh_compute+0x3cb/0x1ef0 [ 144.484129] ? kstrtouint_from_user+0x373/0x410 [ 144.488877] keyctl_dh_compute+0x22e/0x260 [ 144.493174] ? SyS_keyctl+0x76/0xa0 [ 144.496834] SYSC_keyctl+0xd31/0x1830 [ 144.500733] ? syscall_return_slowpath+0xe9/0x700 [ 144.505641] ? fput+0x25c/0x2e0 [ 144.509025] ? SYSC_write+0x2f0/0x360 [ 144.512900] SyS_keyctl+0x76/0xa0 [ 144.516437] do_syscall_64+0x309/0x430 [ 144.520385] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 144.525367] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 144.530583] RIP: 0033:0x455389 [ 144.533795] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 144.541551] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 144.548855] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 144.556585] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:28 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x1) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) r0 = request_key(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000001c0)='\x00', 0xfffffffffffffffe) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000080)="f4ce9be3fbb38a8f187191f5fef38e6d3c2108a516e0803aa18b24348c3cc846c741d540728e3e9c10689e1af3e6a5a4b4d7a126800c0086cbedc86f7b77112ba6f5cee7e35d119e", 0x48, r0) 2018/04/22 09:01:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200000, 0x0) ioctl$PPPIOCGCHAN(r3, 0x80047437, &(0x7f00000000c0)) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r6 = getpgid(0xffffffffffffffff) rt_sigqueueinfo(r6, 0x2, &(0x7f0000000140)={0x2b, 0x8, 0x2d31, 0x80}) 2018/04/22 09:01:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da00040200000000", 0x15}], 0x1) 2018/04/22 09:01:28 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000340)='/dev/vga_arbiter\x00', r0) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x10200, 0x0) ioctl$KDGETMODE(r2, 0x4b3b, &(0x7f00000000c0)) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000480)={'security\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) remap_file_pages(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000008, 0x5, 0x20000) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r3) [ 144.563876] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 144.571170] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000003 2018/04/22 09:01:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006", 0x1f}], 0x1) 2018/04/22 09:01:28 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) 2018/04/22 09:01:28 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000300)={r0, r0, 0x1, 0x400, &(0x7f0000000080)="bcc2552a2f8656b680f636475743084e5cfc2b7de2b01f983aa06094c026dfb095f6aeb789d871983be456c117b08cc1f823295a3ab1639471cb51dbadb232154143abcc7afcb5f8bc9dbbf119200285a4eba35154db9abd9d1e1275479d46db1840fd263d9f3ffc9ccebe2d5cb7941c67aa7cae06c03d6a6d7091ffd9da8d17f938136a68f9bc6b11f5682f077f13aef8d4bec11f815099005a36ce80cf", 0xa8, 0x2, 0x0, 0x9c18, 0x5, 0x4, 0x6fe, "c02de07775e7b3b2fae8a6f494b2d9c1c971fa9bc9779465810c6bae48170a3c54cc6a6a9d3f5f9b7a105b12c362e75a6d251ca7bd6d4aeeb4a2458ac06e5603df646f9af3a13268f5e02a6c66d82709ea0083306898842cc1d7cad31c31ca65faaa0416ddbcf1e6c2e1490fab43b0d99986f8fe79fa8f6116ce3522f2b7cce83fe7e389e2d470d13047eea0bfb6a50f8a6c21578587f6d5af7c5d34f9c7b37904e605ff7e49debbc5117d26974298f4bd8c424d80ea5a34d20a6a"}) 2018/04/22 09:01:28 executing program 2 (fault-call:5 fault-nth:4): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:28 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000140)={0x0, {{0xa, 0x4e21, 0x9, @loopback={0x0, 0x1}, 0xb5d9}}, 0x0, 0x4, [{{0xa, 0x4e24, 0x7, @mcast2={0xff, 0x2, [], 0x1}, 0x6}}, {{0xa, 0x4e23, 0x5c, @remote={0xfe, 0x80, [], 0xbb}, 0x5}}, {{0xa, 0x4e20, 0xff, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}, 0xed3f}}, {{0xa, 0x4e24, 0x505, @ipv4={[], [0xff, 0xff], @local={0xac, 0x14, 0x14, 0xaa}}, 0x10001}}]}, 0x290) mknod(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:28 executing program 4 (fault-call:5 fault-nth:16): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:28 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) socketpair(0x0, 0x80000, 0xc2, &(0x7f0000000300)={0xffffffffffffffff}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000340), &(0x7f0000000480)=0x4) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) keyctl$dh_compute(0x17, &(0x7f0000000000)={r4, r4, r4}, &(0x7f0000000140)=""/80, 0x50, &(0x7f0000000280)={&(0x7f00000000c0)={'sha256-ssse3\x00'}, &(0x7f0000000600)="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", 0x1000}) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x8}, 0x10) readahead(r6, 0x5, 0x3) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:28 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000480)="39be2c064942e053590e478ee306f8d88dcb13f875f16c92802b6384d42beb88b878e438b6599044b9f4e1e3fcfb89885447760bc76392b92f2bb41a00020f1738a14f6fa851ec04a00a8b62e76ea7249b2545b4f0a8224a17d55136dce282647ceb0b946322a3695a9a5504a308c3b60dce77c0fe6c89b5d0a22de7a97722c618ad90ddae758e95d5a3", 0x8bc84cf41d0eae73, 0x0) r2 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 144.916535] FAULT_INJECTION: forcing a failure. [ 144.916535] name failslab, interval 1, probability 0, space 0, times 0 [ 144.927974] CPU: 1 PID: 10160 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 144.934937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 144.944314] Call Trace: [ 144.946951] dump_stack+0x185/0x1d0 [ 144.950630] should_fail+0x87b/0xab0 [ 144.954404] should_failslab+0x279/0x2a0 [ 144.958562] __kmalloc_track_caller+0x208/0xcb0 [ 144.963294] ? dh_data_from_key+0x272/0x3e0 [ 144.967648] ? rcu_all_qs+0x32/0x1f0 [ 144.971407] kmemdup+0x95/0x140 [ 144.974745] dh_data_from_key+0x272/0x3e0 [ 144.979003] __keyctl_dh_compute+0x453/0x1ef0 [ 144.983592] ? kstrtouint_from_user+0x373/0x410 [ 144.988352] keyctl_dh_compute+0x22e/0x260 [ 144.992644] ? SyS_keyctl+0x76/0xa0 [ 144.996304] SYSC_keyctl+0xd31/0x1830 [ 145.000208] ? syscall_return_slowpath+0xe9/0x700 [ 145.005119] ? fput+0x25c/0x2e0 [ 145.008487] ? SYSC_write+0x2f0/0x360 [ 145.012369] SyS_keyctl+0x76/0xa0 [ 145.015916] do_syscall_64+0x309/0x430 [ 145.019854] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 145.024838] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 145.030053] RIP: 0033:0x455389 [ 145.033272] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 145.041020] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 145.048316] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 145.055612] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:28 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006", 0x1f}], 0x1) 2018/04/22 09:01:29 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x12002, 0x0) socketpair(0x7, 0x806, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)=r1) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) ioctl$int_out(r0, 0x2, &(0x7f0000000000)) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x5, 0x0) 2018/04/22 09:01:29 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) [ 145.062914] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 145.070229] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000004 [ 145.102403] FAULT_INJECTION: forcing a failure. [ 145.102403] name failslab, interval 1, probability 0, space 0, times 0 [ 145.113847] CPU: 0 PID: 10173 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 145.120813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.130198] Call Trace: [ 145.132847] dump_stack+0x185/0x1d0 [ 145.136531] should_fail+0x87b/0xab0 [ 145.140352] should_failslab+0x279/0x2a0 [ 145.144477] __kmalloc+0xc2/0x350 [ 145.147975] ? mpi_alloc+0x58/0x290 [ 145.151648] mpi_alloc+0x58/0x290 [ 145.155141] ? dh_compute_value+0x3f/0x5f0 [ 145.159418] dh_compute_value+0x8b/0x5f0 [ 145.163572] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 145.169071] ? dh_set_secret+0x620/0x620 [ 145.173173] ? dh_set_secret+0x620/0x620 [ 145.177319] __keyctl_dh_compute+0x158a/0x1ef0 [ 145.181987] keyctl_dh_compute+0x22e/0x260 [ 145.186302] ? SyS_keyctl+0x76/0xa0 [ 145.189966] SYSC_keyctl+0xd31/0x1830 [ 145.193869] ? syscall_return_slowpath+0xe9/0x700 [ 145.198779] ? fput+0x25c/0x2e0 [ 145.202144] ? SYSC_write+0x2f0/0x360 [ 145.206026] SyS_keyctl+0x76/0xa0 [ 145.209569] do_syscall_64+0x309/0x430 [ 145.213518] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 145.218582] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 145.223793] RIP: 0033:0x455389 [ 145.227002] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 145.234756] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 145.242057] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 145.249353] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 145.256652] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 2018/04/22 09:01:29 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x84802) setsockopt$inet6_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x34ad563c, 0x3ff, 0x8, "50de198f445c31f955dcae04191d5129f470385ffb207628048531ed674829f678004c59c51a0345ec0ecb539e384644bf5aa15c97d9ad004ea2d2efc3be4101df8fc84caa38ecd3b39c3433be0f94c3"}, 0xd8) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000000140)={{0x4, @rand_addr=0x4, 0x4e21, 0x3, 'lblcr\x00', 0x10, 0x8, 0x6e}, {@local={0xac, 0x14, 0x14, 0xaa}, 0x4e24, 0x10000, 0x800, 0x40, 0xffffffff}}, 0x44) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000600)="152abeb8b3fdd2d9230294dcc055b90de4cfa0512f7d9d8adb395ed29e882fca496c06f09bb7de6d4d3d5439ed530d9d6ec8568a863684de7f879496186a3d25bcda858a552de9b18fb39becd8c2548d03ae6024f081c00c671b5ba2e7dcb0005e4a2573de9e690aaee83aa5678af831116056e25b76d1e5875b86439522ba3b5c6a9fb042261f0b2ad5f86f91a3123a0f5f031d2d5f01b2e063e4d0943c73436179a2e919765b12597075303195f4d823", 0xb1, r2) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000300)={0x0, 0x3}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000040)={r1, 0xfd, "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"}, &(0x7f0000000280)=0x105) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f00000002c0)={r2, 0x400}, 0x8) fgetxattr(r0, &(0x7f0000000000)=@known='system.advise\x00', &(0x7f00000001c0)=""/166, 0x9a) 2018/04/22 09:01:29 executing program 2 (fault-call:5 fault-nth:5): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 145.263954] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000010 [ 145.403883] FAULT_INJECTION: forcing a failure. [ 145.403883] name failslab, interval 1, probability 0, space 0, times 0 [ 145.415336] CPU: 0 PID: 10191 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 145.422304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.431693] Call Trace: [ 145.434340] dump_stack+0x185/0x1d0 [ 145.438024] should_fail+0x87b/0xab0 [ 145.441800] should_failslab+0x279/0x2a0 [ 145.445971] __kmalloc_track_caller+0x208/0xcb0 [ 145.450723] ? dh_data_from_key+0x272/0x3e0 [ 145.455093] ? rcu_all_qs+0x32/0x1f0 [ 145.458866] kmemdup+0x95/0x140 [ 145.462209] dh_data_from_key+0x272/0x3e0 [ 145.466459] __keyctl_dh_compute+0x4e2/0x1ef0 [ 145.471047] ? kstrtouint_from_user+0x373/0x410 [ 145.475793] keyctl_dh_compute+0x22e/0x260 [ 145.480090] ? SyS_keyctl+0x76/0xa0 [ 145.483766] SYSC_keyctl+0xd31/0x1830 [ 145.487664] ? syscall_return_slowpath+0xe9/0x700 [ 145.492577] ? fput+0x25c/0x2e0 [ 145.495942] ? SYSC_write+0x2f0/0x360 [ 145.499829] SyS_keyctl+0x76/0xa0 [ 145.503384] do_syscall_64+0x309/0x430 [ 145.507335] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 145.512317] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 145.517532] RIP: 0033:0x455389 [ 145.520744] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 145.528494] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 145.535793] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 145.543092] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 145.550393] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 145.557691] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000005 2018/04/22 09:01:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r4, r3}, &(0x7f00000000c0)=""/5, 0x5, &(0x7f0000000300)={&(0x7f0000000340)={'poly1305\x00'}, 0x0, 0x3ce}) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x10200, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000140)=[@in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}, @in={0x2, 0x4e20, @broadcast=0xffffffff}, @in6={0xa, 0x4e23, 0x8, @mcast1={0xff, 0x1, [], 0x1}, 0x20}, @in={0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}, @in={0x2, 0x4e24}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}], 0x6c) 2018/04/22 09:01:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006", 0x1f}], 0x1) 2018/04/22 09:01:29 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000440)="97", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x20280) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r5, 0x800442d3, &(0x7f0000000140)={0x100000000, 0x0, 0x4b, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xc}, 'bond0\x00'}) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:29 executing program 4 (fault-call:5 fault-nth:17): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:29 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) 2018/04/22 09:01:29 executing program 1: socketpair(0x12, 0xf, 0xae6, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000001c0)={0x0, 0xa203}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={r3, 0x2c, &(0x7f0000000240)=[@in6={0xa, 0x4e24, 0x54062709, @loopback={0x0, 0x1}, 0x6f}, @in={0x2, 0x4e20, @remote={0xac, 0x14, 0x14, 0xbb}}]}, &(0x7f00000002c0)=0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)) fgetxattr(r2, &(0x7f0000000000)=@known='com.apple.system.Security\x00', &(0x7f0000000080)=""/166, 0xa6) r4 = inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x20000000) inotify_rm_watch(r2, r4) 2018/04/22 09:01:29 executing program 2 (fault-call:5 fault-nth:6): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:29 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1, 0x404000) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x22010, r0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) [ 145.690925] FAULT_INJECTION: forcing a failure. [ 145.690925] name failslab, interval 1, probability 0, space 0, times 0 [ 145.702411] CPU: 1 PID: 10217 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 145.709381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.718766] Call Trace: [ 145.721505] dump_stack+0x185/0x1d0 [ 145.725189] should_fail+0x87b/0xab0 [ 145.729007] should_failslab+0x279/0x2a0 [ 145.733174] __kmalloc+0xc2/0x350 [ 145.736724] ? dh_compute_value+0x347/0x5f0 2018/04/22 09:01:29 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000)={0x4, 0x1ac00000000, 0x8, 0xb51}, 0x10) 2018/04/22 09:01:29 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e", 0x24}], 0x1) [ 145.741087] ? mpi_alloc_limb_space+0x6f/0xb0 [ 145.745630] mpi_alloc_limb_space+0x6f/0xb0 [ 145.750006] mpi_powm+0x233/0x56f0 [ 145.753628] ? __msan_poison_alloca+0x15c/0x1d0 [ 145.758378] ? trace_kmalloc+0xa3/0x2b0 [ 145.762391] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 145.767804] ? kmsan_set_origin+0x9e/0x160 [ 145.772097] ? mpi_alloc+0x1ad/0x290 [ 145.775865] dh_compute_value+0x347/0x5f0 [ 145.780112] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 145.785649] ? dh_set_secret+0x620/0x620 [ 145.789804] __keyctl_dh_compute+0x158a/0x1ef0 [ 145.794482] keyctl_dh_compute+0x22e/0x260 [ 145.798790] ? SyS_keyctl+0x76/0xa0 [ 145.802459] SYSC_keyctl+0xd31/0x1830 [ 145.806364] ? syscall_return_slowpath+0xe9/0x700 [ 145.811275] ? fput+0x25c/0x2e0 [ 145.814641] ? SYSC_write+0x2f0/0x360 [ 145.818523] SyS_keyctl+0x76/0xa0 [ 145.822071] do_syscall_64+0x309/0x430 [ 145.826022] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 145.831001] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 145.836221] RIP: 0033:0x455389 2018/04/22 09:01:29 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) [ 145.839433] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 145.847193] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 145.854490] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 145.861805] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 145.867958] FAULT_INJECTION: forcing a failure. [ 145.867958] name failslab, interval 1, probability 0, space 0, times 0 [ 145.869092] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 145.869112] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000011 [ 145.895273] CPU: 0 PID: 10218 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 145.902227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 145.911604] Call Trace: [ 145.914245] dump_stack+0x185/0x1d0 [ 145.917935] should_fail+0x87b/0xab0 [ 145.921708] should_failslab+0x279/0x2a0 [ 145.925868] __kmalloc+0xc2/0x350 [ 145.929406] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 145.934853] ? crypto_dh_key_len+0x85/0xf0 [ 145.939172] ? __keyctl_dh_compute+0x58a/0x1ef0 [ 145.943931] __keyctl_dh_compute+0x58a/0x1ef0 [ 145.948508] ? kstrtouint_from_user+0x373/0x410 [ 145.953252] keyctl_dh_compute+0x22e/0x260 [ 145.957549] ? SyS_keyctl+0x76/0xa0 [ 145.961209] SYSC_keyctl+0xd31/0x1830 [ 145.965101] ? syscall_return_slowpath+0xe9/0x700 [ 145.970005] ? fput+0x25c/0x2e0 [ 145.973376] ? SYSC_write+0x2f0/0x360 [ 145.977257] SyS_keyctl+0x76/0xa0 [ 145.980798] do_syscall_64+0x309/0x430 [ 145.984746] ? keyctl_restrict_keyring+0x4e0/0x4e0 2018/04/22 09:01:30 executing program 3: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x521000) write$cgroup_pid(r0, &(0x7f00000000c0)={[0x39, 0x39, 0x38, 0x39, 0x31, 0x31]}, 0x6) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:30 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001940)='/dev/autofs\x00', 0x8100, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000019c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r2, &(0x7f0000001ac0)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000001a80)={&(0x7f0000001a00)={0x6c, r3, 0x708, 0x70bd2d, 0x25dfdbfd, {0x6}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x81}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x681}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2=0xe0000002}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x800}, 0x800) keyctl$read(0xb, r1, &(0x7f0000000600)=""/4096, 0x1000) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r5 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r4) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r5, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) [ 145.989731] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 145.994948] RIP: 0033:0x455389 [ 145.998160] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 146.005912] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 146.013214] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 146.020513] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 146.027814] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 146.035125] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000006 2018/04/22 09:01:30 executing program 6: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) 2018/04/22 09:01:30 executing program 4 (fault-call:5 fault-nth:18): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e", 0x24}], 0x1) 2018/04/22 09:01:30 executing program 2 (fault-call:5 fault-nth:7): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 146.261813] FAULT_INJECTION: forcing a failure. [ 146.261813] name failslab, interval 1, probability 0, space 0, times 0 [ 146.273237] CPU: 1 PID: 10248 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 146.280195] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.289579] Call Trace: [ 146.292224] dump_stack+0x185/0x1d0 [ 146.295908] should_fail+0x87b/0xab0 [ 146.299725] should_failslab+0x279/0x2a0 [ 146.303882] __kmalloc+0xc2/0x350 [ 146.307420] ? mpi_resize+0x254/0x450 [ 146.311299] mpi_resize+0x254/0x450 [ 146.314975] mpi_powm+0x1d59/0x56f0 [ 146.318702] dh_compute_value+0x347/0x5f0 [ 146.322933] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 146.328476] ? dh_set_secret+0x620/0x620 [ 146.332625] __keyctl_dh_compute+0x158a/0x1ef0 [ 146.337297] keyctl_dh_compute+0x22e/0x260 [ 146.341596] ? SyS_keyctl+0x76/0xa0 [ 146.345258] SYSC_keyctl+0xd31/0x1830 [ 146.349160] ? syscall_return_slowpath+0xe9/0x700 [ 146.354071] ? fput+0x25c/0x2e0 [ 146.357426] ? SYSC_write+0x2f0/0x360 [ 146.361305] SyS_keyctl+0x76/0xa0 [ 146.364846] do_syscall_64+0x309/0x430 [ 146.368792] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 146.373764] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 146.378991] RIP: 0033:0x455389 [ 146.382203] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 146.389949] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 146.391721] FAULT_INJECTION: forcing a failure. [ 146.391721] name failslab, interval 1, probability 0, space 0, times 0 [ 146.397237] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 146.397258] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 146.397277] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 146.397295] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000012 [ 146.438195] CPU: 0 PID: 10250 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 146.445149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.454525] Call Trace: [ 146.457164] dump_stack+0x185/0x1d0 [ 146.460842] should_fail+0x87b/0xab0 [ 146.464616] should_failslab+0x279/0x2a0 [ 146.468727] __kmalloc+0xc2/0x350 [ 146.472262] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 146.477685] ? crypto_create_tfm+0x10a/0x640 [ 146.482134] ? crypto_alg_extsize+0x66/0xc0 [ 146.486544] crypto_create_tfm+0x10a/0x640 [ 146.490889] crypto_alloc_tfm+0x3a9/0x710 [ 146.495162] crypto_alloc_kpp+0x99/0xb0 [ 146.499254] __keyctl_dh_compute+0x90e/0x1ef0 [ 146.503850] ? kstrtouint_from_user+0x373/0x410 [ 146.508600] keyctl_dh_compute+0x22e/0x260 [ 146.512895] ? SyS_keyctl+0x76/0xa0 [ 146.516559] SYSC_keyctl+0xd31/0x1830 [ 146.520460] ? syscall_return_slowpath+0xe9/0x700 [ 146.525372] ? fput+0x25c/0x2e0 [ 146.528735] ? SYSC_write+0x2f0/0x360 [ 146.532578] SyS_keyctl+0x76/0xa0 [ 146.536106] do_syscall_64+0x309/0x430 [ 146.540016] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 146.544969] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 146.550159] RIP: 0033:0x455389 [ 146.553343] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 2018/04/22 09:01:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) fcntl$dupfd(r0, 0x406, r0) 2018/04/22 09:01:30 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) fadvise64(r0, 0x0, 0x2, 0x3) utime(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x5, 0x8}) r2 = request_key(&(0x7f0000000200)='.dead\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)='digest_null\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r2}, &(0x7f00000001c0)=""/5, 0x0, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}}) accept4$bt_l2cap(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xe, 0x80000) 2018/04/22 09:01:30 executing program 6: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) 2018/04/22 09:01:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) setpgid(r2, r3) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r5 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r4) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r5, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e", 0x24}], 0x1) 2018/04/22 09:01:30 executing program 7: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x2, 0x0) connect$pppoe(r3, &(0x7f0000000180)={0x18, 0x0, {0x0, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, 'rose0\x00'}}, 0x1e) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000000000)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'sha224-ssse3\x00'}}) 2018/04/22 09:01:30 executing program 2 (fault-call:5 fault-nth:8): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:30 executing program 4 (fault-call:5 fault-nth:19): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) [ 146.561066] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 146.568330] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 146.575594] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 146.582856] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 146.590122] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000007 [ 146.669889] FAULT_INJECTION: forcing a failure. [ 146.669889] name failslab, interval 1, probability 0, space 0, times 0 [ 146.681266] CPU: 1 PID: 10272 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 146.688223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.697603] Call Trace: [ 146.700233] dump_stack+0x185/0x1d0 [ 146.703912] should_fail+0x87b/0xab0 [ 146.707726] should_failslab+0x279/0x2a0 [ 146.711891] __kmalloc+0xc2/0x350 2018/04/22 09:01:30 executing program 6: bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) 2018/04/22 09:01:30 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x4, 0x8, [0x1, 0x1, 0x100000000, 0x1f, 0x20, 0x7fffffff, 0x0, 0x2]}, &(0x7f0000000140)=0x18) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000600)={r6, 0x1000, "3d2cda9c6b0a6f9caefd95cf9d08507542c3559a9e9e45d1921d6482d74ea71e030b702d74619cc87abc1e25296f2aa401b118555031f5422311af2461658f655d0d635abc13f34b2307177e6560b812ed749753ee94050ae4d1d17dda1927380aa023f3a060a9021f167dbdcda92f8abc18a2ed410b702cae328f3b5cabb957566d905916aba1edff1f1c051ddaddc9f5ce6939ce1de2733be743e76a93ba2364678127f25daf2062654a2acdf79167c7e89ab54c8f3355958b04b6bed0aaa056967067baebea9354d482e2253fbe1457ab274ccc7a2b73f89e33fc597c007ed423633eaab8614d794da492ad430924080c0ea6a434a1fdaa3b9b73fb9043081bdb3cc9bee3d3c142fb028143c8bd02653f37fb95d8503ccd582e08af320f55080c859263673e99c62b576c051a750efbe4f7814e74470f7acf86903ef022fb3cf754037af54e33ce8549208d7ea34b49f8d6ae7d959cf5ab9b803d62adae3e063536c11aafa0c4b414f2f9eb87f4f5c73387bdf4a723fe5f8f3c0d4da9efb79e3b41519d74a0f8dc395757fbd68533dfae93929030b900972e7148b5c5275724f771ddf5a9f28cc696750dc6f347205e232d2aaa4e97d27f21cd91daab49a5aecd0b34ad605f979a96288369cce538dd579ed479c3e412d6cc2649c679431feb104ee1a96a8a282e2790e17ec787d7bb4221de0acd203d0f50d326194da65f058f2ce9bffac71cea29581caef396ed74e28b9d516ac8ff1f89fafc8a677746df9a3660f02cef6b0b4dc79f74c9e38f4fec1ce9ef0dd8c8884a0a23b52bb6f867d0e7fd3aa2a761e3d51d86f698966fa2301202245254fde6e11e2442dad7e177249541b9ec314bf3416a1e46b322f0025bcfd45f5f8132e21997c94893a6f7003761fb1f906f9dbb7db4667c774df169b690928292b6c40a8b5eb8bd8b3be34143084fa5837cdc08aeacd7a96ed715ccbc4b5f72fab3d65d97134f26ed2c52c08217ce8a5351b7e9fcdf9b3a093606bd50ba4d3f1d8c0dca29d2842f22243ca56eb0b57f1ab1e431f2d14324a44339ee544a1cff8cddc510720ffb7439eaec3e3c69133bb9ed83a2597ba11dabb46e47a0457879f3505ca7efdf16ed5994ec83e44945883bfd1cd4a26c203b487ccef207e603db1c9fe80a3f4a201c7547b8b2b22ac7a2505b52152cddb866bf4fbf0475768c31db9f529c7f4818173aa0b14bdffad0e5f71397f9e96261ecffdc3c21af202a1a0929ffa4214a195056082bfd88ee323c9ef9475e3a869de4bda1a1dcf7b8b06f66a0ea6c410ef2579f738ae9bdb90b87d1c6844953aceb3760d685db17f286e54279277889ec0f8457acdd4a027d650f12bf68eb4f91ffd71be2f386473f0b75ae52b04625092c4429c1d441ffa258c1e01668472281cd5bb55604ea390041e6381b4812a33b87094bfb67315f323fc6f118a35b8580d5eebc5949106c671362d38c6da470ea554d6750623b53d5f2d9d88beaf3d07349e3d291724322b8c3096d4ed4e8faeb329a7f6867df40e8906d6544ce109b20c9e8a44d03fad3913594c28e6aa2e952f6050d1e554e315f3686f9f88a7bf59bf70bad271494d77c4b3aadf73321f3e5edc96345bcd6571011560a75354d6bc1bfe334e558171971dd3f14668192685d3bc89ab50871c3f5f25217c784bf8ac8058aed0f16bafbbfde5ddccfad666778eec60e424ea97059ab73178d6d68e2a733c3a748ae391ad7ddc49145a2818319da937d13e22ae8435f9be54b0d2efa8c86a4911b2a8bd29125eb78a521f4a6db3e5997989747f388a6c5621523f7bf7ae4f6e061c8237cbfa53979c7763b6fd5a6c31b0f1acb273bf267b38b7569830b255e836e0db3f6a0151065e65514c555a26b070f36e0f4d838deba5180c7ba3e0fd7ddb856bc295de71c4b2b554020969502d2908c4064e7cdee824531c41e8a70a1b97b65f693aad829d655a0795b0c8950a09aabf9de1c058738c9cbd58d142136453237c3bd5aeb2df6f38074978cdd342aec970b42e1132e9a677bae7020c3fa185aba7ee84f27cef169640307a2df3f2b9f5bf5b4cca4d67174c896c9c964eda34a63fdc99b74b59d17318eb3fcf78accd34536274c147bbed9a4dc0720fd97351ef0dae398b3c53bcfb84e3cede326171c04e745dd19f7b2fdee75a092129e301c74af3a7a6ee83e898dace4cfff3ca2beaccba1e1cfb7f9e1b3c6cc6eacc2a50e95620b32b0a1b964d19b73b04f4f1f58b00d554e62f626ce2e789593b057c20bf970e135be71fa0364230242475bd245e9b6ef6823d835ef86dac0f585525c1ca0f9a77749a07aefe9a1af73d8d8f21cb7b9cb8684b0b4c04870eda4ef5be112ddceb2a12573d50cb2c6c1c0aea09ead1178ab4ec85072c4031b95617481822de66b9c7776d5bd050a64006626d1196da8ecdd1fd620c67ce55a9efeae8d673f333272000652cea495bc7cb692c8335f21bb0ddaf17e2bd2649d5072df2c6f24eb5fa8058c28e1406c0d3943e8984d3d90b3cfd6eaca8cbf8f43164277d1352ed6ffa7233bf5c65f6356ed8f5820e07ec6e508e5ed8676abf270541892a78451f8c6a27ea660fd9b6236dfa6012ad588397da56ace96ecc693cc27f954e16a4ae3829e7a3ada9b47c3d453d3ec48f05953edf888fa20861dfa249ee73828bd9b69667694a29ca0ab2bf5af67b9a06176e8c8349adffd2bef596dadd5d25b4600d0ad59e196e9970ad40dc69010f76b18f3d2a6ea80e0c455d36d04d0978c58f5693ad5936a147bc70523b22a6346120e6d4b526966f81beeca28ef7108e04c7f643c97b648ac7566f64066274f4f271238114e78873f1c997a23d19decd8fa6b22df15f808e872ab47fc292da60918072f2d40bb3327905ceedc2dfc3e01f208bc7903f6a4dc34f1c397e5f681a27090238bcc4cfaac698ff52c1f517dfc6b437b8f807d9b8a9da83aa56c4ca25e7ac9881f13b6f9643aa1776a57dd3e3648c5621c1558300a66a515d0b90b206cfd6e312860b771ecd88abd646665721c6464088d67677039aa14cadff39d23dbe769660a47454c9b7e5471f7645c2a5faef6d8f3fbe43b9861fd8acd1efd24f2b3f70d25fcbcd7bdb8c5826aa077e8d2036488d407655b7ae32978d6af4b2c6ad142ac58a2f86ca00402a2c619377dbf63b30815c39b0ae0e80590799bc749fbfc033830c31b67fd6dbdd7e3e55683306105e0eab374eb5c4bcf603be47f3d8b850ce3ce2dde497bac75c7dc5d9dae2937ff72cca5b691f02d9ac0ef4254cd576e9bf59a98d9166a58194b62969484e8e2a4c3968bd39ec850ff4c72e2b119b05b8dff896a72fcc65d02458a184b78128365283024a0dfdaa5a6aeb0ae3f758c74d97932f3ff23bdcaf5e82b1231dd559ad46ed94c9bad384b3be0aaf3bf85529a2b49117355ede7e59d841ff78645a82ddf300989eda64937e08b509e6686ffe7e8747e5ec97b285ff4c9b2c772de8f3c977aaba0369772057b99d53d8dbfd82c5652815c0285e297de4d16bde874e9063ba822ec45950d4b2ff8522ed2d8df364b7b3cb0a29935d042723e4e6d2390fbcdb191115a05fe0742cb9d74f54eee4954d787d53354b0b21f3c640b7b0b9681ef46b86198f3c443b2997907c1e4c138a54ac5350bafacdff7c2b0604b341ad6d3d88d50e1868cd14f5ab28ae5e3acfb1bb6120e1212bb62ca221d0fcf8a141b7d6c1582735a6e71a5ff6eb8bf559119b29368ec58c86f379482dcadec40689531537d2998dc58ae8d8cce2293d44ee6be5f3a25474717c84168fffb71bbf19616bbca8e0ee08b901f43f16b99e4bf71b5fe44bf8352e0ebae4be22edd9dcfc54a0589d78fd4e1ce74c483bee7dfdcfd6ec0da6312236ffcc2df003aafaa243d34e4bae8cd3b30f662bd41b4e1c45b536c46f06739e01361bc265cae583187d60e3f7621eb3afa335b0f903b7360d78808f2ad4ee918bdc389ac6c145cc85153d128dfec31ad37d92bf5ecb038e6ddd92d48e9b1ce38f7c6e579b2b18580477440bb0d613fec97b270715e77aa46311e0e039ba9b7def34aa8323f090e1645b1dc066986f96f5d8ac206079c4d5b0f20ff4c99f3cbee07e338825c0c67e88d908c7e391f7e49f50af883c5307b44af038acbec5740023571faf02263a67cb6f2aa54eb0dc40f981614b34bb11522177e95a0253c8ad53e8dd5aa5b3ce3ac67259ae623e49f5df887995ff922a36a12a93f7df889fa4c9fd7b79fd6b49b3c7ab16c470d76104b6faadd6dd3c0c002444f8746570fd6b420cd7b81b5c7f989f13a8476cfde0e8217f4ec0dc5c33558196f4a8c9d409c149aeffc0dd6031a029c6e02b493e4e55c1e395d5fe9fad435f4a7a65385e1721345152742b3d52422ec188250342e46db8326be37a7858964b692ef7c6bb0fa75bcd924aec0cc9a3b41fecfa014f6aeb5e6351645a73557fc5f9a8963db9ddba9227cc7261182a8e3dcff67b7ae31e79031b97db28a1df0282032db51b445ce2b28edcca8e41165961b83db181bcdddccd384ccac7a08475277d1a8bc63fd1f7f71633931c31a3c293e94eaaa229997f846e38c44621a9274c51ab903d27bac0f958c09760ce6630bff43fcbca6906553fa2d6485c26a88e9233810a76c54bd2713b112dd68447cb2995b0a51d466ef624540106ced4facb9fba738c8355231ef6dc63fcf3ba360041d6474d4632c147ee20eb380cbbde3f7000a2edc18a5085459e0185e9a99a4f872298b603c521ca20aa8d369f694997f75595e72b86e0f593d404d1be6ffb7113ac5d1669d57ebf4a817e9b5e9332c71c34af17deffe0e6c7970e1825a04fda85031c368500c4a13834d72b3d74a6985bd0a4750687c69de5716322f630f9e379c61ede8b2f43165dd985e2b1f8e5796b42a8677c1d3acd0167bb70bb5881e8c0453d712435d6d7d0a346940ce10764c4a3de1839eee879edc7f65e951c9021f055299f22251c4a2198d0fcfa7882b120f8a0ee813e6939bc5f51d87e968e63fdbcd8dfbb43063563e27655d8f7e6693302ffc308d5f3b2df01aea6ca9d0fb13de968d5badd5b02976072639f1df0d72ae5ce16d5d5e79b45699ad8a3467fa5da86c513b5228f077ff364dec1e5b9ce947fa6fe36f12073d7086298830f01e8bbaf9cf2d50c6f0274d2a4e13de1b58d08184526fa63a6b85e3a525bfb90435c8e0c5ff8462d45a2ca5d7cfcb7c2e39f14ff7844849c3209029ab8f2589fc6c559d3f5a7c7faf58ed05154edab5ed7355ca8cdd5999ac6aee3f02471ef7baca999584cb9b6d708993062cc15e400d857d268db7b3af1e0790fad15b7bc376f4534bb1f48fb5867eb9585931ef0741f12352e0a44e37f17ced8fe635f4e00c1e4695eba22ab6f1b2671f91a2978f30ba5e108489f1f9d4b0d5ba77592878cba7a4281ada1fc9255882107d5f4d863c45c12e989960d75ae545b5807e322054eb0db6aa1987fec3b174e1ba1f6ff5bd501e96b813be90105004291213b6309b0d3544524b44495f754c7d81f216d7dca91932f2c2058081b55eee8df98ab63f207634f558b69cbbb84d939725f17d9dfb35d30ea1172a6a29b30dbe366a652026ac1adb57c09a66662a38fc1486ba237be2affbb112ea8f08952d523134da6cffae1a9bf27bb084a1120529b83052232c8de48602ba997cdc0203e8af1b623db5d5afe9f608c0fa328add6d8532c62cfbb15d92015d0b1e64d5d08b8995ffa5798e8440c9574269575985ee11558237a3d3701c6264"}, &(0x7f0000000180)=0x1008) [ 146.715431] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 146.720966] ? mpi_resize+0x2bc/0x450 [ 146.724814] ? mpi_alloc_limb_space+0x6f/0xb0 [ 146.729354] mpi_alloc_limb_space+0x6f/0xb0 [ 146.733724] mpi_powm+0x236d/0x56f0 [ 146.737446] dh_compute_value+0x347/0x5f0 [ 146.741681] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 146.747163] ? dh_set_secret+0x620/0x620 [ 146.751304] __keyctl_dh_compute+0x158a/0x1ef0 [ 146.755964] keyctl_dh_compute+0x22e/0x260 [ 146.760252] ? SyS_keyctl+0x76/0xa0 [ 146.763912] SYSC_keyctl+0xd31/0x1830 2018/04/22 09:01:30 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b21", 0x27}], 0x1) [ 146.767818] ? syscall_return_slowpath+0xe9/0x700 [ 146.772730] ? fput+0x25c/0x2e0 [ 146.776089] ? SYSC_write+0x2f0/0x360 [ 146.779975] SyS_keyctl+0x76/0xa0 [ 146.783524] do_syscall_64+0x309/0x430 [ 146.787468] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 146.792441] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 146.797657] RIP: 0033:0x455389 [ 146.800863] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 146.808610] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 146.815907] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 146.823203] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 146.830496] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 146.837798] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000013 2018/04/22 09:01:30 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x0, 0x0) bind$bt_rfcomm(r0, &(0x7f0000000140)={0x1f, {0xdd5, 0x8, 0x80a, 0x3, 0x7f, 0x1ff}, 0xfffffffffffffff9}, 0xa) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fstat(r1, &(0x7f0000000040)) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:30 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) [ 146.948538] could not allocate digest TFM handle sha224-ssse3 [ 146.962750] FAULT_INJECTION: forcing a failure. [ 146.962750] name failslab, interval 1, probability 0, space 0, times 0 [ 146.974159] CPU: 0 PID: 10284 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 146.981114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 146.990494] Call Trace: [ 146.993133] dump_stack+0x185/0x1d0 [ 146.996811] should_fail+0x87b/0xab0 [ 147.000586] should_failslab+0x279/0x2a0 [ 147.004743] __kmalloc+0xc2/0x350 [ 147.008253] ? mpi_alloc+0x58/0x290 [ 147.011974] mpi_alloc+0x58/0x290 [ 147.015524] mpi_read_raw_data+0x265/0xd60 [ 147.019814] dh_set_secret+0x215/0x620 [ 147.023798] __keyctl_dh_compute+0xcf9/0x1ef0 [ 147.028394] ? kstrtouint_from_user+0x373/0x410 [ 147.033118] ? dh_exit+0x30/0x30 [ 147.036539] keyctl_dh_compute+0x22e/0x260 [ 147.040830] ? SyS_keyctl+0x76/0xa0 [ 147.044495] SYSC_keyctl+0xd31/0x1830 [ 147.048396] ? syscall_return_slowpath+0xe9/0x700 [ 147.053312] ? fput+0x25c/0x2e0 [ 147.056673] ? SYSC_write+0x2f0/0x360 [ 147.060511] SyS_keyctl+0x76/0xa0 [ 147.063998] do_syscall_64+0x309/0x430 [ 147.067929] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 147.072906] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 147.078121] RIP: 0033:0x455389 [ 147.081328] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 147.089081] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 2018/04/22 09:01:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000080)=@random={'btrfs.', '/exe\x00'}, &(0x7f0000000240)=""/166, 0xa6) finit_module(r0, &(0x7f0000000000)='security.evm\x00', 0x2) [ 147.096374] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 147.103669] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 147.110965] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 147.118259] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000008 2018/04/22 09:01:31 executing program 4 (fault-call:5 fault-nth:20): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:31 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r5 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x7, 0x101000) connect$pptp(r5, &(0x7f00000000c0)={0x18, 0x2, {0x0, @loopback=0x7f000001}}, 0x1e) 2018/04/22 09:01:31 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7fff, 0x4000) r1 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000040)={r1, 0x3, 0x80, "a2f1106c4e3770139b4b7599d030537e6546acc55039812ed905a2131620b391e75a467a3b4ea1e8d0008ff24e25ecfc3d1234783e1aa00a9c98967570776db9df6ca20ebb"}) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl(r1, 0xaa, &(0x7f0000000140)="51cbd1faba05380c46d2fe7f367df4ca079674c692ab195847366e5c30ab83612260e7fa47deac54dcacac3b1ab1d0aabc2e93dd9ed378ec9e035f7002a976aa5e95563d17d547577bd241a81b04c72a2b7de99cc7d89a9f3e15e5d34df2fb9f1302004911179a24389bc082ee08a2ebf37d8c182bfa") syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x7fffffff, 0x80000) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:31 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) 2018/04/22 09:01:31 executing program 2 (fault-call:5 fault-nth:9): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:31 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x84800) ioctl$PPPOEIOCSFWD(r3, 0x4008b100, &(0x7f0000000280)={0x18, 0x0, {0x4, @random="f3b6c05a3f9b", 'veth1_to_bond\x00'}}) r4 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x4, 0x82) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r4, 0x118, 0x1, &(0x7f00000000c0)=0x7, 0x4) r5 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000180)={r5, r6, r6}, &(0x7f0000a53ffb)=""/5, 0xffffffffffffff77, &(0x7f0000000140)={&(0x7f0000a3dffa)={'sha384-avx2\x00'}}) 2018/04/22 09:01:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b21", 0x27}], 0x1) 2018/04/22 09:01:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000140)={0x9, 0xffffffff7fffffff, 0x4, 0x0, &(0x7f00000001c0), 0x34, &(0x7f0000000080)=""/52, 0xfffffffffffffd7c, &(0x7f00000000c0)=""/97}) setsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000300)="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", 0x1000) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x6, 0x4) [ 147.385798] FAULT_INJECTION: forcing a failure. [ 147.385798] name failslab, interval 1, probability 0, space 0, times 0 [ 147.397195] CPU: 1 PID: 10319 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 147.402128] FAULT_INJECTION: forcing a failure. [ 147.402128] name failslab, interval 1, probability 0, space 0, times 0 [ 147.404150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.404165] Call Trace: [ 147.404215] dump_stack+0x185/0x1d0 [ 147.404277] should_fail+0x87b/0xab0 [ 147.434776] should_failslab+0x279/0x2a0 [ 147.438888] __kmalloc+0xc2/0x350 [ 147.442409] ? __keyctl_dh_compute+0x1bae/0x1ef0 [ 147.447213] __keyctl_dh_compute+0x1bae/0x1ef0 [ 147.451865] keyctl_dh_compute+0x22e/0x260 [ 147.456128] ? SyS_keyctl+0x76/0xa0 [ 147.459762] SYSC_keyctl+0xd31/0x1830 [ 147.463621] ? syscall_return_slowpath+0xe9/0x700 [ 147.468491] ? fput+0x25c/0x2e0 [ 147.471819] ? SYSC_write+0x2f0/0x360 [ 147.475659] SyS_keyctl+0x76/0xa0 [ 147.479159] do_syscall_64+0x309/0x430 [ 147.483077] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 147.488028] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 147.493228] RIP: 0033:0x455389 [ 147.496417] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 147.504138] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 147.511410] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 147.518682] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 147.525957] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 147.533232] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000014 [ 147.540531] CPU: 0 PID: 10313 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 147.547830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 147.557220] Call Trace: [ 147.559858] dump_stack+0x185/0x1d0 [ 147.563539] should_fail+0x87b/0xab0 [ 147.567315] should_failslab+0x279/0x2a0 [ 147.571478] __kmalloc+0xc2/0x350 [ 147.574990] ? mpi_alloc+0xe3/0x290 [ 147.578702] mpi_alloc+0xe3/0x290 [ 147.582217] mpi_read_raw_data+0x265/0xd60 [ 147.586511] dh_set_secret+0x215/0x620 [ 147.590509] __keyctl_dh_compute+0xcf9/0x1ef0 [ 147.595096] ? kstrtouint_from_user+0x373/0x410 [ 147.599816] ? dh_exit+0x30/0x30 [ 147.603240] keyctl_dh_compute+0x22e/0x260 [ 147.607536] ? SyS_keyctl+0x76/0xa0 [ 147.611192] SYSC_keyctl+0xd31/0x1830 [ 147.615091] ? syscall_return_slowpath+0xe9/0x700 [ 147.619995] ? fput+0x25c/0x2e0 [ 147.623356] ? SYSC_write+0x2f0/0x360 [ 147.627231] SyS_keyctl+0x76/0xa0 [ 147.630770] do_syscall_64+0x309/0x430 [ 147.634708] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 147.639677] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 147.644892] RIP: 0033:0x455389 [ 147.648103] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 147.655848] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 147.663151] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 147.670445] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 147.677739] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 2018/04/22 09:01:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip_tables_targets\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:31 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140)='-wlan1\x00', r0) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:31 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) r0 = socket$inet6(0xa, 0x0, 0x0) fcntl$getown(r0, 0x9) [ 147.685032] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000009 2018/04/22 09:01:31 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) 2018/04/22 09:01:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b21", 0x27}], 0x1) 2018/04/22 09:01:31 executing program 4 (fault-call:5 fault-nth:21): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:31 executing program 7: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x80, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'ipddp0\x00'}) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) r6 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4100) getsockopt$bt_l2cap_L2CAP_CONNINFO(r6, 0x6, 0x2, &(0x7f00000000c0), &(0x7f0000000140)=0x6) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:31 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000000)={0x401, 0x101, 0x7fffffff, 0x6, 0x3, 0x3}) signalfd4(r0, &(0x7f0000000080)={0x7}, 0x8, 0x800) [ 148.002028] FAULT_INJECTION: forcing a failure. [ 148.002028] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 148.013866] CPU: 0 PID: 10356 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 148.020796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.030148] Call Trace: [ 148.032746] dump_stack+0x185/0x1d0 [ 148.036388] should_fail+0x87b/0xab0 [ 148.040113] __alloc_pages_nodemask+0x5fe/0x5dc0 [ 148.044878] ? kernel_poison_pages+0x40/0x360 [ 148.049387] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 148.054755] ? kernel_poison_pages+0x1a0/0x360 [ 148.059346] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 148.064802] ? get_page_from_freelist+0xab28/0xb600 [ 148.069824] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 148.075288] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 148.080653] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 148.086110] ? update_stack_state+0x885/0xa40 [ 148.090606] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 148.095973] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 148.100915] ? save_stack_trace+0x20/0xf0 [ 148.105067] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 148.110520] ? kmsan_set_origin_inline+0x6b/0x120 [ 148.115368] kmsan_alloc_page+0x82/0xe0 [ 148.119356] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 148.124116] ? kernel_text_address+0x34d/0x3a0 [ 148.128705] ? __kernel_text_address+0x34/0xe0 [ 148.133302] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 148.138756] ? __save_stack_trace+0x90d/0xb00 [ 148.143263] ? save_stack_trace+0xa5/0xf0 [ 148.147420] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 148.152876] ? update_stack_state+0x885/0xa40 [ 148.157381] ? __msan_poison_alloca+0x15c/0x1d0 [ 148.162061] alloc_pages_vma+0x1565/0x1800 [ 148.166311] do_huge_pmd_anonymous_page+0xf80/0x2520 [ 148.171427] handle_mm_fault+0x428f/0x7e50 [ 148.175669] ? kmsan_set_origin_inline+0x6b/0x120 [ 148.180521] __do_page_fault+0xec4/0x1a10 [ 148.184683] ? page_fault+0x25/0x50 [ 148.188318] do_page_fault+0xd3/0x260 [ 148.192120] page_fault+0x25/0x50 [ 148.195579] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 148.201196] RSP: 0018:ffff8801c78ff9f0 EFLAGS: 00010206 [ 148.206557] RAX: ffffffff83eaeaf4 RBX: 0000000020a54000 RCX: 0000000000000005 [ 148.213825] RDX: 0000000000000005 RSI: ffff88014fa31610 RDI: 0000000020a53ffb [ 148.221095] RBP: ffff8801c78ffa58 R08: 0000000000024290 R09: ffff8801c845f930 [ 148.228362] R10: 000000000150647d R11: 000000000014191f R12: 0000000000000000 [ 148.235630] R13: ffff8801c78ff9f8 R14: 0000000000000000 R15: ffff880159a76198 [ 148.242919] ? _copy_to_user+0x104/0x180 [ 148.247002] ? _copy_to_user+0xed/0x180 [ 148.250988] __keyctl_dh_compute+0x1dfc/0x1ef0 [ 148.255589] keyctl_dh_compute+0x22e/0x260 [ 148.259835] ? SyS_keyctl+0x76/0xa0 [ 148.263468] SYSC_keyctl+0xd31/0x1830 [ 148.267279] ? syscall_return_slowpath+0xe9/0x700 [ 148.272129] ? fput+0x25c/0x2e0 [ 148.275418] ? SYSC_write+0x2f0/0x360 [ 148.279224] SyS_keyctl+0x76/0xa0 [ 148.282682] do_syscall_64+0x309/0x430 [ 148.286580] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 148.291515] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 148.296734] RIP: 0033:0x455389 2018/04/22 09:01:32 executing program 0: r0 = userfaultfd(0x800) mmap(&(0x7f0000728000/0x3000)=nil, 0x3000, 0xfffffffffffffffe, 0x2013, r0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000000)={&(0x7f0000a3dffa)={'digest_null\x00'}}) 2018/04/22 09:01:32 executing program 2 (fault-call:5 fault-nth:10): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:32 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) 2018/04/22 09:01:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000000)={0x3, 0x1}) 2018/04/22 09:01:32 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) 2018/04/22 09:01:32 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/fscreate\x00') getsockopt$netrom_NETROM_T1(r0, 0x103, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x4) fgetxattr(r0, &(0x7f0000000100)=@random={'security.', 'security.evm\x00'}, &(0x7f0000000240)=""/166, 0x77) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000580)) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000040)="c32dc7572b69d9f4ab4600fce1920123bd4cf460f457bc643003def7ce4498a3", 0x20}, {&(0x7f0000000140)="4385f3b51affc7cab48b5251e3f19674490a346d9d62bbcb793171f5e721d36b9529395f7032250bd40bf2708c3493831c1011deaf43f15b", 0x38}, {&(0x7f0000000180)="d50833346ba2d53b05cded0e8e47d75553b1f7fae3e5ca39612104", 0x1b}, {&(0x7f0000000300)="d2cb4e8d170955e8906e84941c1c32efc1440730dbcc168eacba2373f3a2061043c044b882ba0d53c466ff5f2e0568c521b60e174ccaf9e7e0987cb0ea7aa381f5ef98aaab1a92a86b51610e4bc1d6258f2d9033af934ba12e926f04ffa17113b03ee3386526c705d119da711b1459a33edc6b3f2386ab959e597f93786eacb46720e9df7de5563a9906ee241528319c3316e0e8cd073dfd0825f2b86c301d142cbce5d05b24c1bd2f6b0b036233c83f4a3a17c657bec29ff1f55295cb0f99957babf9ddb8", 0xc5}, {&(0x7f0000000400)="8e361a6bd69e4c13c971282d5a0aad0adf01963e3f7093de0f886820991e67f7618fda5daaaf9dc1182cb3d03ba7e28638629d317e9fcbac3512d72587fe66340b3a33b638f78b95c8115009f69944eae4a59285b8547eb10aa9e1260d8f23be625a72be44e1ba3a2d4a669b398bcb3742c2d5ad34bb002c69f02c19a14b076337b9d9df30c4fc39d60e1c70d98a90c31da170aaf70d6012815ab5cf2edee3704196da729ef6707877c09b29368554a44895acd91d29f996546117ef33c181ae231ccabc5636b08ed7a76c164193c72095d61fff0065b6", 0xd7}, {&(0x7f00000001c0)="1a48a6d70d02a3325b4061d2c86b5535a4ad05128a3e4c1f1cbc60b0b277f2cc961e356474945e2d71660ecc56ae0b4a28ad5a8b84c9a8a318aab8e0780443de8c166fe9992a7138a758c1", 0x4b}], 0x6) 2018/04/22 09:01:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b218d", 0x28}], 0x1) [ 148.299922] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 148.307637] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 148.314907] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 148.322177] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 148.329445] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 148.336716] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000015 [ 148.430225] FAULT_INJECTION: forcing a failure. [ 148.430225] name failslab, interval 1, probability 0, space 0, times 0 [ 148.441639] CPU: 1 PID: 10377 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 148.448601] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.457985] Call Trace: [ 148.460626] dump_stack+0x185/0x1d0 [ 148.464299] should_fail+0x87b/0xab0 [ 148.468062] should_failslab+0x279/0x2a0 [ 148.472217] __kmalloc+0xc2/0x350 [ 148.475722] ? mpi_alloc+0x58/0x290 [ 148.479434] mpi_alloc+0x58/0x290 [ 148.482998] mpi_read_raw_data+0x265/0xd60 [ 148.487296] dh_set_secret+0x2c2/0x620 [ 148.491291] __keyctl_dh_compute+0xcf9/0x1ef0 [ 148.495881] ? kstrtouint_from_user+0x373/0x410 [ 148.500605] ? dh_exit+0x30/0x30 [ 148.504035] keyctl_dh_compute+0x22e/0x260 [ 148.508334] ? SyS_keyctl+0x76/0xa0 [ 148.511996] SYSC_keyctl+0xd31/0x1830 [ 148.515894] ? syscall_return_slowpath+0xe9/0x700 [ 148.520808] ? fput+0x25c/0x2e0 [ 148.524167] ? SYSC_write+0x2f0/0x360 [ 148.528129] SyS_keyctl+0x76/0xa0 [ 148.531672] do_syscall_64+0x309/0x430 [ 148.535621] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 148.540598] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 148.545817] RIP: 0033:0x455389 [ 148.549030] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 148.556778] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 148.564075] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 148.571365] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 2018/04/22 09:01:32 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r5 = socket$inet(0x2, 0x80006, 0x3) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000480)={0x0, 0xd2, "f088b0c04e6fda30ab2c6614c7ea69c4b2ced31663b614156f0ee641225a5878faa3a2254af4401be229e95baa55c501096ea68abfc7d3a2a3d6b062854477d8ae36dc7e2902d9dab656bf7b651050323d80336d0b98b51b0985b82be9713487ec0c52e30a648ff3a982dad3b32c499c2f05cd333240cbe08b5b356d920e2e328298f0b80e810c630c69eb1e653e8373fb431a62996204ac57965bcd0d090f4cd138573bb7d0d486f7c8f6a434dd64a52ce34c699c47eb55f74c8c64a07b9e2d4262a2d69854ff8c0a1c8e33666df208adad"}, &(0x7f0000000000)=0xda) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f00000000c0)={r6, 0x80000000, 0x4, [0xffffffff, 0x1ff, 0x1, 0x5]}, &(0x7f0000000140)=0x10) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:32 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) 2018/04/22 09:01:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b218d", 0x28}], 0x1) 2018/04/22 09:01:32 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x40, 0x80) setsockopt$inet_tcp_buf(r0, 0x6, 0x3f, &(0x7f00000001c0)="eb4901f23a013455c10ca15da988e3df79538b2504c6143f4fd4c562e5aafbf5721cfcb94e6540fd81bc380553acf192a868ae940b072392bfb80a702f3cfebb698fbb997aa6", 0x46) getsockopt$inet_tcp_buf(r0, 0x6, 0x0, &(0x7f0000000140)=""/56, &(0x7f0000000400)=0x38) futimesat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x7530}, {0x77359400}}) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7, 0x503002) getsockopt$nfc_llcp(r1, 0x118, 0x2, &(0x7f0000000300)=""/222, 0xde) fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:32 executing program 4 (fault-call:5 fault-nth:22): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) [ 148.578652] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 148.585944] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000a 2018/04/22 09:01:32 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, r0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) r1 = open(&(0x7f0000000180)='./file0\x00', 0x8000, 0x5) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r1, &(0x7f00000001c0)="fc1b4d6c89f4a146cd296a62a304dcafedfce5f2599822276a894d358d0d8146923d392e096cd11da8138a95714dcced2ce8f2bb2145a964edcdaea7096aa000c8cb8a478bc130c28822e313ee532eb4947b1d9cc3f4c17b21259a3ebb087bc886c4bb6a2e2823df9899db01f8af6e5bdfc5c2aed9ccf256cf8fd71b069626270a360de07a22111ffb4e3a875897edfc3c52ed38954049ad7a3f0b7d002baf6a41ef872535ab03d082cf3a80f4a7ec2d", &(0x7f0000000280)=""/37}, 0x18) socketpair$inet_sctp(0x2, 0x10000000000005, 0x84, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000040)={'veth0_to_bond\x00', {0x2, 0x4e21, @rand_addr=0x2}}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000000)=0x0) fcntl$setownex(r2, 0xf, &(0x7f0000000300)={0x3, r4}) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f00000000c0)={0x0, @dev={0xac, 0x14, 0x14, 0xa}, 0x4e23, 0x3, 'sed\x00', 0x12, 0xd0, 0x5d}, 0x2c) ptrace$setopts(0x4206, r4, 0x6bd4, 0x4) 2018/04/22 09:01:32 executing program 2 (fault-call:5 fault-nth:11): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:32 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x4, 0x401) r5 = accept4$llc(r4, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x6, 0x800) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r6, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'sha3-224-generic\x00'}}) r7 = fcntl$getown(r4, 0x9) fcntl$setown(r5, 0x8, r7) [ 148.704826] FAULT_INJECTION: forcing a failure. [ 148.704826] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 148.704989] FAULT_INJECTION: forcing a failure. [ 148.704989] name failslab, interval 1, probability 0, space 0, times 0 [ 148.716678] CPU: 0 PID: 10399 Comm: syz-executor4 Not tainted 4.16.0+ #85 [ 148.716686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 148.716690] Call Trace: [ 148.716716] dump_stack+0x185/0x1d0 [ 148.716735] should_fail+0x87b/0xab0 [ 148.716761] __alloc_pages_nodemask+0x5fe/0x5dc0 [ 148.716779] ? kernel_poison_pages+0x40/0x360 [ 148.716825] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 148.768657] ? kernel_poison_pages+0x1a0/0x360 [ 148.773234] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 148.778672] ? get_page_from_freelist+0xab28/0xb600 [ 148.783674] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 148.789119] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 148.794467] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 148.799906] ? update_stack_state+0x885/0xa40 [ 148.804390] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 148.810958] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 148.815971] ? save_stack_trace+0x20/0xf0 [ 148.820110] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 148.825552] ? kmsan_set_origin_inline+0x6b/0x120 [ 148.830385] kmsan_alloc_page+0x82/0xe0 [ 148.834352] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 148.839095] ? kernel_text_address+0x34d/0x3a0 [ 148.843663] ? __kernel_text_address+0x34/0xe0 [ 148.848231] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 148.853666] ? __save_stack_trace+0x90d/0xb00 [ 148.858153] ? save_stack_trace+0xa5/0xf0 [ 148.862294] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 148.867732] ? update_stack_state+0x885/0xa40 [ 148.872219] ? __msan_poison_alloca+0x15c/0x1d0 [ 148.876877] alloc_pages_vma+0x1565/0x1800 [ 148.881107] do_huge_pmd_anonymous_page+0xf80/0x2520 [ 148.886205] handle_mm_fault+0x428f/0x7e50 [ 148.890428] ? kmsan_set_origin_inline+0x6b/0x120 [ 148.895267] __do_page_fault+0xec4/0x1a10 [ 148.899411] ? page_fault+0x25/0x50 [ 148.903026] do_page_fault+0xd3/0x260 [ 148.906820] page_fault+0x25/0x50 [ 148.910262] RIP: 0010:copy_user_generic_unrolled+0xa0/0xc0 [ 148.915872] RSP: 0018:ffff8801a29bf9f0 EFLAGS: 00010206 [ 148.921221] RAX: ffffffff83eaeaf4 RBX: 0000000020a54000 RCX: 0000000000000005 [ 148.928479] RDX: 0000000000000005 RSI: ffff88014fa31698 RDI: 0000000020a53ffb [ 148.935735] RBP: ffff8801a29bfa58 R08: 0000000000024290 R09: ffff8801a532f930 [ 148.942997] R10: 000000000150647d R11: 000000000014191f R12: 0000000000000000 [ 148.950256] R13: ffff8801a29bf9f8 R14: 0000000000000000 R15: ffff88015b4d0918 [ 148.957528] ? _copy_to_user+0x104/0x180 [ 148.961575] ? _copy_to_user+0xed/0x180 [ 148.965543] __keyctl_dh_compute+0x1dfc/0x1ef0 [ 148.970123] keyctl_dh_compute+0x22e/0x260 [ 148.974347] ? SyS_keyctl+0x76/0xa0 [ 148.977962] SYSC_keyctl+0xd31/0x1830 [ 148.981754] ? syscall_return_slowpath+0xe9/0x700 [ 148.986586] ? fput+0x25c/0x2e0 [ 148.989855] ? SYSC_write+0x2f0/0x360 [ 148.993644] SyS_keyctl+0x76/0xa0 [ 148.997084] do_syscall_64+0x309/0x430 [ 149.000959] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 149.005878] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 149.011056] RIP: 0033:0x455389 [ 149.014232] RSP: 002b:00007f541e334c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 149.021924] RAX: ffffffffffffffda RBX: 00007f541e3356d4 RCX: 0000000000455389 [ 149.029180] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 149.036434] RBP: 000000000072bea0 R08: 0000000020000180 R09: 0000000000000000 [ 149.043686] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 149.050941] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000016 [ 149.058234] CPU: 1 PID: 10390 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 149.065201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.074593] Call Trace: [ 149.077246] dump_stack+0x185/0x1d0 [ 149.080933] should_fail+0x87b/0xab0 [ 149.084707] should_failslab+0x279/0x2a0 [ 149.088874] __kmalloc+0xc2/0x350 [ 149.092387] ? mpi_alloc+0xe3/0x290 [ 149.096095] mpi_alloc+0xe3/0x290 [ 149.099657] mpi_read_raw_data+0x265/0xd60 [ 149.103960] dh_set_secret+0x2c2/0x620 [ 149.107949] __keyctl_dh_compute+0xcf9/0x1ef0 [ 149.112529] ? kstrtouint_from_user+0x373/0x410 [ 149.117252] ? dh_exit+0x30/0x30 [ 149.120671] keyctl_dh_compute+0x22e/0x260 [ 149.124968] ? SyS_keyctl+0x76/0xa0 [ 149.128626] SYSC_keyctl+0xd31/0x1830 [ 149.132523] ? syscall_return_slowpath+0xe9/0x700 [ 149.137437] ? fput+0x25c/0x2e0 [ 149.140807] ? SYSC_write+0x2f0/0x360 [ 149.144692] SyS_keyctl+0x76/0xa0 [ 149.148238] do_syscall_64+0x309/0x430 2018/04/22 09:01:33 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fd", 0x11) [ 149.152188] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 149.157163] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 149.162378] RIP: 0033:0x455389 [ 149.165585] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 149.173332] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 149.180658] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 149.187980] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 149.195290] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 149.202596] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000b 2018/04/22 09:01:33 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="2900000020001900013d181000da000402000000000000179e0000040d0006000000111e9a3b218d", 0x28}], 0x1) 2018/04/22 09:01:33 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) sysinfo(&(0x7f0000000480)=""/233) r5 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x7, 0x280) setsockopt$IP_VS_SO_SET_EDITDEST(r5, 0x0, 0x489, &(0x7f0000000140)={{0x32, @broadcast=0xffffffff, 0x4e22, 0x0, 'lblc\x00', 0x24, 0xffffffffffff4bc3, 0x6f}, {@local={0xac, 0x14, 0x14, 0xaa}, 0x4e24, 0x10000, 0x79e85142, 0x4, 0x1}}, 0x44) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:33 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) 2018/04/22 09:01:33 executing program 1: getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000200)) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000480)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000003c0)="000000000000000000000000000006cfcd09a9a176f56dfe3cf13c28795d9a112dd936796be1f655a6d65cff53af61f431e82f5318fe0eead9d31a95efcfb3ce7d5cf532340e22e27ce291427e33c0bf020070e9239bfe9125461bdc15323bb43ec84901000000f3f99877487c7b46ceffa24b66cd7e30cc51267cb82b318dc91dd35cab5443cccec41ee611dd5845c54af9b6ec6f74ceb957cc8ebbfd301f7b2bcb23d43edf7728d56a") clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r1, 0x1400}, {r1, 0x40}], 0x2, &(0x7f00000000c0)={r2, r3+30000000}, &(0x7f0000000100)={0x100000000}, 0x8) fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:33 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:33 executing program 2 (fault-call:5 fault-nth:12): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:33 executing program 4 (fault-call:5 fault-nth:23): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:33 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) keyctl$describe(0x6, r1, &(0x7f0000000140)=""/74, 0x4a) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:33 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r1) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f00000000c0)=0xffffffff, 0x4) 2018/04/22 09:01:33 executing program 5: 2018/04/22 09:01:33 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) 2018/04/22 09:01:33 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000080)={{0x34, 0xfffffffffffff1f3}, 0xba823b86da9130ec, 0xd75, 0x3031, {0x8, 0x8}, 0x4, 0x6}) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x4, 0x16000) 2018/04/22 09:01:33 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) fcntl$getown(0xffffffffffffff9c, 0x9) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000001c0)) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000380)="6dbf570af9696c657300") fgetxattr(r2, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) sendmsg$key(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)={0x2, 0x9, 0x0, 0xf, 0x35, 0x0, 0x70bd27, 0x25dfdbfc, [@sadb_x_filter={0x5, 0x1a, @in6=@remote={0xfe, 0x80, [], 0xbb}, @in=@local={0xac, 0x14, 0x14, 0xaa}, 0x0, 0x4}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @rand_addr=0x1000}, @in={0x2, 0x4e22}}, @sadb_x_filter={0x5, 0x1a, @in6, @in=@multicast1=0xe0000001, 0x10, 0x14, 0x4}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e23, 0x606, @loopback={0x0, 0x1}, 0x6}, @in6={0xa, 0x4e20, 0xffffffffffffffc0, @remote={0xfe, 0x80, [], 0xbb}, 0x7}}, @sadb_x_nat_t_type={0x1, 0x14, 0x6}, @sadb_key={0xb, 0x9, 0x248, 0x0, "affd6745496dd61a37ea34146aed77d434da4328ffe043ea160a684ea04bf642af45101d57138ff5c87060736d673bf2b064e266ce4efe20e0121834dfa5fe5141312842b5113e8bd7"}, @sadb_x_filter={0x5, 0x1a, @in=@broadcast=0xffffffff, @in6=@dev={0xfe, 0x80, [], 0x1c}, 0x5, 0x4, 0x14}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e20, 0x6, @local={0xfe, 0x80, [], 0xaa}, 0x7}, @in={0x2, 0x4e21, @broadcast=0xffffffff}}, @sadb_sa={0x2, 0x1, 0x4d6, 0xfffffffffffff714, 0x3, 0xe4, 0x2, 0xe0000001}, @sadb_spirange={0x2, 0x10, 0x4d4, 0x4d4}]}, 0x1a8}, 0x1}, 0x4040800) 2018/04/22 09:01:33 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r4, 0x40505331, &(0x7f0000000140)={{0x5, 0x8}, {0x4, 0x1}, 0x1, 0x2, 0x4}) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x181400, 0x0) getsockname(r6, &(0x7f0000000480)=@generic, &(0x7f0000000340)=0x80) getsockopt$inet6_tcp_int(r4, 0x6, 0x17, &(0x7f0000000280), &(0x7f0000000300)=0x4) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) [ 149.636714] FAULT_INJECTION: forcing a failure. [ 149.636714] name failslab, interval 1, probability 0, space 0, times 0 [ 149.648178] CPU: 1 PID: 10447 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 149.655576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 149.664968] Call Trace: [ 149.667623] dump_stack+0x185/0x1d0 [ 149.671310] should_fail+0x87b/0xab0 [ 149.675083] should_failslab+0x279/0x2a0 [ 149.679235] __kmalloc+0xc2/0x350 [ 149.682744] ? mpi_alloc+0x58/0x290 2018/04/22 09:01:33 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f0000000180)=0x5, 0x4) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r5, r5}, &(0x7f0000000140)=""/5, 0x5, &(0x7f0000000000)={&(0x7f00000000c0)={'poly1305\x00'}}) [ 149.686462] mpi_alloc+0x58/0x290 [ 149.690026] mpi_read_raw_data+0x265/0xd60 [ 149.694321] dh_set_secret+0x375/0x620 [ 149.698325] __keyctl_dh_compute+0xcf9/0x1ef0 [ 149.702915] ? kstrtouint_from_user+0x373/0x410 [ 149.707637] ? dh_exit+0x30/0x30 [ 149.711063] keyctl_dh_compute+0x22e/0x260 [ 149.715359] ? SyS_keyctl+0x76/0xa0 [ 149.719025] SYSC_keyctl+0xd31/0x1830 [ 149.722917] ? syscall_return_slowpath+0xe9/0x700 [ 149.727868] ? fput+0x25c/0x2e0 [ 149.731237] ? SYSC_write+0x2f0/0x360 [ 149.735128] SyS_keyctl+0x76/0xa0 [ 149.738675] do_syscall_64+0x309/0x430 [ 149.742623] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 149.747597] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 149.752812] RIP: 0033:0x455389 [ 149.756022] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 149.763768] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 149.771070] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 149.778371] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 149.785673] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 149.792969] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000c 2018/04/22 09:01:34 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000003080)='/dev/sequencer\x00', 0x222200, 0x0) setns(r0, 0x0) 2018/04/22 09:01:34 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) socketpair$unix(0x1, 0x800001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x16f, r2) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f00000000c0)={'veth0_to_bridge\x00', {0x2, 0x4e22, @multicast2=0xe0000002}}) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) r6 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x2, 0x200480) ioctl$KDSETMODE(r6, 0x4b3a, 0x200000000000000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) prctl$setptracer(0x59616d61, r7) 2018/04/22 09:01:34 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x8000, 0x400081) fgetxattr(0xffffffffffffffff, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x1, 0x101}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={r1, 0x1}, &(0x7f0000000140)=0x8) 2018/04/22 09:01:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040), 0x0) 2018/04/22 09:01:34 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x10, 0x32, 0xffffffffffffffff, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000049c0)='/dev/sequencer\x00', 0x0, 0x0) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000000)=0x6, 0x4) fchdir(r0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000004a00)=0x30d4, 0x4) socket$pptp(0x18, 0x1, 0x2) 2018/04/22 09:01:34 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x200080, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f00000000c0), &(0x7f0000000140)=0x4) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000180)={0x0, 0x7fffffff, 0x10, 0x6f2, 0x1000}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000300)=@assoc_value={r6, 0x5}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0xd8da, 0x10000) setsockopt$netrom_NETROM_T1(r3, 0x103, 0x1, &(0x7f00000000c0)=0x200, 0x4) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:34 executing program 2 (fault-call:5 fault-nth:13): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 150.131656] FAULT_INJECTION: forcing a failure. [ 150.131656] name failslab, interval 1, probability 0, space 0, times 0 [ 150.143130] CPU: 0 PID: 10488 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 150.150095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.159484] Call Trace: [ 150.162131] dump_stack+0x185/0x1d0 [ 150.165819] should_fail+0x87b/0xab0 [ 150.169597] should_failslab+0x279/0x2a0 [ 150.173758] __kmalloc+0xc2/0x350 [ 150.177276] ? mpi_alloc+0xe3/0x290 [ 150.180988] mpi_alloc+0xe3/0x290 [ 150.184552] mpi_read_raw_data+0x265/0xd60 [ 150.188845] dh_set_secret+0x375/0x620 [ 150.192834] __keyctl_dh_compute+0xcf9/0x1ef0 [ 150.197420] ? kstrtouint_from_user+0x373/0x410 [ 150.202145] ? dh_exit+0x30/0x30 [ 150.205577] keyctl_dh_compute+0x22e/0x260 [ 150.209869] ? SyS_keyctl+0x76/0xa0 [ 150.213530] SYSC_keyctl+0xd31/0x1830 [ 150.217437] ? syscall_return_slowpath+0xe9/0x700 [ 150.222358] ? fput+0x25c/0x2e0 [ 150.225894] ? SYSC_write+0x2f0/0x360 [ 150.229772] SyS_keyctl+0x76/0xa0 [ 150.233320] do_syscall_64+0x309/0x430 [ 150.237261] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 150.242249] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 150.247464] RIP: 0033:0x455389 [ 150.250668] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 150.258373] IPVS: set_ctl: invalid protocol: 127 255.255.255.255:20004 sed [ 150.258423] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 150.272706] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 2018/04/22 09:01:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000000)={0x7f, @broadcast=0xffffffff, 0x4e24, 0x0, 'sed\x00', 0x20, 0xffffffffffff0001, 0x6c}, 0x2c) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) eventfd2(0x0, 0x80000) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r2, &(0x7f00000000c0), &(0x7f0000000600)=""/4096}, 0x18) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$KDGKBSENT(r6, 0x4b48, &(0x7f0000000300)={0x5, 0xfffffffffffffff7, 0xfffffffffffffffe}) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf042", 0x9) 2018/04/22 09:01:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') signalfd(r0, &(0x7f0000000000)={0x7ff}, 0x8) 2018/04/22 09:01:34 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) set_robust_list(&(0x7f0000000280)={&(0x7f00000000c0)={&(0x7f0000000000)}, 0x25c4, &(0x7f0000000180)={&(0x7f0000000140)}}, 0x18) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 150.280005] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 150.287305] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 150.294598] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000d [ 150.300463] IPVS: set_ctl: invalid protocol: 127 255.255.255.255:20004 sed 2018/04/22 09:01:34 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000003080)='/dev/sequencer\x00', 0x222200, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0}, 0x10) 2018/04/22 09:01:34 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) r0 = open(&(0x7f0000000000)='./file0\x00', 0x40180, 0x4) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000040)={0x3, 0x1, 'client1\x00', 0x2, "f537e1ee15a558d8", "673fed3b0a5a421b123519d3efb3a3cb20b5479ddd6266431ecab57654a861c0", 0x6d1, 0x9}) 2018/04/22 09:01:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x10001, 0x7, [0x5, 0x0, 0x5, 0x6, 0x6, 0x11, 0x80]}, &(0x7f0000000080)=0x16) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r1, 0x74, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0x4, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}, 0xfffffffffffffff7}, @in={0x2, 0x4e24, @multicast1=0xe0000001}, @in6={0xa, 0x4e20, 0x100000000, @local={0xfe, 0x80, [], 0xaa}, 0x2}, @in6={0xa, 0x4e23, 0x8, @mcast1={0xff, 0x1, [], 0x1}}, @in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}]}, &(0x7f00000001c0)=0x10) 2018/04/22 09:01:34 executing program 4: stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$get_persistent(0x16, r0, r1) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r3 = open(&(0x7f0000000000)='./file0\x00', 0x100, 0xa9) r4 = syz_open_dev$mouse(&(0x7f0000000500)='/dev/input/mouse#\x00', 0x800, 0x2) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f00000004c0)=0x0) ptrace$setregs(0xd, r5, 0x200, &(0x7f0000000600)="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") ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f00000000c0)={0x0, 0x2}) r6 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, 0x0) r7 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r2) syz_open_pts(r3, 0x501042) keyctl$dh_compute(0x17, &(0x7f0000000100)={r6, r7, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) mq_open(&(0x7f0000000580)='/dev/input/mouse#\x00', 0x80, 0x5, &(0x7f0000001600)={0x2, 0x4, 0x40, 0x2, 0x7ff, 0x400, 0x7, 0x9}) 2018/04/22 09:01:34 executing program 2 (fault-call:5 fault-nth:14): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:34 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000000)="01", 0x1, r1) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x0, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:34 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vcs\x00', 0x101200, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f0000000140)=0x9, 0x4) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000180)={0x0, @remote={0xac, 0x14, 0x14, 0xbb}, 0x4e24, 0x4, 'lblcr\x00', 0x8, 0x0, 0x36}, 0x2c) setsockopt$inet6_tcp_buf(r1, 0x6, 0x3d, &(0x7f00000007c0)="cb6fbb1d8d23c655d552a59fe1a2a813115e6b60609f3ab08d17c1098f336628330d6c5172bb3e7d141c5979e1a692f901ce8c4955a4109463a5d9642094fe8c3deaac74740d7d1f7a7c95006d03cc296f4991d15f37995270af5bc67223fc365700b8896b4d4d01cffa248ebc72d03fbac4df5cf6d9e72da963eecd5e34216524fc9f598741209de2d688a6e0c7eed24b99e3f6f7ce4ee1e6fdbade15299bbe1b5c8486d604e0cad569decf9a6f5599b98658cd9bad1d911189c8bc7f4309041816c9abea629c5e3b6e1917cf3a2dd50ccb6ad5e57e416d96f1cbd460935c2f8c9c9c65da9508b94d076b1876", 0xed) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000700)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x0, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) open_by_handle_at(r5, &(0x7f0000000480)={0xe7, 0x257dcad0, "a0f5a434a3736362dba717c865136b9632edf50f582b05860e7af75d3c67d5ad0219489fecade0eadc54a463b680f551ecf649426315ef59d247beadf0d886ce1d5ff7b86d9ec23008144977cbfe3478a7e6ab06d1c1c6be4826fb090233a550692d0c190bf3d83df34f0c0e89f314d582b5107fd2ce6c204b99aca046721e109c8f44cb718db3ae56884540612f12aaa2a1770d5eda2fbb9fb9aca36fe0013f7c87d94238bdc37c50dd3f3874df0ad360e566e83a50b0e19011eb65031a56deefd4a0ecc86f4a08bc26dd8e6b25e0e0f1afbda4a4d3c76cb8b5222da373e7"}, 0x901c0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000280)={0x0, 0x0, 0xfffffffffffffffe}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000600)={r6, @in6={{0xa, 0x4e20, 0xfffffffffffffffc, @loopback={0x0, 0x1}, 0x6}}}, &(0x7f0000000340)=0x84) 2018/04/22 09:01:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf042", 0x9) 2018/04/22 09:01:34 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x40402, 0x21) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000140)={0xa6, {{0xa, 0x4e24, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x20}}, 0x1, 0x2, [{{0xa, 0x4e20, 0xfffffffffffff398, @mcast2={0xff, 0x2, [], 0x1}, 0xfffffffffffff801}}, {{0xa, 0x4e20, 0x3, @mcast1={0xff, 0x1, [], 0x1}, 0xb966}}]}, 0x190) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x2000004, 0x20051, 0xffffffffffffffff, 0x2) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:34 executing program 5: pselect6(0x13, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0x8}) 2018/04/22 09:01:34 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000006c0)="8e19ef9f3605bfca0976586b69a059cc3c747705b7afeea3be3351a00b8417c8d0fec4b96eab99f1c0e9d2000000000000000000003c68057b0cce47f29088971cb9665c585f6ebd5a4b54e8021e97a563042ba0c5af26431893e90b19cd13e23b6aa23ee9aa7e932c50b9d9841a7356f3835a1c556834559b1aa6ca208e078d40b67ca9c0f84b346c2af70b140c6faa6068e6e249b1a1bd1fcb5f888062c0cbab4b57d96a5bd7e090ffdc652faccb15e4a893a8f081ea", 0xb7, r0) r5 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) ioctl$TIOCLINUX5(r5, 0x541c, &(0x7f00000000c0)={0x5, 0x95c, 0xff, 0x5, 0xfffffffffffffffb}) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:34 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) getdents(r0, &(0x7f0000000000)=""/1, 0x1) 2018/04/22 09:01:34 executing program 0: mmap(&(0x7f00009e7000/0x1000)=nil, 0x1000, 0x0, 0xb3, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000180)='$vboxnet0-&user\x00', 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r0}, &(0x7f00000001c0)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0xe00a42a30198d51, 0x0) getsockname$llc(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000080)=0x10) 2018/04/22 09:01:34 executing program 7: r0 = add_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000600)="3a4d8f87031864c26e51e3482f22c16560d79b4577fbec8ef9254951ff540e48dcd924af146d17d78b366d2beeecc5e471d91749c1baab3b8f4bdbd0c4b8dd1bc797f4eaaff68d8208186064314a36948aa8eece1d70f36278edb03e4226d8eab42df5daa946d6fe4af932dee5513c4080f32e36dc31b2c6b2132d613f75ed12b430078211339127ce765d89f4a5b35a5eb84d1039b5919e32c9", 0x9a, 0xfffffffffffffffa) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) r5 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x6, 0x8000) accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000140)=0x14, 0x800) getresuid(&(0x7f0000000180), &(0x7f0000000280)=0x0, &(0x7f0000000300)) setsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000480)={{{@in=@rand_addr=0x8, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x4e23, 0xffffffff, 0x4e23, 0x0, 0xa, 0xa0, 0xa0, 0x5c, r6, r7}, {0xfffffffffffff801, 0x6, 0xa333, 0xffffffff00000000, 0xff, 0x80000001, 0x4, 0xb641}, {0x40000000000, 0xba7, 0x0, 0x7}, 0x1, 0x3f, 0x2, 0x0, 0x3, 0x3}, {{@in6=@remote={0xfe, 0x80, [], 0xbb}, 0x4d5}, 0xa, @in=@multicast1=0xe0000001, 0x3501, 0x7, 0x2, 0xfffffffffffffffe, 0x3f, 0x8, 0x3}}, 0xe8) 2018/04/22 09:01:34 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf042", 0x9) 2018/04/22 09:01:34 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x2, &(0x7f0000000000)=@raw=[@ldst={0x1}], &(0x7f0000000040)='GPL\x00', 0x7, 0xf3, &(0x7f0000000080)=""/243}, 0x48) 2018/04/22 09:01:34 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000480)="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", 0x111, r2) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f00000000c0)={&(0x7f0000000000)={'poly1305\x00'}}) [ 150.884944] FAULT_INJECTION: forcing a failure. [ 150.884944] name failslab, interval 1, probability 0, space 0, times 0 [ 150.896398] CPU: 1 PID: 10542 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 150.903362] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 150.912760] Call Trace: [ 150.915424] dump_stack+0x185/0x1d0 [ 150.919138] should_fail+0x87b/0xab0 [ 150.922919] should_failslab+0x279/0x2a0 [ 150.927044] __kmalloc+0xc2/0x350 [ 150.930601] ? __keyctl_dh_compute+0x1253/0x1ef0 [ 150.935447] ? __keyctl_dh_compute+0x1033/0x1ef0 [ 150.940293] __keyctl_dh_compute+0x1253/0x1ef0 [ 150.944971] ? kstrtouint_from_user+0x373/0x410 [ 150.949719] keyctl_dh_compute+0x22e/0x260 [ 150.954013] ? SyS_keyctl+0x76/0xa0 [ 150.957671] SYSC_keyctl+0xd31/0x1830 [ 150.961566] ? syscall_return_slowpath+0xe9/0x700 [ 150.966470] ? fput+0x25c/0x2e0 [ 150.969839] ? SYSC_write+0x2f0/0x360 [ 150.973718] SyS_keyctl+0x76/0xa0 [ 150.977264] do_syscall_64+0x309/0x430 [ 150.981216] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 150.986199] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 150.991421] RIP: 0033:0x455389 [ 150.994630] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 151.002386] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 151.009684] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 151.016981] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 151.024300] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 2018/04/22 09:01:35 executing program 7: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r0, 0x80605414, &(0x7f0000000140)=""/88) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:35 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x6002, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f0000000480)={{0x3ff00000, 0x5, 0x3, 0x8, "96d1c475f8e0de37653a661c870bf69abff93d08e2272fe6ea1bf84d0c496cde9bdfd86657ea9e30d6f45a30"}, 0x0, 0x0, 0x3, r3, 0x40, 0x2, "2156b11c96a9f75008ccd37b3a7ac5d07d028b9b728d747531960f5edc6b049866e04037df72c1a3f67216cce12d1fb3fd13d7e627323d1ffcb25f0e3dc8c40a", &(0x7f0000000180)="af6d696d655f7479706573656c66656d313a272d637075736574766d6e657430e900", 0x22, [], [0x5, 0x2, 0x5]}) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r5 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r4) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r5, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000000)={&(0x7f0000a3dffa)={'poly1305\x00'}}) [ 151.031599] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000e 2018/04/22 09:01:35 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c01", 0xd) 2018/04/22 09:01:35 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000400)=""/167, 0xa7}, {&(0x7f00000004c0)=""/141, 0x8d}, {&(0x7f0000000580)=""/240, 0xf0}, {&(0x7f0000000680)=""/215, 0x43}], 0x4, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x0, 0x0, 0x20, 0x2, 0x100000001}}) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000780)=""/216) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000300)=0xb2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, 0x830, r0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x6, 0x1) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000000)={0x3, 0x100000000003, 0x7, 0x1000000000004, 0x9}) r2 = getpgid(0xffffffffffffffff) r3 = syz_open_procfs(r2, &(0x7f00000001c0)='maps\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) dup3(r3, r1, 0x80000) 2018/04/22 09:01:35 executing program 4: unshare(0x20000400) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f00000000c0), 0x2) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) ustat(0x0, &(0x7f0000000000)) 2018/04/22 09:01:35 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fdd3950c15aa51ea891b140b90e3ad24da", 0x21) 2018/04/22 09:01:35 executing program 7: r0 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000140)='keyring\x00', 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:35 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000600)={{0x7f, 0x45, 0x4c, 0x46, 0xfb6, 0x400, 0xff, 0x1000, 0x5, 0x3, 0x3e, 0xfffffffffffff82d, 0x1ad, 0x40, 0x2cb, 0x2, 0x0, 0x38, 0x1, 0xdc, 0x66, 0x1}, [{0x6474e557, 0x8d, 0x5, 0x80000001, 0x2, 0x3, 0x5, 0xea}, {0x5, 0xfffffffffffffff9, 0x400, 0x0, 0x5, 0x6, 0xfffffffffffffff7, 0x8}], "6457ffb070865c651eafbda216f101a58c39ec5d62235b64b7db1a0c10b69a42850af6155a33d7b8d7dad8a8f20eec2b5f513bc4d3792fec82c203f50bca2a5542b4540aa84f5edd845d2c7a345960b7553abfc59ab7823514b8b25ceafbf75d7563b939ca936b31ccd8c5de9bfab00148", [[], [], [], [], [], [], [], [], []]}, 0xa21) 2018/04/22 09:01:35 executing program 2 (fault-call:5 fault-nth:15): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:35 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x200) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000040)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000480)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f00000005c0)=0xe8) lstat(&(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002980)={0x0, 0x0}, &(0x7f00000029c0)=0xc) r7 = fcntl$getown(r0, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002ec0)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000002fc0)=0xe8) r9 = fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000003000)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000044c0)=0x0) stat(&(0x7f0000004500)='./file0\x00', &(0x7f0000004540)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x7, &(0x7f00000045c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) fcntl$getownex(r0, 0x10, &(0x7f0000004600)={0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000004640)={0x0, 0x0}, &(0x7f0000004680)=0xc) lstat(&(0x7f00000046c0)='./file0\x00', &(0x7f0000004700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f00000047c0)={&(0x7f0000000080)=@kern={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000004480)=[{&(0x7f0000000600)={0x22b0, 0x2f, 0xc05, 0x70bd25, 0x25dfdbfe, "", [@nested={0x40, 0x7b, [@typed={0x8, 0x1f, @fd=r0}, @generic="cd277d", @generic="0574bd1bac14536e2a29e074f77576a284407678b70618031b858fea4120c7", @typed={0x8, 0x45, @u32=0x1}, @typed={0x8, 0x82, @u32=0x5}]}, @typed={0x14, 0x67, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}, @nested={0x1070, 0x2c, [@generic="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", @typed={0x8, 0x79, @uid=r1}, @typed={0x8, 0x4, @uid=r2}, @generic="f6d7655f1833cbf4bcec353d1c26912e2a232e28119c219c06625a86e73a830119b06a51ebf103d43acfacfa6c740d2a016efd58d5091d27e35c821b2b55", @typed={0x8, 0x41, @u32=0x4}, @typed={0xc, 0xc, @str='*vmnet0\x00'}, @typed={0x8, 0x2a, @u32=0x20}]}, @nested={0x118, 0x5a, [@typed={0x14, 0x8, @ipv6=@local={0xfe, 0x80, [], 0xaa}}, @typed={0x8, 0x1d, @u32=0x6}, @typed={0x8, 0x10, @uid=r3}, @typed={0x8, 0x6c, @uid=r4}, @generic="52951ba5037bb4be52a07689b41cdfd66396ba58389ddf2549d639a728c82b03a44c13b11ab0d92103fc6253ac3bd0fb565d19ed6c338ec58db1414b2f0bcba1e3abd31f06cf1c80344a4fb6f7b758da5a556af21a607a9a24f8b9fbddf291a0fbd3850c3be0ab52c8c68d66cde2d8071de5a5f94fc5ac78950588c1286b7b2a26a4f1a3943df5cd50e90f36235b43720411e8f7d37738128806075af4082f530a8a44e3054e047405ef4335d4e1d1523f4c45efbc63cd1a969e3bab8f32cbbf87b7", @typed={0x18, 0x7a, @str='*bdevuserselinux\x00'}, @typed={0x4, 0x7c}, @typed={0x8, 0x38, @fd=r0}]}, @nested={0x1028, 0x63, [@typed={0x14, 0x1b, @ipv6=@mcast1={0xff, 0x1, [], 0x1}}, @generic="6e89c7fda2aa5ea5ca84bf5682bc5ef0c720cf88de7231b2b135bc4431bbd05980032b58c2d8fa94aae71c0d03edca6a4ae32d640261e53ad366eb5c0d56fee2a98566a9ab70350039a0f8436afd67f643b4469ea91774f9b6f339b45902508e5eb5f73dd54bb93429f0fb22c7450f5da2770e3603a254ddec8d4ee12fcdce722e0c73ff8607d310d01a66f49b00d3ed61521bd763291bc3c8342448c6232deb22325382329be104a25467ce8cd77db8d5fa81bd913736f2919d9cc6900bafb8ba333abcdf8c74fc047e001fd5d1c13a7688bce2a618328a866792d62a6de1a892494a0011bc1f9bf330ebdf60acef806e7e971a1566f78ca0dbd94df7793a937e5a01caca6dc3b7c33f8bb5a185e99aaeec8b87b8f6d19b5da7bdfb10fc2a0f2f0667744650991c5550c7f36bb27bb1c6911e1bf7499ea0b51b1abf3a867d7ed9acdfe378ae30d99affd5910bf78c7af16cd8fbc55073b0b5f8f299b9f4b183d51918dd58024f11d9db3c10ed012a18b96259445186656a0e4bf4f8841af24a2e9ece6b50f10f886bb11aff227bfdda3ed0ef1fd3a60da22d504eb14351f88a453bad714256447c3d63591c01c200207cc22d26083fd6c1b0f41d2e5bf2a55f91dd1767628b87fc9f0933a24e51331b34e45adfae8321b2f2d2cee92e0bf41d7ee88dcdca9deca9c298ef98de8561e9d8e653d545f4c16da06736db229581d051c0bee35f04225a5abb727888a3086c5f3de2b935a9495f5a60f93121ead4725d1ca6427bbda50a65ce267d1d8f123f923bfbfc3527e12ea9985b3c1a1974fcd35cfb2040c3a4516af9adf2123d90de3675bdbc585581945663cd74595ef7fa04b8697aa624f63e35754f755517e479a4a5a1f74f8ab4004795206dcbbe5aab1ce5bb1c1c4b1b0f522a58f8e64e853c2e5b03d1cd352be2ef560d2855215da75fa4799a8f08a747422694b8aeab473b3f8cda5788b750fa6f7618b21e51505fd574000371c27400b1ab17e4736a5047d79f141b09b7687389edeb62701dc46127a8e4e0e78194f1cc58c66ae901f8567099c0f1f7e660b5dde6e0b6bb0c70831c2b68867126f964c10736c2b3a04e56cad37d501a95f7b3f8f6810383385cc2a09af9c246aaa64edd5a7fce03e2244afa19fe4c5bad472b71f8a551eafe37a589dd3c0db854c3d45f9577bbe8099ae27b6a7711873850442d4347a56c4dd10f39383f88291c0c45d4e2186efa43f9a6e69040227177bf53e5f2705f727f27137f0b1ae848e8a60a510e898b1f476f203c3a00b266bbebd02a6cea937e63cc5ee80e3f7c80fd0ec6e2c4e7181fe19c4f1338a03feb03b85c4035bf4dac602f1d54576a3359d7c92ad6ac8706b3496a09c22fb9518ad72c824ba5a49bff66b57ee6a60b640c183fd424a4ec0ede6df7023217c7b786f523c1421a090abce28c3e921d0a03483c639d183603e178bc2ced464a5171c648e7a959df3591b55800e034e23be0dca19297bd2b99d054b65390a7fa7aa845675c9820ac44addaf800a33388e7c9e948570ac3619083d64ce80f8bddb281017ac2633b95719a5169daeba23a4ed616a992aaff9fbbd04875b9314d1bf27532737b67a5cd143959ceb557c28cd2bcdf178225220c6f8dee84bfb94f7b084f1029174fa3ac4aa4a59343437d385b41760a0c56cad85efdd00f4103d3a6ca97d101926429b039417717dca1087db34663e141edd18faa156591d9d4c2f64ebabd0ed810c0f61953c40ef486ee7d4cd59da5e67eada49e8aea84a3e4dae977d99938fb2e2a32cc42303c1457a7abb257c02d3c66e8d6d3b8b5041dcbcb6c7492ba9836d21430e92233c91c0162464dc3333a48995570c3a9fc05a0d78049fe459744151b84a88e09ee19187b388bda6129d95828f0e6162dafd24e703cf379dfb04afd35f1a4184c8f47d0053bf46323a8fbde846a7258253aa0c0a4bf208a696c0d5d8ba181a23f09a4385acb47dd381fd8c158c2249c171c7e19b070c1d82e6a2742f31dc75d5a8c262a49968b88c0a3d3fe76e51a6833ae3f76bfaef449e279c74f3a99127dca4aa21f7b3c132ef4b3de466646411f338471bdc232489f25bd223527e042ef1d958ca459dfdddf97a36318291e4982399a332e31c1ef30b290897611ea98371ceeb6e28bf21965f7d7a8feddf3124beb23cc8b278f47eb9d5a788a7d9ba7238018e521722235a0ce6a83c30d7f9c369d6b9dd2df311b98d89a5fbd933ff90bc30fb284877e8bad0a5ed7183ac071b66c77e51c4a92004261564d9b9a43faf1d2103b11e18d47f6c11b13e8166cf4859109bb34164f8d652a6c8fa43863a0030e7d3a80f587fa00670bfea41ab63b52f7f65c34df5446ef22a07c70e20406d2760f1d214c38588ac276c1310655ae4b34a77436b626490d8a3b66363a0c56b5ba9c882b19f9fcca5f8c0c714fd955e2c53f03d36c962e8860682e45eb345a7b78023ac87f4f04047f3c4047573350d0dda15546f4d4e72cefc0bab3bbd669ed27cdde76ac6a1d31a7bd9ddf40e94995082c30bab632bdb137f9690d278d2c53c202ff6e93a4428d4e7f9c665b0c46bd8911f1b9e46971f05ddc4294830398effaab6024c15c7ef1357d81de6b37dd84f547b2965e70f56547425905436c8cb3e7a98c3cc3f64457028f93b3837116b3a7d62d07dc4d02d9b15a52e6fd475516b95a26bd975d9d519964b429faa8264900131e12003e853f98ab201a29c3454540110ed86d6a2fa718fcf8a561c91b3482495e8d5d40b1373b0c73f723ab6dfbdb7b777971ab8a6db5851aeaa1ac657bef5a5c2cea398465366dea9713d17c95eb6a775d9fb37366a8382a870810d07298f61bea394028336ea77f34651f90ab5c04cc9edd805ca8d0c2be3198d63f9c9b66439e24a0b400ab6e0cd779526714dfaa4babf6c960b265153fd05369ad60d834c0c2a0dc44684b70b4c3479efb635316b64b99c1480993c1f56cb2cc86d28a2ed992e5b18d3081bff393c8036ffa72ac293e8978d6ed3cef4137f955b878d7b334b3cc0be1e2b17b19104f2b9597cb8cf8a02a12eed044351d5f65997df282562d05efb2f575ebf8224868f3b4e959b398a5908cec909e6fc45ada9a7ab2bc262d596b6dad90fe659893e85cbaee44be5a3f1ba43672534ef48a631730ff0597b08dc9ff10b4d9452a524d41b073f929db51b4e53aeb703512044e4f23748b489f57b2e6a2960624a90c8c0ee34782b517672292cbeaa930d98689136bc452d13a82c4268de7e436f9f83eef8bfa3823915d97206b138cb7e05cb1cf352d53e37eb7412552c11b945b2b05aee5256212fd4011a5e1c4a48cb80cf7976ed905a85caa1f81ee37c94e75b0431cbaad9f68a585fc03e234ee1f9e347d12987726a367e07047290ee6a6fd68c525a97b7bd722c8580f992f614ee2751d96e91ea8bd46dc099b024cad87c9a063fe88789ee37bef626da32bf36dd68d804678aa310b49f61685f133d2f87507c7674e615b4863f050afc4b02092191c04ff0f61c572c5378d1e7ee8cda635f1d1b92eea592b5447ea6750aa188e6e24fb748ab087173bdc903925d297904f3cc7939464859a210cc1e18dbb93ffc90ad6a7436690e04275a7d4c906f71d27fc31f70e4640c94bac2d4e94426cfe219aa4a36a7b5495507c961c86a281764ff32d2d642197cb401e6ab58cfbf9451b633cd6217d1c7dfc37813ad84f6b23c01d2c8742cbded2473a2a7c29befa887f0d8783b85514e306c926b0038da2faf61887e4267822714e5eaad1f98f23267751d2728582af3c9ac2a59d77e5a01611291419f93c345f08e09e52a5950ea2f47c6de9d012a7777561a0ef9e25eae7009f90ef40eb575b4ad36eec732e23142f6e5d7fe026148ffc2ffc3192762b39a368479996daeebd13ef497beec31eea069a8b4facb141863044fae0dc3ca23ad6d718af5ee3631fbccc687cc9c3415beb2ad74145518ab2f48c796e728c202b93b26790958824eb205e1ade471d55eba78b1462f613ddf05714ab3e026d8896516edb541664a530e70461d108f6d7947b9e4350a1f06a3622f3040d4b9320a352a772201da33333e51fc94c24818045a94930974c949c18540b60b8630df5f381bdfd137df179a6419eea91c48f458256a7e7bc11795ba1299083fc9214237e527cffb798e894ad7cac6786611c71592308c182f3ffe5910a27618c8a6ee3835338992797707b4cfd716483248c44891b7db22967668ebe3bbb1a98fb5ad4207cf59407fb5cfd3658553f9561f4c40eafc0fe31b83f97359a1d8b4cc89c4ae88a6a9913c84a94bc7593b19e0bd0a979c7571e905a8fefad15d3525ab09cbbb763b39225a2a09aeda3443c3e1e921e3a4798b276f25afae922ad7c99c714c38add7844424c503f3238427bfbe81bfbf7bb4ce365059d7be10c773e86a39f8727d04331d7b5278a8b43e4d492c8df93eaad284fb586ad8475a98df393531b9ea841da413fdd8d5ee7c5825af4fbd00c168d2660678ed286c922d7bb70334506957684d54bdea9459cbf934510f88c5a3ee28f522135b46591e4fde640d6cd3f31764f90034dd1d12ccb35a48b4b84f76390dabb517dab54811624216711c7873ba1a262d8a189d8dd1de58c13271e814b714f671a8aaa9897f9fdf2b77a020ad637c3daf86eed9ea015386f30e2d63e3e65f8536a266fc2091e168350c3f6b7aa1958475e7cb1eb398084c0c588d3b0ea25c133724bb730971d9f76ceb44accc1a28f324851e0180ed86c296b5ce6feca2569c7f1f48dd76f76322258378b55d2cfd3fc414969bc38ad74f40749e5fb7352a78577293fd97e17bc52461ee90a269c14b9e53eab98a4d4c36c3bb0a9074633553d3853bb7eb6fc70c15c6283675d85687b76cc34026ecd83a9c3670bda8233b9d5773c48e0688fc4a191a3182face654af70c468e84bb1ad4a0ac25612e97ba7e6dd98eaea26382ced0799417778208dee3842f651952000b5e6f7574adde3885f7452fd2b016da0e21f284a9dd4c8710600021e581443618354d3eb5b2edff946cdf8537fa9c776c5f99fc6599177fe1febdba1bbc07b8299a7dc087fd228cb82aec50a7026f59a1cbb205cf42de0bac92ece49ee88ec5d34d7c279587c82a1c0ea88e815b22b64b8f207a6ce8934bf7c8f3b884a4c0328d12e28e1051d2aed6456d13816d20cffcea4a4049c5f26e4cc2718c32d7dc254fb71d93d2352bf4e8bab3f3994bb51505d344f7434e5be7898898892edb6f8786baa785e7a22a968ce801448150fe60c094d62ef33aac565918a9ec6d4234c645669703603ddd53609361d48de91d9a5419e2660fe54c4bce6c46bf7d2afa99221e8d7a558059e81f57c0ac9bf736ddb71e92cfeecc161b8d43d1d9799ea95b3b0dbac82897f631b933bb468b03c1129a15922131cd27d70fc949eca804bde6b01117e9629ea6c324f9c963023d2e49deaaa6f634320748ba323389ee88d0c82ae43d9a1a8667c48d453d966e0e886df14afdacd4f90405c9a2fd727882bea9a949ac845e533818729a3fffd92686386789524e08c1e76714ce007bc729756ccc4577854efc2215a5718df495a4a1c3922afbca5fec6e2f197dc8c58476d277bbbb91a4e3e594e86698c165f0164e91bd1a335ce3149f6a6a917ead081c283da1353325e6285514addbac97845ecdf9fab75527b5da0f28f1b48e1b6ecb25545e0f1472ea732a901f43980e9adce1f6aef846b3f03dd6d19f8c2b10d388df7179e", @typed={0x8, 0xa, @fd=r0}, @typed={0x8, 0x2d, @u32=0x6}]}, @generic="b462ea5c3463b035fc9779644d957e88f0b977cb739b53f50f4a785a6a9292e8c644d29983e201b94126a9d4fff62163a0552eefa1d78e777571d88348d772317b24490a33e79a36fb2e89862a938257d050a1b094336021d75c31a1720444bbbe0deafc2d559da4b2b4eaf81f12eb78e368317387e4b36d82cf7cea892661ced147a75111e52814218168a2dc1fc5a20a72d1e06dc360e8d77318cb"]}, 0x22b0}, {&(0x7f0000002a00)={0x4bc, 0x38, 0x300, 0x70bd29, 0x25dfdbfb, "", [@generic="da1084b275cd1cee7e3a5b8176723e02b27a30667b1366aa418a7dcb6ea0a6478b1467e2e661ad453c9a0c0ac61c1e99006401c828b046860cc1ced75a204c8d", @nested={0x94, 0x2f, [@generic="082bfa5ac4af89c0546028b98c50389a4b99b44b40abfbadcb6dd7755c525b331f4483afe0ee7ba3df7e111c8dbb4e3609deca4e5917f6d88c6bbffc3f236e8d4eea6456fab708789f861ac85d03a2aebca3c112c98a0c438f813e0934688da2abd5a79db8e1c5273f8e1c58b0d305efeae0b761865cd3ff18513d628d42b65826bc00ebb278a561de03d2b346"]}, @nested={0x2a8, 0x12, [@typed={0x8, 0x5b, @uid=r5}, @typed={0x8, 0x3, @ipv4=@local={0xac, 0x14, 0x14, 0xaa}}, @generic="0c4792dee3c136513ed8421241628acd29b13baf0d865ac7b3c8e399babe6c947ea5d562ec13cea1ddcdd289c1182f4a35132f5853ef5384dd8b88a0f8ad54975f2aae019064c78b461c4600eb397cf230e897ac94c1252b608d3483d3e81d41896be133c1499aa9a23a1f57043b1d208a448868c7c430888395e0534abe1d78b5610ff6d90f8f981a8de4fe6c4e33be2a8988caec18c36398f48559e9824e148bf74f81ddec1b98514ebc1a7a2f3e1408d9d4849dfa14d0f1faac603c2eb7a957fa086ffb3e843dbb502933df8cb745d8fbceac826029b0940866ff625aa39b21aea72fe80896540b169f6fa5a199db57e0a34dfa6d46", @typed={0x8, 0x32, @uid=r6}, @generic="e06b5d648f170fc96de8981f101fea635247b3e14b33a452e9a61f6abd3ab5792881cc7d5618ee2d03b7e3028ad25f440c12b485216e67b44f6aa38580184af37765ac671db41820025945823c2586dbfbbd2e68fe04862acf1ca6a1d2cc37364d1983bd9cd18b754cc7661742", @typed={0xc, 0x1a, @u64=0x4}, @generic="7954afbfe5a166a795039bdd66f23bd972040c03bdb5e38f2ea835c164e5c7818d84e3dd13c415b7a3e206a6a8e989e908b32f7b7fc00386a0f2747071234d2ecba4bfde9798d29de8ed0d5b11f80a863212a9da115dcfd45b18425c68d30395b4eac6b09e52292746b502d0f458adc55b1267b46365632332cf38777b1b5e026088b45614cfd9b305d2774446fc820a15aa2441f1ba388e2f6107cf75dad66946a6643efa2b87ad11a7249dec6e37b2481bf4", @generic="99af13309c195a8acb9a5d65947becc5df843b", @generic="a2661d7a72d09d6e71f3f9fc97da5754981dc44e67e966c8e7e0a4ae120c8497cf6f856b86f5a2e1982992ffbe9f43eea433eacca27e1264d813364444bef8e7adc5d740ac27a8461f104f6837f9ca26248339"]}, @generic="80ff34a64c8f24efce6121f11a4a5476a125667ea54979ec7caf48e308e1ed44d14f05c3496c4e6422fcf30603a0798ac23894f9a7c977f77ca5759fdd08f3814568049be59ac073dba6f55d595c7f3739db3c95a1ab0433d19b224315c7408b517cbc3c3ae7c12ce4096976c7bf3e8f405ead0ed848af4456b5009625b5eaa162691aed88e4118f8ab7647e41d5cca04aff5fa8d2b695193d79a8030da758eab5cfb56bb6e7aa81774fea", @generic="a716c1828e798b23df277f18d0bd91e7e7523cfad2010b09c504c2ef74a93daeb2b93119aa32134800fcb2a4018da93be5ae776f5fee41812cc15626f02f064a11af91c6eafa829df894299c6c2ede2133238c54ad3dc468883a530fa860a9bf17c069af6733aad2baf40c7403f3bd5181a19025e2035031bfc6b3e2c68bc4", @typed={0x4, 0x91}]}, 0x4bc}, {&(0x7f0000003040)={0x1410, 0x18, 0x800, 0x70bd25, 0x25dfdbff, "", [@generic="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", @typed={0x4, 0x43}, @nested={0x18, 0x8b, [@typed={0x8, 0x4d, @u32=0x7}, @generic="7ba665", @typed={0x8, 0x4f, @pid=r7}]}, @typed={0x8, 0x6b, @uid=r8}, @nested={0x3d8, 0x6a, [@generic="165a7d1a655c10d57ad1a3383cfa170a36ffb9e36771f9f41ec8a889b74f32b00e97d7fde9209430755c6395a28ad075ee6efec38c608db8f65b8a58146274224bf665c41a0228fb77e4b20552ca0a258fe96d989efd31411b19b86d9e21972aa8636a953cfdfcb300a199da9ddf6fc1c8724d6960b8bd8f9ae3f685667d5e45152e691529edfdde556eb51ce6c9182a8887c5eb2a6104651f75934b6c15b2176661652803e785a17f697349ca1d18ffa91b8498f8bda748d151d536ae8a940d35b674d9a828d4ca5507eb722e3fdfb75e3f903cf8c4c67a64b9c31f0d8f9e472030bd01868370874911bed1b2ba87", @generic="7a32c08255070e4d9f37f07b89ea4a03050bf6388386dd40562c46e10d3d1702593f09b333fae87aab301665ab56864ad4ea1eea4427f49a9c144f0780c5fc0f6f445942488beb26cdade6cd4d1626770c24fd84f62920f014be75525e40db53d1ea36f5e91147c176f9e9d35a2f45e19a2c09fc16b361c9f359cede6116ac623e15d4dc8008831d45c753317e76246dc916a874c1a754873eb60f811eb871e3e0f6b156369ca77fa9b3cdc92e0e19dca60177a817a0d88bff3911cad80e5536ca94f581018117cdf4eb281220ab4ca7c7bc7345ec18a2b0a9ba2d4b78b1f0", @generic="914b495f8e04c9ac29cf539c585abd0fbf8b32fcc74173bf3ae629a446bc3703b04d10b5873a802bd7006ad5bfa6a95b2afa25ed6f82e35dbb1c9894dd824c3ed300f8a369c8b4c59cbca848ed6257944284599804b0d2fc8d3234cfb88097b058f3ba149a849e64bf914eb4b9550101acda4045d5f4e832c04d48ed67b0773e571e5f2547922e3aaf6b42749a596d364747cb63e2eafab2f401de902effc5019d02f1357c0a53aba9008e6fae835f2836690df664e7b3e75124a66de422305677362c", @typed={0x8, 0x4f, @pid=r9}, @generic="fc7ed7efbdf7867545ffa9ea33b990f89d5ba8f58172bfcb0691f2340223b0a892cb98d3e81e9911287531d486fb993510378b908ddf5984a2b08e299ecd4421af7641fadb241d46e870c4f052725b8de0d5edfd9005abe53aeb35ef901ffb834b48efff14f0443ea118d242f63f45b892e74f2ace4a525cf466a7cb4dab553ae2057c7406", @generic="4f5808ffbe51c7cfe08c2b7a54ff76821d34c87a04255855511e47019c933387c18402e24e92742bd8ae4a3792f16cbb6e76daa53d659ebe741cbda95977f39876ea7a42b4de8e1a11179f5765db03e9e3ece22ae5cf181fa2b229c68b7e1ec7b96b7ff5f91c329599b59e3acde5f1472eda6e5f4da7169d54a578c47ebd80c2dff0e2eb986ff6536fcfd806359f92b37f42155c4bfcadeac67cbcbfa1e3", @typed={0x8, 0x24, @fd=r0}, @typed={0x8, 0x36, @pid=r10}, @typed={0x8, 0x33, @ipv4=@rand_addr=0x7}]}, @typed={0x4, 0x29}]}, 0x1410}], 0x3, &(0x7f0000004800)=[@cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}], 0x40, 0x4044080}, 0x4000) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) [ 151.879536] FAULT_INJECTION: forcing a failure. [ 151.879536] name failslab, interval 1, probability 0, space 0, times 0 [ 151.890892] CPU: 1 PID: 10588 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 151.897845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 151.907229] Call Trace: [ 151.909875] dump_stack+0x185/0x1d0 [ 151.913557] should_fail+0x87b/0xab0 [ 151.917330] should_failslab+0x279/0x2a0 [ 151.921452] __kmalloc+0xc2/0x350 [ 151.925002] ? __keyctl_dh_compute+0x133a/0x1ef0 [ 151.929851] __keyctl_dh_compute+0x133a/0x1ef0 [ 151.934510] ? kstrtouint_from_user+0x373/0x410 [ 151.939248] keyctl_dh_compute+0x22e/0x260 [ 151.943539] ? SyS_keyctl+0x76/0xa0 [ 151.947204] SYSC_keyctl+0xd31/0x1830 [ 151.951107] ? syscall_return_slowpath+0xe9/0x700 [ 151.956013] ? fput+0x25c/0x2e0 [ 151.959375] ? SYSC_write+0x2f0/0x360 [ 151.963252] SyS_keyctl+0x76/0xa0 [ 151.966798] do_syscall_64+0x309/0x430 [ 151.970744] ? keyctl_restrict_keyring+0x4e0/0x4e0 2018/04/22 09:01:36 executing program 5: timer_create(0x0, &(0x7f0000000080)={0x0, 0x29, 0x2, @thr={&(0x7f0000000480)}}, &(0x7f00000000c0)) 2018/04/22 09:01:36 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c01", 0xd) [ 151.975727] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 151.980942] RIP: 0033:0x455389 [ 151.984149] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 151.991899] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 151.999197] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 152.006502] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 152.013802] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 152.021098] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 000000000000000f 2018/04/22 09:01:36 executing program 7: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7fffffff, 0x4480) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000140)=0xfffffffffffffffd, 0x4) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:36 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) r0 = request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000080)='md5sumusero[wlan1\x00', 0xfffffffffffffff8) r1 = request_key(&(0x7f00000000c0)='big_key\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)='digest_null\x00', 0xfffffffffffffff8) r2 = add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000240)="fd8ca17d5d2f9e4d3a93a6e0d5514cc0e7ec5ed82ab60926bb45ce8269a84770ae69353464935181334bd856505893c70b2c6e2443d90c0af00860a0d350c9206ab7f21a863d27f0c9edda07ed8d69c935bff2d919ba480f4a94aa2ba37376c56962479b2d0f1e677bbb1f5ad50ff0479f2f6e1292d5d2cdf0efdbb706a6b2443051b9e5cde076e3bc8be67eddf937716eeddf74c166c67c6a4ed49d732578a6ac343eeaa72dfd22ccdd77228da55cf6c346d46cf67165685bd69cfcc1f1cd1c519d0d0581dfa784fea02f988909b93620152967713211363abd296441fc69d8a5ca8e145a1f", 0xe6, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000340)={r0, r1, r2}, &(0x7f0000000380)=""/101, 0x65, 0x0) 2018/04/22 09:01:36 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000300)="374366225e414a240310143a48880ae6ab51ad35ec3e94db649b0981478346a4c8a44da6a7662dc1379907f46775da478b1ba3735271a14a4aef2405dfc2e783566b367bf94482bd8243bbb7a43844dc7f64772b2d350af2e949981e98fe5d6aea0d96672db087a4e055d3a9", 0x6c, r2) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:36 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000080)={0x0, 0xc9, "2baa0939c8232e5e499c366b73db900c8fa3203a476ca48f520ee8ff375d87d463426a1ea088eb394ce7b9a58205e5681a430a2ebe2aeb5b13b25d6bbe06cb2692de292ae23e403626a98ae136d20a80c6b85610bb78a03f7256e9a98851f534e5732542a35707e323fd3f895d22fa94cbb28a90a0a30e888b85a756fcf2555859ed12dd552e8de43eff2fc8cfc9508b0814cae007534f0da55cfa005210fb49e6873d61b22513ea39a48aa200e1111faa1744c5cfddb9220201de2f955aae05ab834981f5df97d6c6"}, &(0x7f00000001c0)=0xd1) memfd_create(&(0x7f0000000340)='\x00', 0x1) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x6}, &(0x7f0000000300)=0x8) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) ioctl(r0, 0xff, &(0x7f0000000000)="0f8ca6e0027cfe41276f017ad2fb4727ae9a32199c6675ae22149e32fee03f86142c92db236f34cc0eb556f420") 2018/04/22 09:01:36 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fdd3950c15aa51ea891b140b90e3ad24", 0x20) 2018/04/22 09:01:36 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c01", 0xd) 2018/04/22 09:01:36 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x100, 0x94900) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0x1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:36 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000000)="8ddb9b878e09c6c37f593d31f39894f4621d52ee71ceeb8a80310d4b5f1bb3ed666200ab549d796f1177c7ab0600000016ad9fc274a986165d38316c", 0x3c, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:36 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x4e5, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f00000000c0)={r3, r3, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000000)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) keyctl$unlink(0x9, r2, r2) 2018/04/22 09:01:52 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:52 executing program 5: 2018/04/22 09:01:52 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) sysfs$3(0x3) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) r5 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0xfffffffffffffffa, 0x101000) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x7, @remote={0xfe, 0x80, [], 0xbb}, 0x493789a4}, @in6={0xa, 0x4e22, 0xa8, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x3}, @in6={0xa, 0x4e21, 0x9, @empty, 0x9}, @in={0x2, 0x4e21, @remote={0xac, 0x14, 0x14, 0xbb}}], 0x64) 2018/04/22 09:01:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000140), &(0x7f0000000180)=0x8) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400000, 0x0) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r6, 0x84, 0x16, &(0x7f00000000c0)={0x8, [0x401, 0x2, 0x5, 0x4, 0x1, 0xa6, 0x8001, 0x81]}, 0x14) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:52 executing program 2 (fault-call:5 fault-nth:16): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:52 executing program 1: syz_open_procfs(0x0, &(0x7f0000000000)='ns/net\x00') 2018/04/22 09:01:52 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000040)='dns_resolver\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000140)="b26841a47677fa573f19de13a01e8f7d0e39cba678f278f9449f4a6d0a6941645270a1a184696f235d9d7ac0e7c71344381d478033ac191af175f30bbd8d97aa8cecfd448bffe92592366c06675b389ce361b51895501694f1a44233e18eb47c729cf9aa2afbe304a17f12434ecc9e01d9", 0x71, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, 0x0, r0}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000000)={'digest_null\x00'}}) 2018/04/22 09:01:52 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477", 0xf) [ 168.307891] FAULT_INJECTION: forcing a failure. [ 168.307891] name failslab, interval 1, probability 0, space 0, times 0 [ 168.319281] CPU: 1 PID: 10660 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 168.326245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.335636] Call Trace: [ 168.338286] dump_stack+0x185/0x1d0 [ 168.341971] should_fail+0x87b/0xab0 [ 168.345785] should_failslab+0x279/0x2a0 [ 168.349915] __kmalloc+0xc2/0x350 [ 168.353428] ? mpi_alloc+0x58/0x290 2018/04/22 09:01:52 executing program 5: 2018/04/22 09:01:52 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477", 0xf) [ 168.357127] mpi_alloc+0x58/0x290 [ 168.360627] ? dh_compute_value+0x3f/0x5f0 [ 168.364906] dh_compute_value+0x8b/0x5f0 [ 168.369060] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 168.374582] ? dh_set_secret+0x620/0x620 [ 168.378722] ? dh_set_secret+0x620/0x620 [ 168.382894] __keyctl_dh_compute+0x158a/0x1ef0 [ 168.387576] keyctl_dh_compute+0x22e/0x260 [ 168.391878] ? SyS_keyctl+0x76/0xa0 [ 168.395551] SYSC_keyctl+0xd31/0x1830 [ 168.399462] ? syscall_return_slowpath+0xe9/0x700 [ 168.404384] ? fput+0x25c/0x2e0 2018/04/22 09:01:52 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$TUNGETIFF(r0, 0x800454d2, &(0x7f0000000180)) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x322, &(0x7f0000c61fc8)={&(0x7f0000000140)={'digest_null\x00'}}) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000080)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) 2018/04/22 09:01:52 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200002, 0x0) fgetxattr(r0, &(0x7f0000000000)=@random={'os2.', '/dev/hwrng\x00'}, &(0x7f00000000c0)=""/53, 0x35) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 168.407772] ? SYSC_write+0x2f0/0x360 [ 168.411679] SyS_keyctl+0x76/0xa0 [ 168.415243] do_syscall_64+0x309/0x430 [ 168.419206] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 168.424196] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 168.429441] RIP: 0033:0x455389 [ 168.432662] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 168.440418] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 168.447723] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 168.455029] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 168.462328] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 168.469622] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000010 2018/04/22 09:01:52 executing program 5: 2018/04/22 09:01:52 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477", 0xf) 2018/04/22 09:01:52 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200200, 0x0) ioctl$LOOP_GET_STATUS64(r3, 0x4c05, &(0x7f0000000480)) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) 2018/04/22 09:01:52 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000600)="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", 0x1000, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:52 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x7f, 0x30, 0xdad, 0xff}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000300)={r1, 0x1000, "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"}, &(0x7f0000000140)=0x1008) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r2, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000000000)=0x6, 0x4) 2018/04/22 09:01:52 executing program 2 (fault-call:5 fault-nth:17): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:52 executing program 0: mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x2010, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x40000) setsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f00000000c0), 0x4) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000040)=0xffffffff, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f0000000140)={0x3, 0x0, 0x10001, 0x6}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f0000000180)={0x8, r3}) 2018/04/22 09:01:52 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) mkdir(&(0x7f0000000280)='./file1\x00', 0xc) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)=[{&(0x7f0000000480)="43657adde4dd391bb19c29da362a6506887f9c1ac094ab8f12c1f7e7af0f9ffb29016ecf6da889d8cff704f1d5a1765a0701eabc98462f8de0254961c3e9eb80f3eb260f4623e7e79331dbaa693d139f7465a1e055bdcd93add5cc3ac837ec5529293c293d4f33981083bd5a97b3e369f40fd932e0f10be4897f4550222555010153c6d1f08a0aa688ac76a31403aa773e45e275a3722781900c981bb241c47d03bcad9a4efa2928503734f09d85f1901a05ee6cdcd10b9f9329427e51037e4bcc1acaa74ad0d023667fef51710a852c2a8a2ac7b0e9eaf00343cc41c2015a", 0xdf, 0x7fff}, {&(0x7f0000000600)="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", 0x1000, 0x3}, {&(0x7f0000000140), 0x0, 0x52b}], 0x20010, &(0x7f0000001600)={[{@spectator='spectator', 0x2c}, {@upgrade='upgrade', 0x2c}, {@locktable={'locktable', 0x3d, 'keyring\x00'}, 0x2c}, {@norecovery='norecovery', 0x2c}, {@localcaching='localcaching', 0x2c}, {@hostdata={'hostdata', 0x3d, '{'}, 0x2c}, {@data_ordered='data=ordered', 0x2c}]}) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) bind$netlink(r5, &(0x7f0000000180)={0x10, 0x0, 0x25dfdbfe, 0x82}, 0xc) 2018/04/22 09:01:52 executing program 5: [ 168.895160] FAULT_INJECTION: forcing a failure. [ 168.895160] name failslab, interval 1, probability 0, space 0, times 0 [ 168.906543] CPU: 1 PID: 10712 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 168.913506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 168.922896] Call Trace: [ 168.925543] dump_stack+0x185/0x1d0 [ 168.929226] should_fail+0x87b/0xab0 [ 168.933042] should_failslab+0x279/0x2a0 [ 168.937201] __kmalloc+0xc2/0x350 [ 168.940747] ? dh_compute_value+0x347/0x5f0 [ 168.945115] ? mpi_alloc_limb_space+0x6f/0xb0 [ 168.949655] mpi_alloc_limb_space+0x6f/0xb0 [ 168.954032] mpi_powm+0x233/0x56f0 [ 168.957662] ? __msan_poison_alloca+0x15c/0x1d0 [ 168.962412] ? trace_kmalloc+0xa3/0x2b0 [ 168.966426] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 168.971836] ? kmsan_set_origin+0x9e/0x160 [ 168.976120] ? mpi_alloc+0x1ad/0x290 [ 168.979869] dh_compute_value+0x347/0x5f0 [ 168.984104] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 168.989601] ? dh_set_secret+0x620/0x620 2018/04/22 09:01:53 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5", 0x10) 2018/04/22 09:01:53 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000280)='/dev/admmidi#\x00', 0x2, 0x2000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000580)={0x40, 0x2, 0x4, 0x1562, 0x0}, &(0x7f0000000a80)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000ac0)={r1, 0x10000, 0x20}, &(0x7f0000000b00)=0xc) r2 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101200, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x9) r4 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r4) r6 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r5) r7 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r2) keyctl$dh_compute(0x17, &(0x7f0000000100)={r6, r7, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) [ 168.993740] __keyctl_dh_compute+0x158a/0x1ef0 [ 168.998398] keyctl_dh_compute+0x22e/0x260 [ 169.002683] ? SyS_keyctl+0x76/0xa0 [ 169.006348] SYSC_keyctl+0xd31/0x1830 [ 169.010236] ? syscall_return_slowpath+0xe9/0x700 [ 169.015143] ? fput+0x25c/0x2e0 [ 169.018514] ? SYSC_write+0x2f0/0x360 [ 169.022400] SyS_keyctl+0x76/0xa0 [ 169.025948] do_syscall_64+0x309/0x430 [ 169.029896] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 169.034871] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 169.040091] RIP: 0033:0x455389 2018/04/22 09:01:53 executing program 3: syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffb, 0x4000) r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = syz_open_dev$sndmidi(&(0x7f00000000c0)='/dev/snd/midiC#D#\x00', 0x401, 0x400) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r2, 0x40505412, &(0x7f0000000300)={0x5, 0x200, 0x1}) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000280)=0x3, 0x4) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) ioctl$PPPIOCGL2TPSTATS(r2, 0x80487436, &(0x7f0000000480)) socket$inet_icmp_raw(0x2, 0x3, 0x1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r4}, &(0x7f0000000000)=""/5, 0xfffffffffffffe2a, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) [ 169.043305] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 169.051054] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 169.058349] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 169.065653] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 169.072954] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 169.080257] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000011 2018/04/22 09:01:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) ioctl$TCGETA(r0, 0x5405, &(0x7f00000001c0)) getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000000)={@remote, @dev}, &(0x7f0000000080)=0xc) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f00000000c0)={{0x100, 0x40, 0x9, 0xe7a, 0x1, 0x8}, 0x7, 0x9, 0x5, 0x1, 0x6, "ef1577bde00930b6da2200782af5da178c3b4f0fd7a0cfea86b844f48a8a438cd86103fcd60ccc4a1849716e7a309a6ffcffc35e1e5212eb84ae9c842e0abc3eafac65d4566f096cd4fd07f6f3a9babba74631f4eb13802b0a9f119fa12fbc04e38b48dcf557147bcbd355cdfdac034a96d9706a0659994ef9e7c45000d0f0db"}) 2018/04/22 09:01:53 executing program 5: 2018/04/22 09:01:53 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet_buf(r4, 0x0, 0x39, &(0x7f0000000300)=""/72, &(0x7f0000000180)=0x48) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r6, 0x28, 0x1, &(0x7f00000000c0)=0x8021, 0x8) 2018/04/22 09:01:53 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x6500, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f00000000c0)=[0x7, 0x2d]) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200000, 0x0) openat$cgroup_ro(r1, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:53 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = socket$unix(0x1, 0x2, 0x0) r4 = gettid() getresuid(&(0x7f0000000280)=0x0, &(0x7f0000000500), &(0x7f0000000540)) getgroups(0x1, &(0x7f0000000580)=[0x0]) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000600)={0x0}, &(0x7f0000000640)=0xc) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getegid() fcntl$getownex(r3, 0x10, &(0x7f0000000740)={0x0, 0x0}) r11 = geteuid() r12 = getgid() r13 = getpgid(0x0) getresuid(&(0x7f0000000780), &(0x7f00000007c0), &(0x7f0000000800)=0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000840)={0x0, 0x0, 0x0}, &(0x7f0000000880)=0xc) sendmsg$unix(r3, &(0x7f00000009c0)={&(0x7f0000000300)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000480)="f8bd326a07ba89a9a0b5dc1999dfc4111f3d3d7d16eabb8f32f3160df874c93c2a1fb4be464c674faf8d6e8a54b014c22b1c742c11d2ce051060981b862616f08d21c18b56deded2e4bb0fe321b997bc0d461438fba896eb9f6b55958c9a", 0x5e}], 0x1, &(0x7f00000008c0)=[@rights={0x18, 0x1, 0x1, [r3]}, @cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x18, 0x1, 0x1, [r3, r3]}, @rights={0x18, 0x1, 0x1, [r3, r3]}, @rights={0x18, 0x1, 0x1, [r3, r3]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x20, 0x1, 0x1, [r3, r3, r3]}, @cred={0x20, 0x1, 0x2, r13, r14, r15}], 0x100, 0x80}, 0x40000) r16 = open(&(0x7f0000000000)='./file0\x00', 0x14000, 0x41) dup2(r3, r16) r17 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r18 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r17, r18, r17}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:53 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5", 0x10) 2018/04/22 09:01:53 executing program 0: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x80000001, 0x1) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x34) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:53 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x9) 2018/04/22 09:01:53 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5", 0x10) 2018/04/22 09:01:53 executing program 2 (fault-call:5 fault-nth:18): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:53 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r1) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) r4 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x40) ioctl$TIOCSSOFTCAR(r4, 0x541a, &(0x7f0000000140)=0x6) 2018/04/22 09:01:53 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xf5, 0x2) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e21}, 0x10) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = fcntl$getown(r0, 0x9) waitid(0x2, r5, &(0x7f0000000280), 0x0, 0x0) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r6, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:53 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) socket$inet6(0xa, 0x80003, 0x9) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:53 executing program 5: 2018/04/22 09:01:53 executing program 5: 2018/04/22 09:01:53 executing program 6: 2018/04/22 09:01:53 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000080)='\x00', 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000240)={r0, r0, r0}, &(0x7f0000000280)=""/163, 0xa3, &(0x7f0000000380)={&(0x7f0000000340)={'sha256-avx2\x00'}}) connect$unix(0xffffffffffffffff, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e20}, 0x6e) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000001300)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000003c0)=0x2) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000011c0)={r1, @in={{0x2, 0x4e23, @multicast1=0xe0000001}}, [0x1, 0x4, 0x8, 0xab, 0x2, 0x3, 0x100, 0x100, 0x8, 0x9, 0x3, 0xcbe2, 0x8, 0x8, 0x48]}, &(0x7f00000012c0)=0x100) keyctl$dh_compute(0x17, &(0x7f00000000c0)={0x0, 0x0, r0}, &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xfffffffffffffe5e}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={r2, @in={{0x2, 0x4e24, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0xccd3c7f, 0x95}, &(0x7f0000000200)=0x90) 2018/04/22 09:01:53 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000600)={{{@in6=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000700)={{{@in=@local={0xac, 0x14, 0x14, 0xaa}, @in=@remote={0xac, 0x14, 0x14, 0xbb}, 0x4e21, 0x1, 0x4e24, 0x0, 0xa, 0x0, 0x80, 0x3c, r3, r4}, {0x9c1, 0x7, 0x9, 0x0, 0xffff, 0x3, 0x0, 0xffffffffffff7fff}, {0x6, 0x1000, 0xfffffffffffffffc, 0x400}, 0x3ff, 0x6e6bbd, 0x1, 0x1, 0x1, 0x1}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4d3, 0x33}, 0x2, @in=@multicast2=0xe0000002, 0x0, 0x2, 0x0, 0x3, 0x0, 0x1f, 0x40}}, 0xe8) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r6 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r5) r7 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r6, r7, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:53 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) flistxattr(r1, &(0x7f0000000200)=""/60, 0x3c) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f00000001c0)) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000000)={0x1f, 0x7, 0x3f, 0x1, 0x6, 0x3, 0x1, 0x5, 0xffffffffffffffff, 0x1, 0x291, 0x1}) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000080)=ANY=[@ANYBLOB="010100009602386e1e8d463ca5e15f200c945c3e6e8c3e603cfe77e41409579c3ac63cf39fcee09abda2a6611578522b6ffdf0f93972f8e6a94b9cf1488491021d0e5495c600c7f310dc3bda4dfef93da4d0f76dd830220ba9463d749201fc0008d35c09857fc785282eff28c4a267ff175e53562386031f141af9d10b7b9d24fe363d9f782c5193c4afe0fd03e6f24ddd56e7a0"]) ioctl$TIOCEXCL(r1, 0x540c) 2018/04/22 09:01:53 executing program 6: 2018/04/22 09:01:53 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000140)="01", 0xfffffffffffffda6, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000000), 0xfce6, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:53 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xa4, 0x200800) ioctl$sock_SIOCSIFBR(r4, 0x8941, &(0x7f0000000140)=@add_del={0x2, &(0x7f00000000c0)='ifb0\x00', 0x9}) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000480)="ec", 0x1, r1) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f0000000180)={0x0}) ioctl$DRM_IOCTL_GET_CTX(r4, 0xc0086423, &(0x7f0000000280)={r6, 0x1}) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r7 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$sock_void(r7, 0x1, 0x3f, 0x0, 0x0) 2018/04/22 09:01:53 executing program 5: 2018/04/22 09:01:54 executing program 6: [ 170.068528] FAULT_INJECTION: forcing a failure. [ 170.068528] name failslab, interval 1, probability 0, space 0, times 0 [ 170.079959] CPU: 0 PID: 10807 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 170.086916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.096297] Call Trace: [ 170.098934] dump_stack+0x185/0x1d0 [ 170.102602] should_fail+0x87b/0xab0 [ 170.106412] should_failslab+0x279/0x2a0 [ 170.110563] __kmalloc+0xc2/0x350 [ 170.114106] ? mpi_resize+0x254/0x450 [ 170.117991] mpi_resize+0x254/0x450 [ 170.121664] mpi_powm+0x1d59/0x56f0 [ 170.125386] dh_compute_value+0x347/0x5f0 [ 170.129626] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 170.135150] ? dh_set_secret+0x620/0x620 [ 170.139288] __keyctl_dh_compute+0x158a/0x1ef0 [ 170.143960] keyctl_dh_compute+0x22e/0x260 [ 170.148250] ? SyS_keyctl+0x76/0xa0 [ 170.151916] SYSC_keyctl+0xd31/0x1830 [ 170.155814] ? syscall_return_slowpath+0xe9/0x700 [ 170.160719] ? fput+0x25c/0x2e0 [ 170.164087] ? SYSC_write+0x2f0/0x360 [ 170.167968] SyS_keyctl+0x76/0xa0 [ 170.171511] do_syscall_64+0x309/0x430 [ 170.175452] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 170.180433] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 170.185647] RIP: 0033:0x455389 [ 170.188860] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 170.196609] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 170.203904] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 170.211198] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 170.218489] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 170.225780] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000012 2018/04/22 09:01:54 executing program 1: r0 = getpgid(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000580)="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") fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000000)={0x2, 0x4e23, @multicast2=0xe0000002}, 0x10) 2018/04/22 09:01:54 executing program 6: 2018/04/22 09:01:54 executing program 5: 2018/04/22 09:01:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000001680)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000480)="a350d33f4aa2ad75c9c05e962e86d87e6c600c31935e5a885f73379193ebea2a89fa7b61ca91067f3ced732f6cf0a8e8dfc23a", 0x33, r2) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x40, 0x0) mq_timedsend(r4, &(0x7f00000000c0)="c480d0fb0b5a3bcf45f4b6b7ced3bfb921ab800954063966847d0438b32bd324520127", 0x23, 0x8, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f00000004c0)={0x0, 0x1}, &(0x7f0000000500)=0x8) ioctl$KDSKBMODE(r4, 0x4b45, &(0x7f0000000400)=0x7fb1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000600)={r5, 0x1000, "35c7a70c235d634a9394c77e02f61908315e380dc5c89d2867d6b2f64851332de1ffdcec5360b2ecc33bf4a218386f907752d0b177bfa5f4c472c7235493cabfe9bc575340e40b47ee34b43c384b261420b5e2be1d4fa94eae646020f8b928282f4c00880ec770097e60609f711b8c0cd8d5bcdc2c3a3afff9ca29f652243dc33d68766997ed4df91a76fe27b8eb0a9af9d41520d7284c0650ba71baddb5680df3674ea9b6229192684e7e06fbf1d903a4b7e0c5a9b710ca36b5723babc6c35f0f31596475a07fc70bd7196f4b976b15d98b7077dfe55a76fe47467e7857e6ea86b2f8c2307e3e04c34418d9d46951908a3d82d148f68ec07d5ff1f99ca76d5165aebd94a4275a0024ee88d07a0efd07e9cd63b2110581ca5435d3f755fb68a4e3017e7908e885fb87f803b3dcb740c3679cc766b8d82749b6981c8dfd2c28e3362814af1b42b4c96fe9c696114aa27bb9561d410e24ec53e13aca72b6c41087679711c918f435089b00c4ccba0139925407f1757cd9a8da51f1c4fad721b4972b0c0449609be62423846963632249e890b34aaf59bfc443509378bfac3e2e1c18922f371c356e4ef3341f0d3114d7a205ba790e7657c98708d159aa1c174d89baaeef88eccc7b909b31c0cc767b0cb715c7002c232ec12b47142b1fa8b21be819123e9c4b03385b9dee24c7eb225fa1146c48bbe193214bfa02c9556a4dc5076330b7ddd71c77c4f321b0c439e7491bc62f6f1b2ad3ae337f914e95020e6c589049409a43a4f06cf5dd304f581f8c6e241feef2a975d82de366bb3dff2241e24007ba909bb970427efbdd0e9d1f11f60515dee5ced06cd6f57980c4d08d62d7426163419f716e80e8a9b8cd69d0cd42e5a0a5d791b61c9ddf4ef70d1dee2e1a9131f344d52fc56b154594dc3247b12be9fcbe7c09068faa97eaa8bef72de232a5e8078b936506b27704cfb00bd2524ed2fb504d87c6841db3535418c75a3d06ef064388d6e76148e76871cac6a823255f768a1cc326cc745bc42713f1b33f49208c30981a7027dca1463ce30ab24c15bc2f3216c5970988150fa8027d532f53096316ffdd7225899a7909c547445169bf43f56194e8e7ad79665c5c8afc46594c1f93e4bcaa9bb90a99009a2d6d2346e301c11f809d1aefb43b5ca8a63f0912211de11f70e77a9c71fc4090a750b3cb20c3d90387297aeda16ff579b60b7077a4c3aa830d29d190c47e49fbd2cd944ca4a5147446213cc2b5bca00dc8d275b043641aaebf16b1a496e201d3c45db196b65997ac1cfc797b0432d291085b2be854fdacdabebdd0ff945d80ba0899a99c89c32915af80b8e8ec427786751b5abae6e3c46941bccf1f1d77200f1900ec910ee07bc0617ec1b33aac6249eb7a3f4f3264c0eab8a94aeff9c5288b363b9ccffd6b3b8957deb477701906e92239ce65a7ec664f4c33e5fdbc351dda1654f6340e82718d56a7fa2d5bf32325dd95cd0b17afcbe12d0f7883df3a33d2d797b45c204d4cb7137ed5e2ce36b9a84c49553d58229d0c23b9f9b8ded90248ca05e11e7f6ad8c2b29133759f3b51aadd6c5816fcd8a0b020ffee6e0f52332e61002637a614dfd456bc5d512113134c093f252596e4405719378d31a0e50bf92c554199d03256c3249844950b512000f60640f29d71ea33668d3ff777e24170b11a5130fd33e37aaa2a94c678152151476b70ebfeed04c8871e00a191a50fe156435d3f5a8bbb551f5e5aae6d15843efd481a7ec2022551f026ead6f8ce8895919da6294bf0e0caf14853e1daa1831fb9186d41b804f6cfee5e912c7c40ca11bc7488a160f839ee15d0519851114de434535be53a520a4774b8f0e296ccbeeace00bb2d82a1cb8e07fa84d348074e258516e0d5e850e567273a5b77290b1ac45b985e126c8b3862a32d420fc787db7f9cfa58ea829669b535d81bcdeea80199ee2ed51759f139349808ad67d46baebe2aa75973573af89b7ef17568ea22ad41ba2d8609265704c1f53326426dfd8eb138366862b6b152c6ab9e34b6914be1c750a9d261b57675715ce07be1676c5cf77b2291f6f3a7b6f1a37cbb5844c210f41edbb8159112624beac4e1b65d32b2d7b3ccf3a1a4753a7b6cd102f0916fe9499caeded1d85aaf424e69a2ee09ca6091f0bc85fb27f7ca9f88c147e83e5b5b8bb862b5f705e21aa64fa7467d6ef3c6402c162e6e8524617babe4f06f10712067e421e56ac6b6136bc6356b2b8ef816aa650e50ed92428c843751ea7d987093846021e6de4024d93d45dcb2cb912ff43cfd29fe06fed3da8596892aff44e561f2d4922e676cf423c05c2f0676c112cede2fbc3aedc625d36744118b8ca2083d8555de0479c1a4f10b1a53d4449ea4caf98a106adf2cc463277aeeec041b6f4559b71955e8cd8e740558de13d3f2e3f5bf34a8bfce39562795704a4f8a339a9abdf7a259380ad27c0dad01cddd6c580e1a3444004efad16a7b8278f5819b692bdf2df465c4d3fa385e13b0670d42b170df4fdda07c43c28d15cf8d6019d14a3b11ab42ec832e0b7275ca1c87c0fd60aca2f7284eb3e509aba1c44f49d7227ed51d838a5689fa407981d905925e8495b01dafffa0a76ceb080391b00c63fa168ea7480c379cde730c7dcc8b33c51e1b8f4c9dce639ee237f3c89bd7082e0b5b40b1b185cb5efe38c1ef56e7227b1092ca96462f7869b9773c97784d119c4380fc9cdfeaeabc8f92b4da61c8e5d394f02dc39c36b3ecc9a60b194675cbfd50b9682592e822d66a65260754bcfdb48bf7efe2531004d77e3643a9dd74ab017cf37de4ee09c019c0728bc09e1eb224f5e159c5645115b173036efaff2369b8ff1999c847ba4d27a5fe925fafa9ba637f2a1a631595571c7525c1e3fc4866f8592379c188223e56f2b834eaf64a6ec8852d41b7333d38e02be4fd16f28575cb820e55cb7eaf3ddfc647559565a506a709d55589e9772cfafe34bce553dcf523ce6dde4ccb8ed178011c2d566c349f152e5aa77f63ce075f94a912953f1374712079a747af52c56880fcde4270e1557722d29c6dc7dff4508260b36cd3475632ec31f9afb72b9a3e1fcce302cde4789f95592a61aa2fd87cff1c16ec2c4b457e4327758de48214f410a3e451f5f9415c2c45f5654f90ee21aa44eabd907ebb4299edeac475817771cba2f6a0d9e3eb6d134ad1aca129f7863e93d9cfd129ab552c3367afa469cad755650e884ed468085cca1323d8b29a79eb09260d4e9baed6d3c583d27d6b7d24aaea2a1ac1101b58dc4fe3ad6947f077ac1a4ea53546d4a26220eb39598d7642b3a8f2ab17bf63e1249129890f7efe38b130c2d70d5b27a21035b4827d4f3bfff53793cf96baea37d53e4c2e296c0a143b8f31fce4cd4d705f6a6c53c15051356a061eddb1c6d472d2cc1c9e70fd06ab722c9ea292b9b977f5f8f020f81e69ee90fce18d7166a5dbc79c4ea9ae58d3062927cf75b2d94872b62301726de2cbb7ef0c9ae2775f11649ad274125b4821f72c046c7f28fe284db86df6a6eb1aeeed596b3340a5b3faccd4638431f3edeb30e8073a6fedea7f2fed10e7b0978be58618f26e3b97b7fd3f4659f704e55755947e607e55fd19d1b9c1c4f0a50cfb8904de12107bc94c4f3acec2a7d7e28143fb5bee93088e6d12974b5933d2b72a60b0ea37daedc3e86aca83bce5508a6f3ee94521a3f1ce807863fbbe5a70445da6a43644907181c8bea6cc2b99ca18d56bb125b71a9017fcb3435b4fffd55068c2fdcd707928465395d39ea121a090f9317d1a671c10632692568027979a4eaeddcdf2c7c103489860c34d4b81da98241967234de2356a678a7448a6e91a387fd0d522577e3ca952ee77cc5da365407441606002a1d9f6ecd131de411a236521b0a2f40a47dc617d764b1f54dabe86df6b714d0dd80787fce5e7fdce123c5c8e2c0bfdcb0a075465891488177192e07008e5a32ede9a87dd354167bbe6dc87fa4c663862b2744e3f76fefeb72a4036fb1c3348c9cfa1fa858ee827b8861c5959f20e9e528f6ceb7ada25e21d06d5fbaeb09f44c406ac176e3d96feeb6b89b95546944e54aaf2c53788d52d0ee23323ded691ad5d51df0d2f9e926b50fd173695f9169b50d1dca033558f933ffc691c41df6e171c15ae6e1bf5f8f389da7b2d063ce4250c1234d0c607b6e8a9b1a7194ce68efdb59fce5f6f3a71f801ceff29d4230e9eb61c78ef549f60b295d5128643940b645453620af6c34de139b164b592aaac667edf529fca5ea3fefae08a216ccc22ce92acda951af56c431075d2dcefcdfb6e2f9b4a6d2dd7ad834b78c19430945633cd40bde09cd840388a8adf74ac27f8f13d1156fa9841d013dbce4224a8f1786ba4e2db73768c2e6cf45e155b25e8769f7c097554f451634cabe97a09448adb16d8c17d576ba9c736cace9d61e135c892b2ff9e6314ae83f0f5ef50e10eeac4f5cda9a80b97f04a9a1db4ee2eace3b5a4bdd81b2b5c696d551327e098799154052f58604ab2cba1e9c711b4937df2caa6f209d996d9e578b4d8da65ea6cf08206c8fee1b448290375421af504bff01dd28d2620961d16079d92cce6d4958549c6b9473475a298faafb26a267a4940627bdd7d9ab59fc961ef02d9415ee710c413838f42783221decb96942f38fe39beea8f95f572f6dd42b7c4ea0df6f557f148506405b1f8a220546d66b0416405b7adb109ea0fcf13a49ddbefcb54b60c87fa93160743ccc91f112eff3463d54be583b2814358e9c1ac8247b3e4f5c6973684778391713adb4e325fe84609364f87a720df16e3e18032dfa75cae0d69c7d9f7714d867b9955153ed7d1764b2d752227a742f8e78296ef02c45eebea4bdf2b7e745ed2a0ba459126dc2f80398b872fa6949c44da24d8aebeef9c0d63441d368eac9e2148d36fe364206293bb31003fd6b1bac4193d1e571157763dd4db519d7a246c344f35af81579aa9027cceab219a9896e868ca312b3aac1b87675ab8587f918becb5aa98bdebc97d06489bcc35d026b75f0980e809887c3dad7b1e8c3773895ef464ad68d64486c314e11a04f6a865c95359505855b52a80edf3d670690c011414e0d21df5dd4f40a55efe627206dae5b6d1a16fc719f2b820a030f71978308c165e4e5504bcf7198fd4c3c105651fc1f1bf48e85f9aaa207c769d8c8255e8dec0b2bb21b8bc6a87d15b3461b81608c8481ebc6969f10d19f61f3da6e0c70982b56e73b002e360dab910d2c27ea888e9b2c7f21e923d105739c5c4679e086812f3af84ec0e788c8cfdef990dafe98d4b0135f65760d9537143a2a5f6f50c8059c65b0988b875c646a5e9b790f55b523f9891b9a205957f7a427b0d23b150f2f9e09b336b1af24c61af0559255e4a896b22c59b234d95c52f6873391dd3fecf076ba833835e4ca272416d6c3b5fc59aa9f5127ab50568116c98a96764cbafef9a3ef6f24b08072050fb363438eb47899bcab3aa340cf7b6909f8c6ec376f5951d5ee8f2803a5dae21f01edaefe2a90d25ff0d3b910dc9a70510852cb40a55ca2472ea61693dcc015b61e07c5539345ed2ed8fc660bf94ab36dc8767bc5c4b2c100b14e7dc7b97f0417dcb6a222a92484cdb9f302033499645cf7fa70847f52c195aeda24150f12556606f144b0ebfe87ef5d430b6ccb6d43b9a67b67204213713c69b8b0c9637aacabc7117c81d9d4f784148f2f88a7dd3b130f1c9e30f6aba25e053d64ac9e1c400b4cd033dca45ec37d40573e22a098f59c4f32290b3"}, &(0x7f0000000540)=0x1008) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) read(r4, &(0x7f0000000300)=""/121, 0x79) 2018/04/22 09:01:54 executing program 4: pipe(&(0x7f0000000240)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x5, 0x2db, 0x7, 0xffff, 0x7}, &(0x7f0000000400)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000640)={r1, 0x4}, &(0x7f0000000680)=0x8) r2 = add_key(&(0x7f0000000340)='logon\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000004c0)="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", 0xfd, 0xfffffffffffffffe) setsockopt$inet_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000700), 0x0) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000600)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0x0) r5 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r4) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r3) r7 = creat(&(0x7f00000006c0)='./file0\x00', 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f00000000c0)=""/21) ioctl$EVIOCREVOKE(r7, 0x40044591, &(0x7f0000000080)=0x80) keyctl$dh_compute(0x17, &(0x7f0000000100)={r5, r6, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:54 executing program 2 (fault-call:5 fault-nth:19): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:54 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000000c0)="e05424f02b050f0faba0d196cc6d7d", 0xf, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r0}, &(0x7f0000000140)=""/5, 0x1, &(0x7f0000000000)={&(0x7f0000a3dffa)={'tgr192\x00'}, 0x0, 0xfffffffffffffd74}) socketpair$inet6_icmp(0xa, 0x2, 0x3a, &(0x7f0000000180)) 2018/04/22 09:01:54 executing program 7: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x2, 0x40) ioctl$KDDELIO(r0, 0x4b35, 0x8) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) r6 = getpgrp(0xffffffffffffffff) sched_getscheduler(r6) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000000)={'crct10dif\x00'}}) 2018/04/22 09:01:54 executing program 5: 2018/04/22 09:01:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r5 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x4, 0x40) ioctl$EVIOCGVERSION(r5, 0x80044501, &(0x7f0000000140)=""/125) [ 170.414474] FAULT_INJECTION: forcing a failure. [ 170.414474] name failslab, interval 1, probability 0, space 0, times 0 [ 170.425873] CPU: 1 PID: 10836 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 170.432837] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 170.442230] Call Trace: [ 170.444872] dump_stack+0x185/0x1d0 [ 170.448548] should_fail+0x87b/0xab0 [ 170.452362] should_failslab+0x279/0x2a0 [ 170.456523] __kmalloc+0xc2/0x350 [ 170.460072] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 170.465600] ? mpi_resize+0x2bc/0x450 [ 170.469448] ? mpi_alloc_limb_space+0x6f/0xb0 [ 170.473991] mpi_alloc_limb_space+0x6f/0xb0 [ 170.478364] mpi_powm+0x236d/0x56f0 [ 170.482085] dh_compute_value+0x347/0x5f0 [ 170.486327] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 170.491861] ? dh_set_secret+0x620/0x620 [ 170.496006] __keyctl_dh_compute+0x158a/0x1ef0 [ 170.500682] keyctl_dh_compute+0x22e/0x260 [ 170.504983] ? SyS_keyctl+0x76/0xa0 [ 170.508656] SYSC_keyctl+0xd31/0x1830 [ 170.512581] ? syscall_return_slowpath+0xe9/0x700 [ 170.517496] ? fput+0x25c/0x2e0 [ 170.520867] ? SYSC_write+0x2f0/0x360 [ 170.524750] SyS_keyctl+0x76/0xa0 [ 170.528304] do_syscall_64+0x309/0x430 [ 170.532252] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 170.537232] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 170.542448] RIP: 0033:0x455389 [ 170.545657] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 170.553404] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 170.560699] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 170.567994] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 170.575286] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 170.582579] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000013 2018/04/22 09:01:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fcntl$getownex(r0, 0x10, &(0x7f00000000c0)) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) fcntl$dupfd(r0, 0x0, r0) 2018/04/22 09:01:54 executing program 6: pselect6(0x40, &(0x7f00000abfc0), &(0x7f0000768000), &(0x7f00007fbfc0), &(0x7f0000f22000)={0x0, 0x989680}, &(0x7f0000f14000)={&(0x7f0000553ff8), 0xffffffffffffffd8}) 2018/04/22 09:01:54 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000140)="5cac74c65582fc46cef3fa04c9e026de4d88091d48e1ab6741c610f5f621671381ec9fbaf18ff23635582df0a48e24719cc2c855582818e13ae15d699f860113bcc6f8d5f5f26e5dc948b703f93c011268432d34ffbb6e83fa7a013e5bb2deb354d2531fd407228167a435c63b87f97b0cefa6db2a67ffdcffdd0f24cee71b603a1550fcbb0eb72eb12424c4b9e219c43bd97509d18643c9fa3b741eb740b63b0bace4d9d8a3116b4c9788e518a2d2388fea37258dcd7df7d5dfdaa0b7bcdf823b44f4124d40078bb1aa69a6304247720fc8897e7788e2d31ec4af7f845df74b0b4bc080bdc1a1677a1e", 0xea, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r0}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}}) 2018/04/22 09:01:54 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) r5 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x1, 0x0) ioctl$PPPOEIOCSFWD(r5, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, 'bridge0\x00'}}) 2018/04/22 09:01:54 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r3, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:54 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r0) r2 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r1, r2, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:54 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) socket$inet6_sctp(0xa, 0x0, 0x84) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:54 executing program 2 (fault-call:5 fault-nth:20): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000080)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:54 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(aes-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="b4d6e46939997bf04247c64c010477e5fdd3950c15aa51ea", 0x18) 2018/04/22 09:01:54 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000180)="4d73cc1e6b2c039e9119057587ac24cf2964542e585b331dbbeedc0960721468b785dc523aa5bdb407091c19ba0622116233af4de6174604e5079e2744a2e9c9018a467e3b582f89204f2848d23121655ddf1c0b6b9181745c42a235321c46cf3bd751ae2c1dabc49e5ec6f8c3168cad038e3d71a223f49122495843c24b469dd448211a9256d60905ad7f7ab0dd6ca894c3822b8e9c3e", 0x97, 0xfffffffffffffffa) r0 = add_key(&(0x7f0000000240)='dns_resolver\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000002c0)="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", 0x1000, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r0}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'tgr128-generic\x00'}}) r1 = gettid() prlimit64(r1, 0x0, &(0x7f0000000000)={0x2, 0x79c}, &(0x7f0000000040)) syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x5, 0x2000) 2018/04/22 09:01:54 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f00000000c0)=0x10, 0x800) r4 = getpgrp(0x0) fcntl$setownex(r3, 0xf, &(0x7f0000000300)={0x0, r4}) r5 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r6 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r5, r6, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x22104, 0x0) 2018/04/22 09:01:55 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:55 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xdf, 0x100) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e22, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x5, 0x3}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000300)={r1, @in6={{0xa, 0x4e23, 0x10000, @local={0xfe, 0x80, [], 0xaa}, 0x4}}}, &(0x7f00000001c0)=0x84) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r2, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) [ 171.120765] FAULT_INJECTION: forcing a failure. [ 171.120765] name failslab, interval 1, probability 0, space 0, times 0 [ 171.132151] CPU: 0 PID: 10877 Comm: syz-executor2 Not tainted 4.16.0+ #85 [ 171.139126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 171.148518] Call Trace: [ 171.151166] dump_stack+0x185/0x1d0 [ 171.154861] should_fail+0x87b/0xab0 [ 171.158660] should_failslab+0x279/0x2a0 [ 171.162784] __kmalloc+0xc2/0x350 [ 171.166334] ? __keyctl_dh_compute+0x1bae/0x1ef0 [ 171.171187] __keyctl_dh_compute+0x1bae/0x1ef0 [ 171.175865] keyctl_dh_compute+0x22e/0x260 [ 171.180171] ? SyS_keyctl+0x76/0xa0 [ 171.183841] SYSC_keyctl+0xd31/0x1830 [ 171.187744] ? syscall_return_slowpath+0xe9/0x700 [ 171.192656] ? fput+0x25c/0x2e0 [ 171.196021] ? SYSC_write+0x2f0/0x360 [ 171.199899] SyS_keyctl+0x76/0xa0 [ 171.203441] do_syscall_64+0x309/0x430 [ 171.207392] ? keyctl_restrict_keyring+0x4e0/0x4e0 [ 171.212369] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 171.217583] RIP: 0033:0x455389 2018/04/22 09:01:55 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff}) fstatfs(r4, &(0x7f0000000480)=""/242) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:55 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000280)) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) [ 171.220794] RSP: 002b:00007fae9b708c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 171.228633] RAX: ffffffffffffffda RBX: 00007fae9b7096d4 RCX: 0000000000455389 [ 171.235937] RDX: 0000000020a53ffb RSI: 0000000020000100 RDI: 0000000000000017 [ 171.243264] RBP: 000000000072bea0 R08: 0000000020c61fc8 R09: 0000000000000000 [ 171.250587] R10: 0000000000000005 R11: 0000000000000246 R12: 0000000000000013 [ 171.257893] R13: 00000000000003cc R14: 00000000006f8bc0 R15: 0000000000000014 2018/04/22 09:01:55 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) 2018/04/22 09:01:55 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r2 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)="f0", 0x1, r0) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:55 executing program 2 (fault-call:5 fault-nth:21): r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:55 executing program 6: r0 = socket$inet6(0xa, 0x801, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0x3f, 0x4) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [0xff, 0xff], @multicast1=0xe0000001}}, 0x1c) listen(r0, 0x0) 2018/04/22 09:01:55 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) add_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000600)="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", 0x1000, r2) init_module(&(0x7f0000000180)="5b9700", 0x3, &(0x7f00000001c0)='user\x00') 2018/04/22 09:01:55 executing program 5: syz_fuseblk_mount(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x1000, 0x0, 0x0, 0xffffffff, 0x0, 0x0) 2018/04/22 09:01:55 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x8000) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="7ac84321cffbb71eb4119caa60d814d6c6333effe528829297f8af75a35186556d1238a0602dccaca3677aded851ef31abb513f2c590daede98f6633e4691f68f6146311e62b84ce5bd20695a286f9d6719424d70d2a652e79334070356e86874341e8f2b281e8759987acffea6b5f1074eca0c78fbfd3d548ce3de03b22bd18aa21dae02c7d26b0c6fcd11db901684ed6848039de61ffe3c69c6b22e1c6330c49688504efe3a4d911232eca631a2fbe75d98c1d220b2eab2e962ffef24e599f68", 0xc1) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000040)) 2018/04/22 09:01:55 executing program 1: perf_event_open(&(0x7f0000012000)={0x2, 0x70, 0xfffffffffffffff5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x8, 0x0) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000080)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:55 executing program 2: add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f00000006c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0xc7, 0x80800) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000640)={'bcsf0\x00', {0x2, 0x4e21, @multicast1=0xe0000001}}) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000540)={'raw\x00'}, &(0x7f0000000600)=0x54) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000480)="5370ed37cc01", 0x3, r1) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r1) r6 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x51de, 0x404101) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r6, 0x800442d2, &(0x7f00000004c0)={0x1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, @link_local}]}) r7 = socket$bt_rfcomm(0x1f, 0x1, 0x3) dup3(r7, r6, 0x80000) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r8, &(0x7f0000000140)=@hci, &(0x7f00000000c0)=0x80) keyctl$dh_compute(0x17, &(0x7f0000000340)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000300)='user\x00') 2018/04/22 09:01:55 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x33, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) 2018/04/22 09:01:55 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000480)="fe4358cccaf129d1b84286657c4dc6ce3b01a06a678b2853f458277303e99835af75551b93b8d8ea50486a0b72a073fc4203ed5c9952db622b578a6445075805faa73879b8c2fa76fc327446ba287b7ce09ecb9de1c8f0d208af2d332b4362cb8478b312ccc80ea235818b1cfc3abb23b2ec14771d2608c1c728", 0x7a, r1) r4 = add_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000600)="61d61daafb9f6ee8bac670b6ef09d91d8a98b93b5e7c612f83bdfec15238e4ea1e1265c947a6c9cd42264b85ef108f67a97784ee421fd14ea05c778efd8bfaaa5283e865ae505653bebdd91df8b22b4dc68b12e0e16e14b0b40cd1fed9b19b1366c8bf73e24684361a3fef91e66f4da99e9343f7c7aa4bba5effb14a105cb1ae7a1f1eaf85c4b3451e4b5402cf3a36212491fbec43468bd8e16094aff80ba2711cfa9b9b5964f8de3aa014c838098a12d3f8fb729175a116a9d8e9daf6527e0aa25e5a73427c5d9c4fd1c39b89a95c43fd5c2c706b1565941f0b1a24", 0xdc, r1) r5 = request_key(&(0x7f0000000340)='cifs.idmap\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000540)='keyring\x00', r2) keyctl$dh_compute(0x17, &(0x7f0000000580)={r3, r4, r5}, &(0x7f0000000700)=""/4096, 0x1000, 0x0) r6 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r7 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r6) r8 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r7, r8, r8}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:55 executing program 6: ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000002fc0)={0x0, 0x0, 0x0, 'queue0\x00'}) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000003080)='/dev/sequencer\x00', 0x222200, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000003480)={r0, &(0x7f0000003380), &(0x7f0000003440)=""/29}, 0x18) 2018/04/22 09:01:55 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x400, 0x80) ioctl$KDMKTONE(r0, 0x4b30, 0x3f) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r1, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:55 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) keyctl$revoke(0x3, r0) 2018/04/22 09:01:55 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$sock_timeval(r4, 0x1, 0x15, &(0x7f0000000000)={0x77359400}, 0x10) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:56 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x109000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000140)={0x80, @time={0x0, 0x989680}, 0x1, {0x101, 0x3f}, 0x3, 0x1, 0x7fff}) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$set_timeout(0xf, r0, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:56 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x2000000, 0x32, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) socketpair(0x0, 0x3, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) 2018/04/22 09:01:56 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x5, 0x4102) setsockopt$netlink_NETLINK_RX_RING(r4, 0x10e, 0x6, &(0x7f00000000c0)={0x6, 0x5, 0x3, 0x8}, 0x10) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:56 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x6050, 0xffffffffffffffff, 0x2f) r0 = request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000140)=',cgroupprocsystem,$!]]em1\'\x00', 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, r0}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000040)={'digest_null\x00'}}) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x403, 0x180900) 2018/04/22 09:01:56 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r3, r4}, &(0x7f0000000340)=""/5, 0x5, &(0x7f0000000140)={&(0x7f0000000300)={'sha1-ssse3\x00'}, 0x0, 0x19e}) 2018/04/22 09:01:56 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) add_key(&(0x7f00000000c0)='trusted\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000600)="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", 0x1000, r2) init_module(&(0x7f0000000180)="5b9700", 0x3, &(0x7f00000001c0)='user\x00') 2018/04/22 09:01:56 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x500, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f00000000c0)={'bcsf0\x00', 0x1000}) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0xc) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:56 executing program 6: add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f00000006c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0xc7, 0x80800) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000640)={'bcsf0\x00', {0x2, 0x4e21, @multicast1=0xe0000001}}) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000540)={'raw\x00'}, &(0x7f0000000600)=0x54) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000480)="5370ed37cc01", 0x3, r1) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r1) r6 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x51de, 0x404101) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r6, 0x800442d2, &(0x7f00000004c0)={0x1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, @link_local}]}) r7 = socket$bt_rfcomm(0x1f, 0x1, 0x3) dup3(r7, r6, 0x80000) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r8, &(0x7f0000000140)=@hci, &(0x7f00000000c0)=0x80) keyctl$dh_compute(0x17, &(0x7f0000000340)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000300)='user\x00') 2018/04/22 09:01:56 executing program 4: r0 = request_key(&(0x7f0000000000)='big_key\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000280)='+\x00', 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000001780)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f0000000240)='./file0\x00', 0x5, 0x5, &(0x7f0000000540)=[{&(0x7f0000000300)="e3aab1b09f1399454b0d75ded0dc5c6fdf79460ed3a150620c97864a4bd28db56ce89f485ef39676d6a49b683ae58cb2ee73ab9721c2d5b0936c032107", 0x3d, 0xfff}, {&(0x7f0000000600)="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", 0x1000, 0x4}, {&(0x7f0000000340)="bbd89e9f622d007ff32304c6912b439073989592b81c7dc392e78c177e3a41eb1f0d8c7becc32a2f0bf75cb859f1a2acaa029b689f89ec285657f7", 0x3b, 0x7f}, {&(0x7f0000001600)="1012cbb1455e39a92ac898a2ddef85c2b09156948c634d52e1aab0a6dae3b3f6f54fe9fabd4dba610d25d8fbad28fc08c1b85ae926332f0be1faf8537238241481427733289d4767a33b84e38051228176f0769c8a3237d5842fafbb487175b54bfa21b4d6867d9ba7aa1dc1136a542237e4ce8766a5c94db9f81099ee41a62d2152757e8c2ca6e8b07307076ea8724c155c7556d5c547c08d2dbc83d49f6b04fc5ada9831af491ece5c472b749d5163d87b98238852a2f1a52b2b9cb7b299c43a5009a3a55bdf4bbbbd9e312ff6ca173b684305d179852b0a0c67b56202", 0xde, 0x9}, {&(0x7f0000000500), 0x0, 0x3}], 0x2000000, &(0x7f0000001700)={[{@part={'part', 0x3d, [0x39, 0x36, 0x36]}, 0x2c}, {@iocharset={'iocharset', 0x3d, 'cp437'}, 0x2c}, {@codepage={'codepage', 0x3d, 'macromanian'}, 0x2c}, {@type={'type', 0x3d, '4H U'}, 0x2c}, {@umask={'umask', 0x3d, [0x35, 0x30, 0x31, 0x36]}, 0x2c}]}) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) unshare(0x8000) 2018/04/22 09:01:56 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f00000000c0)={&(0x7f0000a3dffa)={'poly1305\x00'}}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r4, r3}, &(0x7f0000000180)=""/24, 0x18, 0x0) 2018/04/22 09:01:56 executing program 7: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:56 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x12, 0xffffffffffffffff, 0x0) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x8, 0x80) ioctl$sock_netrom_TIOCINQ(r0, 0x541b, &(0x7f00000000c0)) getpeername$ipx(r0, &(0x7f0000000040), &(0x7f0000000080)=0x10) r1 = getpgid(0xffffffffffffffff) ptrace$pokeuser(0x6, r1, 0x7fffffff, 0x4) 2018/04/22 09:01:56 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r2 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)="f0", 0x1, r0) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:56 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:56 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="7c7f08", 0x3, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) timer_create(0x6, &(0x7f0000000000)={0x0, 0x5, 0x2, @thr={&(0x7f0000000480)="b3ca67c1a86c5ff68bf668fab7fe7113b262909e3b13dd6fe01d152ada9728a8b6912d01ff969181ae2b65b8001db0eca19746eada4f12dddb139a021241608479055c1779aa035a73e5f4dcfc403ce827aaae2d5336aa021d710846fdf01002e5ffa035c334697ecb4adafd92460ed93fde291e14aeb39acacfbb2f990cf147530e94cbe405187cf8cc6ea5d85531327f3d075098bea8e10196a1a4d98c77aa8ee343d05ee58f6a530f8b057f76aac9fbad8905305fe00986ce0a2ec58356", &(0x7f0000000600)="452edf9f908d0a5b67cb77cb210c0f83f272180e96b6e4d2a97333c73d71faf683b1497874c24a8100c3fa96c884eb7cc575fdcf9a6894f874c583283c6047b611872ddcc104a81c1ddcb5474c759c8091da7a8d5ab1bd303520319259db6198741321f4d0a041bc33febfda80710b5bad877ceaf953df3b0f398a91fccad9e8aa58ff44c476450de6f595fb65b498a88d869e8fadd2a1a1da893060dfc18e0ba8209fa3f0c1dc39f2f637f6b93882779a4b9b56770aeffc66f1851b535a782d61150eed9c1458631788b43f32fb33ed8030e74063914423e17ce1addfc3d9a4cc5363c6ef946d29c123cf615c60161592e09daaf6163fb472dee84dabea481a5f85059d54e732ab78743559613a09b846807fe84235e8e9a7228916fc5003d99b2dda5c13672f6afeb47f9b7c9f7338a0c8f98cd6c1feb1cda5a2015d4eedc3fb2d68155ededc9770747b7f447347262146dd355d3039f13d7316869bf7c86f377270b07d09566ad2d11a1219b7ca802ad00921ad6a15ed388f8559a6eeab056cb9f7b573fa6bec6546d33e2db041f776fd2dda96899cf40a58956876246762104e2f0beea45d970ad5412ed2f273f09b465cb28160a2fa4e1dd0cf1e61ef14a59c4b31e8f9b91b611ff2a2cc40fb0f744bef5dff79f06cfd1a9bf69fb774384998aa9144bd052917bd7922eac8eb8353faa79a70f1b1df310820bf715f4615b6c7a3d21375e2898e6f702f5b852a26447d9ab450eeb20167a70e424ba88e174d12658400bf2db5574dfade472fd040e1ecc69904f568c50ca38d0b12272e567b7126de1c40150e3dd32518ab274a9a4d005dc7f56765aba19f3afed663f68c5400e66dc3688ba0bdb53e3792aa7bbbe25080076662dcffdd0698588313ae4e3274497de4f7eb15b132264ddd916a717a6a88921e07f3dfb1e96e109e7567537fa3d9eedf3fa6b9d0c09fe2de13a5f93d8adc89bdacd492b83b689b0a338be803bd3b2c53c21cd5f80ef751412abd9d9b22874484c834c854ecb0ef6ca528a6687390b3d44487d761921600aa376002bee8285864e55fe0b3481e59e378d494a4f29e975c4d2ba4d569ffdaf8f4d7e161511e1bdc0371487b138ac489d4b28c3c526a36c9a952c98a1be7403d7e960f483452c81645e20e3139fbdaa221d39d9444b2b52d711e2ae8db04e96c293cc036181c1cf55bf488ec2620d002f442a920539db1af2812dd1fd7f99c39df1c3d0dd3e828a2ac5133c246cb3b87958416e8bcac946e96ccdab35da215f7f74b4f162b011f3fe2a9b9bb5334849bca55659ee27fe670fa9f64542d69b384e59b88995cd9371f1830e42de6463adaa782dc6bae3b59931417a764d34e8152d4b3b6b80ddee89668b055657d679d3fec2f2a5693d7fa3ff0b49a0e282ade9fae9c9fa3954e273d7039922ff7fb8c25119a7051edf417fcc17d69b5f476f04c576970da00a51ff7fe4779c1a6381d3ce7087c7dac820714961ed3686db6570485e427d72cb069b0b91650e3251186f7b2b7e0a7f2c697861b6ffaccab5be5a38da526973bdf23a7de505033099b7649b23ff388daea3092d8e583f85c557c552d1b8727ba07eea0612a7a852e194444c7f76a4f7258e8e8cf61a980bd25136a58d66502ae56b18ad75cd97d4069b53c254ec7c03d0a1d6055f0e68ce06ce0ace665a366fcaa754ed6a540048f2c3f177a72f08980c99c9fabb8ee996b1ed9e55562642cecb5a2bc6f13f4aefc2bd1950123e52b028ac2e0827d62888bcb442faa5eaa94df25f50233cf66847d38c95407011b437d842d66e4290952cfdadaa0ca0ad7fb2d76b1c3d15436a51d8f8123d7406d2d162df8e214d43f88b8f77a47f984a39e04f107cf495e73bf185c23fc2d2b4c9b68e084ae379178e3f926bbbe57b475c8d04a2a7ce5fb2242ea043f5e7821491935d23c70d28326ba32e3936a2093a044a7f6c733032060978320df5108b958d991f1d097f32bb5966c6e56c3dbd63f9fa23a6e2dcbde92e27b98c7343ef56baab5648322a90245b4822ad5de79e685e0dd5a007954dedd0cadb06ed4ee9086f603ad5a9e61b4c517fd2b651f34b87fc471a96b49f1de7b3565a7a66f6a6c4b21d9802438894ac752511223c9e15039112c21caa5893b39b6bc10670f8410fc8d14c696f0a1982493ed31bcafef909b781cb5a34597c856f0980ab48123a7768536870ac6da78b809f39ee256d78ef97a0cfec460926939bdef5636677724db3776ff31f883e46d9beaf7fcd199cccfe2ea901ef4e7c9c06fdf864bcd58c80563bce747ecfa4fb016b9da5096c8e8fc4abf55ca3ab74c44ccf24f1f7b729c104cc7ae0b5e52d788ce4dda2464352f91848afba28aad430edba8f366087abb7e326539c1899dc5aa3e3e613c55da658ca68ad80c6273f9354e50f973881d6d6f5fcb0decd85ed8d6396229059cef76b740fdf24ebbc8db39f33042702d169e07f11c5a913aaa9a5f395a7911fe46d06ffa778a0afb9462c708bb064f4917a811771b4982209670c819229cbc4d752776f83889146d96e29cb3bf2d483722e0191b41b9544efe8562c20f72ef09e487d4623bd84379d9cf27b535c534e379bcb9fb05cfde46def5f2c5893485e1c521b8ba5c6c0264c8ea68ebd3b34b04d2b50f4d6617f6031ef11c8f49b92616d830c333da6eab184130f4cea53afe28d635161277b737de0ff7d4fcc36d971900163b153ecf7d55bcc596a12b70d6519082cbf9650eaada1b2526080263b1bebdf0844e7d90b6a685bf0895427dc0b476237ec279c648dee699b36732e463931bbeb116569241f0f9bf6f5a5a417a0e55474f4932ce8941e77e72a66287054b03553daa2c8a885c193d7ddad222ad4ff3b17a255ffbadb3fed9174a3391e5c8309c88eed11cc2d6fe737d75ca9170abddfb1e7aa6922875215bf999de254c7defa1a48bc4ac02462d7abbc869b5e15a762fa9ade25f11cdc3a12178c7588e1534b3cde51cd075688218abaed5f04409f1c2afcd80f35ca3fcec7d561c90633b956d2d2b020a5d8ecc75e2b599fd3b49bd4eb6fabae4348690fa3ae76d8890d5b6cfb022113b18ca4849b4c453fad40f3ddb4db1146fc701392a60819828416f1e6064b589840392a4db95058e4d310a86c2534036c47db0f535d5c1709313889d736e3d174401ff2b2a66a6b7515fd6302c0a79c462f193c7828dbc347fa6b03ee6ccda44d5583785f5591a99c88f80078288a3e3ed142522c37bbb3c0e7888b5805704fd6b5e21ad33286743a61903359ffc53fcbdf521afd4ade09fd02d6021943c1c6cf54ef1515a4f2adb4e52621bf793c0e555e7ace08cb416417bb3272ae6292138ed5ba62f8ba9dd7e16a2a5be462ae92f9ef00bd94b31cd4b923db93168bae7569561f28698a03d8365c7851baf886ee557585c142e37f127890720d192b0f1d2fe5d0e55b8af6faca16c0a9270cbb6f2f082f7bf3a0f3df8d8db9931f696aa1e16d38feba2163434e42c13242dadcbcd80872184c06bdfbfb564093b4af62eafe1dcbfe1ea047bfb6ebbeabeb386e5f54e2210f6ff2729134f6b5fec6c41484942b7ad595e23b92d0bd1373209e032e8efaf735dabfd5b7e4b874c708bd00533999499e42a59bd38fcc3efab3342d1cb464a44bb609b5a4ba63a34c1e7b553e63eadeee11f2e07221ade82a871de6feaf637356fc301b2b1e19a56b859a1c04b6eb200e95e678638efcba7d8a40b881de6a1598046d5dd6e64dfd2424735fb05f275ee7f57c1fc5ebc3d1bb54fe261797f0b824e7f327f62d0e3b726bf3a4c1be79d85d7cff6a1a608e37d4f7b409351e4cb21b0773077c83bb7a1bd5f56e8866759050f6ae9e52e3de2cd5be0c3169e7bbad07c69f833c5971fc2815259afd62b0f5396667505ddfbff2258f244b012e4676db91cd171048c4472ba6ed697210e186b5aabc47a24e85ea83b3a1e56b81043f1d8b9dfbce16e7bef9797bf6ab6ec81534ff3b18ca9af560d0fc4cc06c9b14a8acfbaebc9514c84606219715915cc46756f210752acab7d6b60cc6179b5d7d174706edc6386c9ca1c69744b2244422ebc2bc9dd9b7b4162a1d840fc85ae5f93d4c46419a395b177802730a908f47b084e8ca8ae1883876715713e9a32b9fa1425c32c3760cc8c1c5eb0f26b4e56c8705cdd9eaa0ecdb532feafba8020a202947e128be6381c5a300d63799c7881ac8afaac5a55af8e6be175e7e849858776733250413835776cf7133516c71aacff6e40691ca67b988c1c3b7109c03e072f882482ce589c8ee41bd0b409e417ae70f3bd25688c7e127096d6e38525c888a405d8a669e9bd52ff818f9fd1e43c6c8ca02f93eeee14a00e829f1d44638deb3e0d0613bbd271420eb8925806f27be8a6702c74d336e7380c374314e8ff67a838dd3c75964b1ba1170a6ad7a215aabc6d852ad29428096e5700fd264aa63412f3b68b6829255be6028ed32ca945301f42f978ff1d2252a059a022b46a02754f3ec0c3af2803f9bfbebc29fd2791817067e9f544f2335a7baa0fc4d08e6156458dfddf20de505bf0680beb58517acb8e55037edc79111e27e70109b26f02b95f22060b418237c3136d3d23bc1de44e78fd64f28a113d97f1b487ac6317774199b781bcc09c9b094b7c4443faab56db26a4b45ff47970ffa572626a4cf49c35fb7991a33555e054baca115436396eab30e1a91542904e17fa34cddd6f62e883b7275c1c998b22b3abc0d003f176f439b9fa92a46c89c0af6c413010849cb605604f13294846453a747c7ff1b2ea802175c1a337e839106f03ffbf46a4f5f8cdbaff5e5ee4b2510978e9479795e6b45d209347067f1ab5cf0b3d109e97f8b00fe169ccc933eae7739e24ba023c25c3174195b42fe5b67aafa43d2a1df55ea1465942db5a642055ba2345c778391cb1a699734a28a9fd79cb9c5209e42c54d6292b222ac8e3f51ca7cf9e68283a5b77f635677092b3ef9bbb4b7b83af61574f9d498c22281ec27209230e13379fcf66ce0909135e5a6baa69bf7e7bf3fd7bcbf9debb22c7ebdab18c59d67fc6e4e86d1ee186743efd8a046ec09b3ff93c7fbff522a314f9567bc5c583f14802f4377d94822568c6384007bb40c8fb410db2b5fb68411f1473c5254e948712e51968b36575530d3992d4c558aa0a536277d7b308c67b994aa0d2f6636f858f5f17893265595b2ff14dd3c6f117fa8964dcf9739f9b2e995bc1518bf8ddc4cf68a48a7498b55195419d69d21f80d568ceeb3c8d6c4f1ed129c630d11cc6afa701bf0b085db3df6caeee8c29c4122343edc2e050c39a4fffb251ce5960cd2b25368d7184f56b259a29e60547bc0070c11c923cd0c635f52b20bab7e85a7907a480d7f3d9c0043381661a521cedb432d3e4c60125ab5c07e9333dabc69ad1ca69d34478475a4ee239ff40fcf9d8745be03135e6a2cd40e791b5c0344e18dcfdbffc1620ce37f287959e0b9412b77a0b9eac1a6b79164b04e22962d4495337850cf6ed648edca01da1138ee3c4cbc0f6f25edab69dafde06f6428f72297f22bc5f899be583e3e96f90dcdaefeaf1983c62ffc1ff0cea8cb677c87c6f8772b2e8fe7bdad0332c9a2dd306e48101f7390ed554045a8fd4e8c97bdd87e2a4469cffc71ab96b5d022df355ba63d7a0d41c86f54bf7b7d8c35d113d51603f95a1ad59bbd8d4773d7156e1567ecc079d649eddc9bd2f3d81665f38eecd14ce79e6e1ba72fd425654125ce92510d635668d98a3249adf7839"}}, &(0x7f00000000c0)) 2018/04/22 09:01:56 executing program 6: add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f00000006c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0xc7, 0x80800) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000640)={'bcsf0\x00', {0x2, 0x4e21, @multicast1=0xe0000001}}) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000540)={'raw\x00'}, &(0x7f0000000600)=0x54) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000480)="5370ed37cc01", 0x3, r1) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r1) r6 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x51de, 0x404101) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r6, 0x800442d2, &(0x7f00000004c0)={0x1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, @link_local}]}) r7 = socket$bt_rfcomm(0x1f, 0x1, 0x3) dup3(r7, r6, 0x80000) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r8, &(0x7f0000000140)=@hci, &(0x7f00000000c0)=0x80) keyctl$dh_compute(0x17, &(0x7f0000000340)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000300)='user\x00') 2018/04/22 09:01:56 executing program 0: io_setup(0xff, &(0x7f0000000000)=0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) timerfd_settime(r1, 0x1, &(0x7f0000000300)={{0x77359400}, {0x77359400}}, &(0x7f0000000340)) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, @dev}, &(0x7f0000000080)=0x10) socketpair$inet(0x2, 0x3, 0x7, &(0x7f00000002c0)) r3 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x4, 0x400) io_cancel(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x3, 0x7, r2, &(0x7f0000000140)="70ee18c02732754b4427603a099b1420dcd8d084957c2338b9910d0307af68dc2da94c6367ba0c55544cc3b50b3724d9192d08111aab861caa84cd0d9ab0847c9bbc36c237ac1c5128143304d97c99e0e42ba674334f0fd1c3e322cbc052880e7c716ced74fab66c4f75ab9b128b42c703472fc70a2e03e72181e3a3aebe57d59fb32b452d40094fb9fa2dc0617c5f7eb28024c02d05749e167f8df83ed7167676c37d12aaaea3e77e1723f2a9fa4869c8144e830974b7ea1f7467d8d27b9afeacca100b59e566731f72980fd317471e4f440ca13458d157a44a37cd75c5f655", 0xe0, 0x8, 0x0, 0x1, r3}, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x800) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0xfffffefd, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'digest_null\x00'}, 0x0, 0xffffffffffffff8c}) ioctl$sock_bt_hidp_HIDPCONNDEL(r1, 0x400448c9, &(0x7f0000000380)={{0x9, 0x200, 0x18, 0x0, 0x7, 0xfffffffffffffff9}, 0x191}) 2018/04/22 09:01:56 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') io_setup(0x1, &(0x7f0000000200)=0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) io_getevents(r1, 0x401, 0x3, &(0x7f0000000300)=[{}, {}, {}], &(0x7f00000003c0)={r2, r3+30000000}) getpeername(r0, &(0x7f0000000080)=@hci={0x0, 0x0}, &(0x7f0000000000)=0x80) sigaltstack(&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000140)) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000100)=r4) sigaltstack(&(0x7f0000ffd000/0x3000)=nil, &(0x7f00000001c0)) fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:56 executing program 2: uselib(&(0x7f00000004c0)='./file0\x00') r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='pagemap\x00') ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000480)={0x945, 0xffffffffffffffe1, 0x9, @random="eb2364a75a53", 'vcan0\x00'}) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r3 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r3) r5 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f0000000040)={0x89, @rand_addr=0x6, 0x7, 0x3, 'wlc\x00', 0x0, 0x7fffffff, 0x11}, 0x2c) r6 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x0, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r7 = socket$nl_route(0x10, 0x3, 0x0) getpeername(r7, &(0x7f0000000140)=@pppoe={0x0, 0x0, {0x0, @dev}}, &(0x7f00000000c0)=0x80) [ 173.063984] IPVS: set_ctl: invalid protocol: 137 0.0.0.6:7 wlc [ 173.133172] IPVS: set_ctl: invalid protocol: 137 0.0.0.6:7 wlc 2018/04/22 09:01:57 executing program 3: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffe) clock_gettime(0x4, &(0x7f00000001c0)) add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r1 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000540)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0xfffffe98, r1) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) r4 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x3, 0x0) add_key(&(0x7f0000000300)='big_key\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000600)="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", 0x1000, r0) clock_adjtime(0x6, &(0x7f0000001600)={0x3, 0x0, 0x7fff, 0x7, 0x17, 0xfffffffffffffffa, 0x0, 0xfffffffffffff56c, 0x26de, 0x40, 0xe44e, 0x9, 0x3, 0x836, 0xe57, 0xffff, 0x100, 0x0, 0x9, 0x5, 0x2da, 0x7, 0x2, 0x2280, 0x5, 0x4}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000180)={r5, 0x1f}, &(0x7f0000000280)=0x8) 2018/04/22 09:01:57 executing program 7: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, r0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r3 = syz_open_dev$tun(&(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x40000) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r3) r4 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r4) r6 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r5) r7 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r1) keyctl$dh_compute(0x17, &(0x7f0000000100)={r6, r7, r7}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'crct10dif\x00'}}) 2018/04/22 09:01:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') fgetxattr(r0, &(0x7f0000000040)=@known='security.evm\x00', &(0x7f0000000240)=""/166, 0xa6) 2018/04/22 09:01:57 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) keyctl$dh_compute(0x17, &(0x7f0000000280)={r4, r3, r4}, &(0x7f0000000480)=""/26, 0x1a, 0x0) r5 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x81, 0x24300) mkdirat$cgroup(r5, &(0x7f00000000c0)='syz0\x00', 0x1ff) r6 = msgget(0x1, 0x28) msgctl$MSG_INFO(r6, 0xc, &(0x7f0000000300)=""/112) 2018/04/22 09:01:57 executing program 6: add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f00000006c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0xc7, 0x80800) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000640)={'bcsf0\x00', {0x2, 0x4e21, @multicast1=0xe0000001}}) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000540)={'raw\x00'}, &(0x7f0000000600)=0x54) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000480)="5370ed37cc01", 0x3, r1) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r1) r6 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x51de, 0x404101) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r6, 0x800442d2, &(0x7f00000004c0)={0x1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, @link_local}]}) r7 = socket$bt_rfcomm(0x1f, 0x1, 0x3) dup3(r7, r6, 0x80000) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r8, &(0x7f0000000140)=@hci, &(0x7f00000000c0)=0x80) keyctl$dh_compute(0x17, &(0x7f0000000340)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000300)='user\x00') 2018/04/22 09:01:57 executing program 5: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r2 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a}, &(0x7f00000000c0)="f0", 0x1, r0) r3 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r2, r3, r2}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'poly1305\x00'}}) 2018/04/22 09:01:57 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x9, 0x208800) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f0000000480)={0x6, &(0x7f0000000440)=[{}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f00000004c0)={r1, 0x2}) r2 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000140)="67f75170005cc3f1b658d900c81807bcdc5eb670d9e0f22b40298e8808c63a66d871582fa1f556504d2d01a65547bc8a95aa7319def88e2e04fe2bad420352cf073e201e87db3ffcbe9aefc50ee7e76417bb6fdf24a3ae00b849a18776d0d7aebf14487c977fce1ff2ba7122a4892f4aae3c61286599c9db31a1e063e8c8a05aa01d326a53443a7800c31b5075f0d4dcb069208a561ca8fa30f96f35a2e640b280", 0xa1, 0xfffffffffffffffb) add_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000240)="88a266608059665b266df211a18c27e1a13d3692c743fa0a104a", 0x1a, 0xfffffffffffffff8) r3 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000380)="9e276c2a62e79d2c138e28111d2d06423c5453614788c84d29c550386b02f0cc96df1a4785849b03e450288bbea46fa7b94d2e060f551d13e6551d64cb71e895db4af30dfb3c5ad414a5b24b07747222ddab3db28d1285d91df77d5cf08e6e260df9c22334a3374d3a7f05e7749bc890a82d044dace93394a6325e5d92ff2a46b2a728eadec8c277a46e9751ba516ed2a0513633f96420fb7b725d845d0b10b8c1a6181aee9b5ea75402ff482e53def449e1c908b88a", 0xb6, 0xfffffffffffffff8) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r2}, &(0x7f0000000280)=""/5, 0x5, &(0x7f00000002c0)={&(0x7f0000a3dffa)={'md5-generic\x00'}}) 2018/04/22 09:01:57 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x41, 0x0) openat$cgroup_type(r0, &(0x7f0000000140)='cgroup.type\x00', 0x2, 0x0) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000840)="01966bae04c700221c752a38115f1d96b055045e100c5808481c9756ff392510e9aca5fd176dc09b1acbdd5198470b78cc22b5b19da1f4330ec723d913e122f82b9df7846764bd5afdddb7cbe377c70b4900000048c058c152c103a7c6d47dd8871a15fba7f09751333d35c3cf3c7a001b24142dacc15456000000000003553ca90f7a924fa1e21a0d607fe935037f757ad3b8d8015e0000", 0x1285e4bc2d0837f0, r1) r4 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000580), 0xfffffffffffffe2a, r1) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180)={0x1, 0x5}, 0x8) keyctl$dh_compute(0x17, &(0x7f0000000100)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}, 0x0, 0xfffffffffffffff3}) [ 173.400365] ================================================================== [ 173.407801] BUG: KMSAN: uninit-value in gf128mul_4k_lle+0x2b6/0x320 [ 173.414220] CPU: 0 PID: 11064 Comm: syz-executor3 Not tainted 4.16.0+ #85 [ 173.421154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.430512] Call Trace: [ 173.433106] dump_stack+0x185/0x1d0 [ 173.436734] ? gf128mul_4k_lle+0x2b6/0x320 [ 173.440971] kmsan_report+0x142/0x240 [ 173.444776] __msan_warning_32+0x6c/0xb0 [ 173.448845] gf128mul_4k_lle+0x2b6/0x320 [ 173.452908] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 173.458274] ? __crypto_xor+0x1608/0x16b0 [ 173.462431] ghash_update+0xa26/0x1160 [ 173.466327] ? ghash_init+0x50/0x50 [ 173.469956] shash_async_update+0x290/0x360 [ 173.474289] ? shash_async_init+0x270/0x270 [ 173.478626] gcm_hash+0x8b5/0x24a0 [ 173.482173] crypto_gcm_encrypt+0xa13/0xaf0 [ 173.486502] ? crypto_gcm_setauthsize+0xc0/0xc0 [ 173.491172] big_key_crypt+0x73d/0x780 [ 173.495072] big_key_preparse+0x3df/0xec0 2018/04/22 09:01:57 executing program 2: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x38080, 0x0) r4 = socket$inet(0x2, 0x4, 0x2) r5 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x200) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r4, r5}) [ 173.499219] ? kdf_ctr+0xc00/0xc00 [ 173.502760] key_create_or_update+0x7a8/0x1a40 [ 173.507360] SYSC_add_key+0x6c2/0x960 [ 173.511172] SyS_add_key+0x77/0xa0 [ 173.514717] do_syscall_64+0x309/0x430 [ 173.518612] ? keyring_detect_cycle_iterator+0x110/0x110 [ 173.524077] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 173.529267] RIP: 0033:0x455389 [ 173.532454] RSP: 002b:00007f2125a61c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 173.540161] RAX: ffffffffffffffda RBX: 00007f2125a626d4 RCX: 0000000000455389 2018/04/22 09:01:57 executing program 6: add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffc) r0 = add_key$keyring(&(0x7f0000000800)='keyring\x00', &(0x7f0000000840)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f00000007c0)='keyring\x00', &(0x7f00000006c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0xc7, 0x80800) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000640)={'bcsf0\x00', {0x2, 0x4e21, @multicast1=0xe0000001}}) getsockopt$IPT_SO_GET_INFO(r3, 0x0, 0x40, &(0x7f0000000540)={'raw\x00'}, &(0x7f0000000600)=0x54) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r2) r4 = add_key$user(&(0x7f0000000680)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000480)="5370ed37cc01", 0x3, r1) r5 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x120, r1) r6 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x51de, 0x404101) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r6, 0x800442d2, &(0x7f00000004c0)={0x1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, @link_local}]}) r7 = socket$bt_rfcomm(0x1f, 0x1, 0x3) dup3(r7, r6, 0x80000) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r8, &(0x7f0000000140)=@hci, &(0x7f00000000c0)=0x80) keyctl$dh_compute(0x17, &(0x7f0000000340)={r4, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000a3dffa)={'poly1305\x00'}}) 2018/04/22 09:01:57 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='/exe\x00\x00\x00\x00\x00\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) fchown(r0, r1, r2) [ 173.547429] RDX: 0000000020000600 RSI: 0000000020000340 RDI: 0000000020000300 [ 173.554697] RBP: 000000000072bea0 R08: 0000000002b4d4ba R09: 0000000000000000 [ 173.561965] R10: 0000000000001000 R11: 0000000000000246 R12: 00000000ffffffff [ 173.569232] R13: 0000000000000018 R14: 00000000006f32e0 R15: 0000000000000000 [ 173.576511] [ 173.578129] Uninit was stored to memory at: [ 173.582462] kmsan_internal_chain_origin+0x12b/0x210 [ 173.587571] __msan_chain_origin+0x69/0xc0 [ 173.591811] __crypto_xor+0x23c/0x16b0 [ 173.595701] ghash_update+0x9e4/0x1160 [ 173.599597] shash_async_update+0x290/0x360 [ 173.603931] gcm_hash+0x8b5/0x24a0 [ 173.607474] crypto_gcm_encrypt+0xa13/0xaf0 [ 173.611800] big_key_crypt+0x73d/0x780 [ 173.615700] big_key_preparse+0x3df/0xec0 [ 173.619854] key_create_or_update+0x7a8/0x1a40 [ 173.624440] SYSC_add_key+0x6c2/0x960 [ 173.628243] SyS_add_key+0x77/0xa0 [ 173.631782] do_syscall_64+0x309/0x430 [ 173.635678] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 173.640857] Uninit was stored to memory at: [ 173.645191] kmsan_internal_chain_origin+0x12b/0x210 2018/04/22 09:01:57 executing program 7: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ppp\x00', 0x2, 0x0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a}, &(0x7f0000000440)="01", 0x1, r2) add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, &(0x7f0000000580), 0x124, r0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x8040, 0x0) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000540)='team\x00') sendmsg$TEAM_CMD_OPTIONS_GET(r3, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x11001001}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x14, r4, 0x0, 0x70bd26, 0x25dfdbfc, {0x2}}, 0x14}, 0x1}, 0x24000880) request_key(&(0x7f00000003c0)='big_key\x00', &(0x7f00000004c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000500)='user\x00', r1) [ 173.650309] __msan_chain_origin+0x69/0xc0 [ 173.654550] __crypto_xor+0x23c/0x16b0 [ 173.658449] crypto_ctr_crypt_inplace+0x29a/0x3a0 [ 173.663304] crypto_ctr_crypt+0x54c/0x7d0 [ 173.667457] skcipher_encrypt_blkcipher+0x222/0x320 [ 173.672483] crypto_gcm_encrypt+0x53e/0xaf0 [ 173.676812] big_key_crypt+0x73d/0x780 [ 173.680706] big_key_preparse+0x3df/0xec0 [ 173.684857] key_create_or_update+0x7a8/0x1a40 [ 173.689445] SYSC_add_key+0x6c2/0x960 [ 173.693244] SyS_add_key+0x77/0xa0 [ 173.696785] do_syscall_64+0x309/0x430 [ 173.700697] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 173.705880] Uninit was created at: [ 173.709426] kmsan_alloc_meta_for_pages+0x161/0x3a0 [ 173.714445] kmsan_alloc_page+0x82/0xe0 [ 173.718427] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 173.723188] alloc_pages_current+0x6b5/0x970 [ 173.727607] big_key_alloc_buffer+0x241/0xa00 [ 173.732113] big_key_preparse+0x20a/0xec0 [ 173.736267] key_create_or_update+0x7a8/0x1a40 [ 173.740864] SYSC_add_key+0x6c2/0x960 [ 173.744666] SyS_add_key+0x77/0xa0 [ 173.748210] do_syscall_64+0x309/0x430 2018/04/22 09:01:57 executing program 0: mmap(&(0x7f0000000000/0xb29000)=nil, 0xb29000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x571, 0x113180) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f00000000c0)={0x7fffffff, 0x7, 0x3, 0x7fff, "ce0e15a7ac69a1b669a4f2a960e6c43bb23921362dedfed2a3d0e60550db0453a9c7fee42f02454320102d65", 0x20}) connect$netrom(r0, &(0x7f0000000080)=@ax25={0x3, {"55ed7303f08194"}, 0xfbb}, 0x10) keyctl$dh_compute(0x17, &(0x7f0000000100), &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000000)={&(0x7f0000a3dffa)={'digest_null\x00'}}) [ 173.752102] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 173.757284] ================================================================== [ 173.764639] Disabling lock debugging due to kernel taint [ 173.770086] Kernel panic - not syncing: panic_on_warn set ... [ 173.770086] [ 173.777458] CPU: 0 PID: 11064 Comm: syz-executor3 Tainted: G B 4.16.0+ #85 [ 173.785684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 173.795041] Call Trace: [ 173.797652] dump_stack+0x185/0x1d0 [ 173.801298] panic+0x39d/0x940 [ 173.804521] ? gf128mul_4k_lle+0x2b6/0x320 [ 173.808762] kmsan_report+0x238/0x240 [ 173.812575] __msan_warning_32+0x6c/0xb0 [ 173.816646] gf128mul_4k_lle+0x2b6/0x320 [ 173.820719] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 173.826091] ? __crypto_xor+0x1608/0x16b0 [ 173.830245] ghash_update+0xa26/0x1160 [ 173.834143] ? ghash_init+0x50/0x50 [ 173.837776] shash_async_update+0x290/0x360 [ 173.842116] ? shash_async_init+0x270/0x270 [ 173.846443] gcm_hash+0x8b5/0x24a0 [ 173.850001] crypto_gcm_encrypt+0xa13/0xaf0 [ 173.854344] ? crypto_gcm_setauthsize+0xc0/0xc0 [ 173.859023] big_key_crypt+0x73d/0x780 [ 173.862932] big_key_preparse+0x3df/0xec0 [ 173.867094] ? kdf_ctr+0xc00/0xc00 [ 173.870646] key_create_or_update+0x7a8/0x1a40 [ 173.875246] SYSC_add_key+0x6c2/0x960 [ 173.879059] SyS_add_key+0x77/0xa0 [ 173.882609] do_syscall_64+0x309/0x430 [ 173.886509] ? keyring_detect_cycle_iterator+0x110/0x110 [ 173.891975] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 173.897165] RIP: 0033:0x455389 [ 173.900352] RSP: 002b:00007f2125a61c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 173.908063] RAX: ffffffffffffffda RBX: 00007f2125a626d4 RCX: 0000000000455389 [ 173.915334] RDX: 0000000020000600 RSI: 0000000020000340 RDI: 0000000020000300 [ 173.922604] RBP: 000000000072bea0 R08: 0000000002b4d4ba R09: 0000000000000000 [ 173.929878] R10: 0000000000001000 R11: 0000000000000246 R12: 00000000ffffffff [ 173.937149] R13: 0000000000000018 R14: 00000000006f32e0 R15: 0000000000000000 [ 173.944882] Dumping ftrace buffer: [ 173.948411] (ftrace buffer empty) [ 173.952098] Kernel Offset: disabled [ 173.955701] Rebooting in 86400 seconds..