INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.10.38' (ECDSA) to the list of known hosts. 2018/04/24 18:54:07 fuzzer started 2018/04/24 18:54:07 dialing manager at 10.128.0.26:45643 syzkaller login: [ 49.888906] can: request_module (can-proto-0) failed. [ 49.900430] can: request_module (can-proto-0) failed. 2018/04/24 18:54:14 kcov=true, comps=false 2018/04/24 18:54:17 executing program 0: 2018/04/24 18:54:17 executing program 1: 2018/04/24 18:54:17 executing program 7: 2018/04/24 18:54:17 executing program 4: ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000000)={"73797a05000000007f0000007f004000", @ifru_map}) r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) 2018/04/24 18:54:17 executing program 2: r0 = socket$kcm(0x2, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000040)=@in={0x2, 0x0, @loopback=0x7f000001}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)="d7", 0x1}], 0x1}, 0x40) 2018/04/24 18:54:17 executing program 3: shmget(0x1, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) 2018/04/24 18:54:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x200000000000001a, &(0x7f0000000000)=0x2, 0x4) bind$inet6(r0, &(0x7f0000d1a000)={0xa, 0x4e20}, 0x1c) 2018/04/24 18:54:18 executing program 6: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) [ 54.780844] IPVS: ftp: loaded support on port[0] = 21 [ 54.904282] IPVS: ftp: loaded support on port[0] = 21 [ 54.961925] IPVS: ftp: loaded support on port[0] = 21 [ 55.045555] IPVS: ftp: loaded support on port[0] = 21 [ 55.184869] IPVS: ftp: loaded support on port[0] = 21 [ 55.283919] IPVS: ftp: loaded support on port[0] = 21 [ 55.418332] IPVS: ftp: loaded support on port[0] = 21 [ 55.586252] IPVS: ftp: loaded support on port[0] = 21 [ 56.055674] ip (4645) used greatest stack depth: 54312 bytes left [ 57.261781] ip (4745) used greatest stack depth: 54200 bytes left [ 57.824808] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.831309] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.853434] device bridge_slave_0 entered promiscuous mode [ 57.903933] bridge0: port 1(bridge_slave_0) entered blocking state [ 57.910474] bridge0: port 1(bridge_slave_0) entered disabled state [ 57.935300] device bridge_slave_0 entered promiscuous mode [ 58.043574] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.050121] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.073429] device bridge_slave_1 entered promiscuous mode [ 58.189637] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.196117] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.233693] device bridge_slave_1 entered promiscuous mode [ 58.304507] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.383223] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.401222] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.407720] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.442865] device bridge_slave_0 entered promiscuous mode [ 58.459920] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.466431] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.495210] device bridge_slave_0 entered promiscuous mode [ 58.542425] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.552842] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 58.632899] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.639464] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.685694] device bridge_slave_1 entered promiscuous mode [ 58.711175] bridge0: port 2(bridge_slave_1) entered blocking state [ 58.717784] bridge0: port 2(bridge_slave_1) entered disabled state [ 58.749328] device bridge_slave_1 entered promiscuous mode [ 58.787072] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.793539] bridge0: port 1(bridge_slave_0) entered disabled state [ 58.801359] ip (4851) used greatest stack depth: 53640 bytes left [ 58.822281] device bridge_slave_0 entered promiscuous mode [ 58.908151] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.957835] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 58.965809] bridge0: port 1(bridge_slave_0) entered blocking state [ 58.972341] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.021512] device bridge_slave_0 entered promiscuous mode [ 59.074615] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.102423] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.108924] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.153704] device bridge_slave_1 entered promiscuous mode [ 59.182965] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.209093] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.215581] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.256498] device bridge_slave_0 entered promiscuous mode [ 59.284645] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.291150] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.299602] device bridge_slave_1 entered promiscuous mode [ 59.315066] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.332219] bridge0: port 1(bridge_slave_0) entered blocking state [ 59.338691] bridge0: port 1(bridge_slave_0) entered disabled state [ 59.360415] device bridge_slave_0 entered promiscuous mode [ 59.393637] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.428730] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.438900] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.526309] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.532882] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.552174] device bridge_slave_1 entered promiscuous mode [ 59.568910] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.584369] bridge0: port 2(bridge_slave_1) entered blocking state [ 59.590912] bridge0: port 2(bridge_slave_1) entered disabled state [ 59.620655] device bridge_slave_1 entered promiscuous mode [ 59.643191] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 59.655252] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.665244] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 59.729593] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.791964] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.803247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 59.847280] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 59.854321] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 59.898132] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 59.928283] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 59.935363] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.013668] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.025267] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.034622] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 60.093655] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.100699] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.167066] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.213790] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.220831] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.371156] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.394945] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.408001] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.416314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.460868] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.478200] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.616636] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 60.623759] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 60.638270] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.661308] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 60.672167] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.691672] team0: Port device team_slave_0 added [ 60.721498] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 60.733544] team0: Port device team_slave_0 added [ 60.746442] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.762915] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 60.904263] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.911280] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 60.936848] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 60.944307] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 60.968500] team0: Port device team_slave_1 added [ 60.985500] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.000895] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.009571] team0: Port device team_slave_1 added [ 61.045979] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.062970] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 61.100640] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.109550] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.125969] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.134608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.180859] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.187912] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.205000] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.242696] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.249735] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.266983] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.309637] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.321074] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.337935] team0: Port device team_slave_0 added [ 61.348669] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 61.365399] team0: Port device team_slave_0 added [ 61.372350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.394980] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 61.402979] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 61.444787] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.452095] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.470712] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.511179] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.531360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.558682] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 61.567908] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.598118] team0: Port device team_slave_1 added [ 61.621135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 61.632426] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 61.675741] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 61.683251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 61.700963] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 61.715108] team0: Port device team_slave_1 added [ 61.737433] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.746823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.760853] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.828597] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 61.836392] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 61.849239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 61.873981] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.914631] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 61.943987] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 61.982923] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 61.990014] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.009440] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.047775] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.058091] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.077319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.101018] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.112316] team0: Port device team_slave_0 added [ 62.118218] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.128444] team0: Port device team_slave_0 added [ 62.151866] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.160236] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.178435] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.192590] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.212729] team0: Port device team_slave_0 added [ 62.227317] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 62.245395] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.258329] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 62.283878] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 62.315420] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.338253] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.363327] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.386464] team0: Port device team_slave_1 added [ 62.397316] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.407888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.417140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.446816] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 62.457296] team0: Port device team_slave_0 added [ 62.464987] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 62.472895] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 62.489861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 62.509623] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.518934] team0: Port device team_slave_1 added [ 62.533961] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.556727] team0: Port device team_slave_1 added [ 62.590141] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 62.615218] team0: Port device team_slave_1 added [ 62.633899] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.649110] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.678231] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.709868] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 62.726172] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 62.740247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 62.759977] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.768895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.778822] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.785907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.816370] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.846143] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.865992] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.887777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.907982] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.925739] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 62.950789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 62.973405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 62.997228] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.009568] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.033017] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.040511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.086109] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.121210] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.145366] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.163747] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.172820] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.203298] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.215482] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.229682] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.241388] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.253611] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.274804] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.303281] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.314934] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 63.321925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.350164] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.382726] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 63.392494] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 63.416229] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.432846] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.451636] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.492888] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.503202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.527075] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.558284] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.569070] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 63.592159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.612872] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 63.631185] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 63.661135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 63.783614] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 63.792798] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 63.815572] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.813623] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.820147] bridge0: port 2(bridge_slave_1) entered forwarding state [ 64.827116] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.833586] bridge0: port 1(bridge_slave_0) entered forwarding state [ 64.876092] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 64.919625] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 65.197670] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.204177] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.211110] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.217579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.283166] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.305513] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.312010] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.318881] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.325349] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.343181] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.578377] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.584877] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.591732] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.598203] bridge0: port 1(bridge_slave_0) entered forwarding state [ 65.680230] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 65.946854] bridge0: port 2(bridge_slave_1) entered blocking state [ 65.953362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 65.960287] bridge0: port 1(bridge_slave_0) entered blocking state [ 65.966768] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.001242] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.011419] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.022900] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.041634] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.058510] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 66.083566] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.090121] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.096971] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.103453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.119262] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.135193] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.141655] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.148481] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.154889] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.165755] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 66.418719] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.425236] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.432185] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.438691] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.519267] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.039865] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.054087] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.083090] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 74.094585] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.302542] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.409742] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.433391] 8021q: adding VLAN 0 to HW filter on device bond0 [ 74.901454] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.066107] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.109996] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.137700] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.170561] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.238500] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.258236] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.420451] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.752382] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 75.758705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 75.773369] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 75.865018] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.895145] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.982960] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 75.996866] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.003276] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.014346] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.080010] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.086408] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.099127] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.160801] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.172680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.185239] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.337601] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 76.660764] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.696451] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.702750] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.719214] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.774286] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.780623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.796962] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.848451] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 76.862000] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 76.883752] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 76.901705] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.093585] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.154802] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.196424] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 77.202766] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 77.214413] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 77.597796] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.632459] 8021q: adding VLAN 0 to HW filter on device team0 [ 77.801149] 8021q: adding VLAN 0 to HW filter on device team0 [ 78.033883] 8021q: adding VLAN 0 to HW filter on device team0 2018/04/24 18:54:46 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x1) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@remote={0xfe, 0x80, [], 0xbb}, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev={0xac, 0x14, 0x14}, 0x0, 0x2b}, 0x0, @in6=@loopback={0x0, 0x1}, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f0000000100)={0xa}, 0x1c) 2018/04/24 18:54:46 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, &(0x7f0000000000)={0x0, @dev={0xac, 0x14, 0x14}, 0x0, 0x2, 'ovf\x00'}, 0x2c) ptrace(0x4207, r1) ptrace$getenv(0x4201, r1, 0x0, &(0x7f0000000480)) 2018/04/24 18:54:46 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x4a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x84) sendmsg(r0, &(0x7f00003b2fc8)={&(0x7f000000cff0)=@in={0x2}, 0x80, &(0x7f0000029ff0)=[{&(0x7f00003b2000)="0000000000000000902238db029d9ce1", 0x10}], 0x1, &(0x7f0000001000)}, 0x0) 2018/04/24 18:54:46 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000005c0)='./file1\x00', 0x0) dup3(r1, r0, 0x0) fcntl$setstatus(r0, 0x4, 0x4000) pwrite64(r1, &(0x7f0000000600)="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", 0x24e, 0x800) 2018/04/24 18:54:46 executing program 7: mkdir(&(0x7f00003e4000)='./file0\x00', 0x0) r0 = inotify_init() unshare(0x40600) inotify_add_watch(r0, &(0x7f000066f000)='./file0\x00', 0x13) 2018/04/24 18:54:46 executing program 5: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev={0xfe, 0x80}, 0x5}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @loopback=0x7f000001}}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) 2018/04/24 18:54:46 executing program 6: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000000080)={0x18, 0x2, {0x1}}, 0x1e) 2018/04/24 18:54:46 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000200)=ANY=[@ANYBLOB="e0000002ac1414aa00000000010000007f00000146aed967b0c5833b782e18c1ce1995be36e460a6d2bb8e4e249d2db18220177e50213c2fd0d169c39579563dd7ec590ad61750c6d6bf324d7d7f6132bc7948320fef222fc37115310a174ca69708cdfbede350a4f61e4f8bc60adae658b18516f7ad16bd2cc2dcf7c0d8ae8fa43fbd9234d536880150da43b0d9b162fa6e8d085a07781720e3f3ea1c3f3db2c3b74324c7a5adcac239439e55c0396d95a03ef039ebdf7a42cb31c0414775fa824c1aeb"], 0x1) r1 = socket$inet(0x2, 0x3, 0x19) dup2(r1, r0) 2018/04/24 18:54:46 executing program 5: r0 = socket(0x2000000000a, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000000)={@empty, @mcast1={0xff, 0x1, [], 0x1}, @loopback={0x40000000, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x803ffdfe, r1}) 2018/04/24 18:54:46 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0x14, 0xaa}}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2=0xe0000002, @in=@multicast1=0xe0000001}}, {{@in6}, 0x0, @in6=@loopback={0x0, 0x1}}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000200)=ANY=[@ANYBLOB="e0000002ac1414aa00000000010000007f00000146aed967b0c5833b782e18c1ce1995be36e460a6d2bb8e4e249d2db18220177e50213c2fd0d169c39579563dd7ec590ad61750c6d6bf324d7d7f6132bc7948320fef222fc37115310a174ca69708cdfbede350a4f61e4f8bc60adae658b18516f7ad16bd2cc2dcf7c0d8ae8fa43fbd9234d536880150da43b0d9b162fa6e8d085a07781720e3f3ea1c3f3db2c3b74324c7a5adcac239439e55c0396d95a03ef039ebdf7a42cb31c0414775fa824c1aeb"], 0x1) r1 = socket$inet(0x2, 0x3, 0x19) dup2(r1, r0) 2018/04/24 18:54:46 executing program 4: ptrace$peek(0x1, 0x0, &(0x7f00000002c0)) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x102) linkat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) r1 = accept(0xffffffffffffffff, &(0x7f0000000380)=@can, &(0x7f0000000280)=0x80) setsockopt$inet_mreq(r1, 0x0, 0x0, &(0x7f0000000400)={@empty, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x8) timer_create(0x7, &(0x7f0000000080), &(0x7f00000000c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000180)=0xc) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) timer_getoverrun(0x0) write$binfmt_elf32(r0, &(0x7f0000000280)=ANY=[], 0x0) ioctl$int_out(r0, 0x0, &(0x7f0000000240)) 2018/04/24 18:54:46 executing program 1: clock_gettime(0x2, &(0x7f0000000000)) 2018/04/24 18:54:46 executing program 0: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) bind$netlink(r0, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) 2018/04/24 18:54:46 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='..', 0x0, 0x0) close(r1) 2018/04/24 18:54:46 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80002, 0x0) r1 = socket(0x10, 0x80002, 0x0) dup3(r0, r1, 0x0) 2018/04/24 18:54:46 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/vcs\x00', 0x0, 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x4a95) 2018/04/24 18:54:48 executing program 5: 2018/04/24 18:54:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tun(&(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={"6966623000faffffffffffffff00", 0x5001}) poll(&(0x7f0000000400)=[{r0}], 0x1, 0x0) 2018/04/24 18:54:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d0500000000000000001040000000000000000200000000000000000000000000000000000000000000008002000000000070000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000000000000000100", 0xcb, 0x10000}], 0x0, &(0x7f0000000a40)=ANY=[]) 2018/04/24 18:54:48 executing program 2: 2018/04/24 18:54:48 executing program 7: 2018/04/24 18:54:48 executing program 3: 2018/04/24 18:54:48 executing program 4: 2018/04/24 18:54:48 executing program 6: [ 84.643593] BTRFS: device fsid ecf6f2a3-2997-48ae-b81e-1b00920efd9a devid 1 transid 5 /dev/loop1 2018/04/24 18:54:48 executing program 4: 2018/04/24 18:54:48 executing program 7: 2018/04/24 18:54:48 executing program 3: 2018/04/24 18:54:48 executing program 2: 2018/04/24 18:54:48 executing program 6: 2018/04/24 18:54:48 executing program 5: 2018/04/24 18:54:48 executing program 1: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="8da4363a00000000000000000000000000000000000000000000000000000000ecf6f2a3299748aeb81e1b00920efd9a000001000000000001000000000000005f42485266535f4d0500000000000000001040000000000000000200000000000000000000000000000000000000000000008002000000000070000000000000060000000000000001000000000000000010000000100000001000000010000061000000040000000000000000000000000000000000000000000000450100000000000000000000000100", 0xcb, 0x10000}], 0x0, &(0x7f0000000a40)=ANY=[]) 2018/04/24 18:54:48 executing program 0: 2018/04/24 18:54:49 executing program 4: 2018/04/24 18:54:49 executing program 7: 2018/04/24 18:54:49 executing program 2: 2018/04/24 18:54:49 executing program 5: 2018/04/24 18:54:49 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r0, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2=0xe0000002}, 0x4}}, 0x2e) connect$l2tp(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x32) 2018/04/24 18:54:49 executing program 3: io_setup(0x800, &(0x7f0000000180)=0x0) io_cancel(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)}, &(0x7f0000000140)) 2018/04/24 18:54:49 executing program 1: keyctl$read(0x15, 0xfffffffffffffffd, &(0x7f0000000040)=""/4, 0x4) 2018/04/24 18:54:49 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000065fc8)={&(0x7f00002dfff4)={0x10}, 0xc, &(0x7f0000fd1000)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000000a0afdff0000004df181000000000000"], 0x14}, 0x1}, 0x0) 2018/04/24 18:54:49 executing program 2: 2018/04/24 18:54:49 executing program 5: 2018/04/24 18:54:49 executing program 7: 2018/04/24 18:54:49 executing program 4: 2018/04/24 18:54:49 executing program 6: 2018/04/24 18:54:49 executing program 0: 2018/04/24 18:54:49 executing program 3: 2018/04/24 18:54:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$tun(&(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={"62726964676530000000000000dfff00", 0x1001}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x306) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'bridge0\x00', 0x1}) 2018/04/24 18:54:49 executing program 2: 2018/04/24 18:54:49 executing program 1: 2018/04/24 18:54:49 executing program 6: request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) 2018/04/24 18:54:49 executing program 7: mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x4000100001a072, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x5) 2018/04/24 18:54:49 executing program 4: 2018/04/24 18:54:49 executing program 3: 2018/04/24 18:54:49 executing program 0: 2018/04/24 18:54:49 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x82) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x16, 0x0, "12ede57567c3f549acd930cd898cc4a554f498436a51fa2ad0651ab35991bf058310f7ba19c0d85cb622b03018cd638426b7c5bac0250945cd900d2ad5ffaabf", "de70ac275524c94555a83392e5018e2904676fbea0d1e145e32dd7d33202fb088cb9c42037c696925c684ad173c73c6ce9ec92709db51d4facb6e89dacbd6907", "89c0c302a6cf9af4376185302a621f6aa0cddb8509921edb815817bee5ea1793"}) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "a6745e20a2cf1d8dccc5028bb1ad7aa9a243e4a7f5d0df32106ab82176aa8b01ff43ee0e13c74a9a2ed4c73538f46aea0209389ad069b2e57599185dcc72c97e", "bbf9952cd049784e258bae44a393df6632952a1f8df0d03570e46aad40b09a427d059273664b8c19de2e091ab141aecc5074d5fbfec10ed09f6bfb20b5a5b93f", "1c48a5b5c5b34ce4a65b956940cf7df5852bb5395a2052bec30d09303c693354"}) 2018/04/24 18:54:49 executing program 3: 2018/04/24 18:54:49 executing program 0: 2018/04/24 18:54:49 executing program 4: 2018/04/24 18:54:49 executing program 2: 2018/04/24 18:54:49 executing program 1: 2018/04/24 18:54:49 executing program 7: 2018/04/24 18:54:49 executing program 6: request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) 2018/04/24 18:54:49 executing program 5: 2018/04/24 18:54:50 executing program 3: 2018/04/24 18:54:50 executing program 6: request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) 2018/04/24 18:54:50 executing program 2: 2018/04/24 18:54:50 executing program 7: 2018/04/24 18:54:50 executing program 5: 2018/04/24 18:54:50 executing program 1: 2018/04/24 18:54:50 executing program 0: 2018/04/24 18:54:50 executing program 4: 2018/04/24 18:54:50 executing program 2: 2018/04/24 18:54:50 executing program 5: 2018/04/24 18:54:50 executing program 0: 2018/04/24 18:54:50 executing program 4: 2018/04/24 18:54:50 executing program 1: 2018/04/24 18:54:50 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000040)='..', 0x0, 0x0) getdents64(r1, &(0x7f00000010c0)=""/4096, 0x1000) 2018/04/24 18:54:50 executing program 7: clone(0x200, &(0x7f0000000380), &(0x7f0000000040), &(0x7f0000000340), &(0x7f0000000180)) mknod(&(0x7f0000001d40)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000006cc0)='./file0\x00', &(0x7f0000578fe8), &(0x7f0000775000)) seccomp(0x1, 0x1, &(0x7f0000028ff0)={0x1, &(0x7f00000b3000)=[{0x6}]}) execveat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), &(0x7f00000003c0), 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x801, 0x0) 2018/04/24 18:54:50 executing program 6: request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) [ 87.260443] audit: type=1326 audit(1524596091.259:3): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6832 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455389 code=0x0 [ 87.279873] audit: type=1326 audit(1524596091.259:4): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6832 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455389 code=0x0 [ 87.299248] audit: type=1326 audit(1524596091.259:5): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6832 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=228 compat=0 ip=0x4581aa code=0x0 [ 87.318591] audit: type=1326 audit(1524596091.260:6): auid=4294967295 uid=0 gid=0 ses=4294967295 pid=6832 comm="syz-executor7" exe="/root/syz-executor7" sig=31 arch=c000003e syscall=202 compat=0 ip=0x455389 code=0x0 2018/04/24 18:54:51 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) getgid() syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 2018/04/24 18:54:51 executing program 1: 2018/04/24 18:54:51 executing program 0: 2018/04/24 18:54:51 executing program 3: 2018/04/24 18:54:51 executing program 5: 2018/04/24 18:54:51 executing program 4: 2018/04/24 18:54:51 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000200)={0x7fff, 0x1, 0x3}, 0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r2) 2018/04/24 18:54:51 executing program 6 (fault-call:0 fault-nth:0): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) [ 87.807600] FAULT_INJECTION: forcing a failure. [ 87.807600] name failslab, interval 1, probability 0, space 0, times 1 [ 87.818973] CPU: 1 PID: 6853 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 87.825854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 87.835237] Call Trace: [ 87.837874] dump_stack+0x185/0x1d0 [ 87.841547] should_fail+0x87b/0xab0 [ 87.845320] should_failslab+0x279/0x2a0 [ 87.849437] __kmalloc_track_caller+0x208/0xcb0 2018/04/24 18:54:51 executing program 3: r0 = memfd_create(&(0x7f0000020fff)='\x00', 0x0) fcntl$setlease(r0, 0x40a, 0x0) bind$ax25(r0, &(0x7f0000000000)={0x3, {"4cf2e400fd9166"}, 0x81}, 0x10) 2018/04/24 18:54:51 executing program 5: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x18111d, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') sendfile(r0, r1, &(0x7f00000001c0), 0x4000000000102) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) [ 87.854167] ? strndup_user+0x134/0x1f0 [ 87.858223] ? kmsan_set_origin_inline+0x6b/0x120 [ 87.863121] memdup_user+0x7c/0x200 [ 87.866813] strndup_user+0x134/0x1f0 [ 87.870703] SYSC_request_key+0x1f0/0x790 [ 87.874949] SyS_request_key+0x65/0x90 [ 87.878919] do_syscall_64+0x309/0x430 [ 87.882859] ? SYSC_add_key+0x960/0x960 [ 87.886873] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 87.892090] RIP: 0033:0x455389 [ 87.895302] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 2018/04/24 18:54:51 executing program 4: setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @empty, @broadcast=0xffffffff}, 0xc) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x4000) readv(r0, &(0x7f0000000000)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/4096, 0x1000}], 0x10000000000001af) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x7fff, 0x8000, 0x2, 0x8, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={r1, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}}, 0x84) syz_extract_tcp_res(&(0x7f0000000080), 0x9, 0x6) [ 87.903050] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 87.910353] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 87.917657] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 87.924959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 87.932260] R13: 00000000000004a7 R14: 00000000006fa048 R15: 0000000000000000 2018/04/24 18:54:52 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f00005e2000/0x1000)=nil, 0x1000, 0x2, 0x2032, 0xffffffffffffffff, 0x0) vmsplice(r1, &(0x7f00005e48eb)=[{&(0x7f00005e2f97)="f8", 0x1}], 0x1, 0x0) mmap(&(0x7f00005e2000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f000017f000)=[{&(0x7f00003d5000)='=', 0x1}], 0x1, 0x0) 2018/04/24 18:54:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0x9, 0x6}, 'port0\x00', 0xc0, 0x101008, 0x2, 0x4, 0x3f, 0x3ca, 0x99, 0x0, 0x1, 0x3}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='@$cgroupwlan0', 0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) sendmmsg(0xffffffffffffffff, &(0x7f0000006680)=[{{&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000001840)}}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {&(0x7f0000012000)=""/252, 0xfc}, {&(0x7f0000012000)=""/155, 0x9b}, {&(0x7f00000001c0)=""/11, 0xb}, {&(0x7f0000000000)=""/102, 0xfffffffffffffef8}], 0x5, 0x0) ioctl(r1, 0xc2604110, &(0x7f0000000000)) [ 87.986594] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2018/04/24 18:54:52 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000200)={0x7fff, 0x1, 0x3}, 0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r2) 2018/04/24 18:54:52 executing program 3: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = open(&(0x7f0000aa0000)='./file0\x00', 0x0, 0x0) r4 = fcntl$dupfd(r3, 0x800000000402, 0xffffffffffffffff) write$eventfd(r4, &(0x7f0000000040), 0x8) unshare(0x400) r5 = fcntl$dupfd(r4, 0x402, r2) epoll_wait(r1, &(0x7f0000bf2f88)=[{}], 0x1, 0x8001) ioctl$TCSBRK(r0, 0x5409, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r5, 0xc05c5340, &(0x7f0000000080)={0x4381, 0x40, 0x3, {}, 0x1b4, 0x2}) epoll_pwait(r1, &(0x7f0000f3afb8)=[{}], 0x0, 0xfffffffffffffff9, &(0x7f0000cb0ff8), 0x8) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000b87ff4)={0x4}) 2018/04/24 18:54:52 executing program 4: setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000440)={0x0, @empty, @broadcast=0xffffffff}, 0xc) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x4000) readv(r0, &(0x7f0000000000)=[{&(0x7f0000002c00)=""/4096, 0x1000}, {&(0x7f0000003c00)=""/4096, 0x1000}], 0x10000000000001af) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000040)={0x7fff, 0x8000, 0x2, 0x8, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000140)={r1, @in={{0x2, 0x4e24, @broadcast=0xffffffff}}}, 0x84) syz_extract_tcp_res(&(0x7f0000000080), 0x9, 0x6) 2018/04/24 18:54:52 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x87) sendto$inet6(r0, &(0x7f0000b0cf6e), 0x0, 0x0, &(0x7f000001b000)={0xa, 0x1}, 0x1c) 2018/04/24 18:54:52 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0x9, 0x6}, 'port0\x00', 0xc0, 0x101008, 0x2, 0x4, 0x3f, 0x3ca, 0x99, 0x0, 0x1, 0x3}) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mq_open(&(0x7f0000000080)='@$cgroupwlan0', 0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}) sendmmsg(0xffffffffffffffff, &(0x7f0000006680)=[{{&(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000001840)}}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000009f7c)=""/132, 0x84}, {&(0x7f0000012000)=""/252, 0xfc}, {&(0x7f0000012000)=""/155, 0x9b}, {&(0x7f00000001c0)=""/11, 0xb}, {&(0x7f0000000000)=""/102, 0xfffffffffffffef8}], 0x5, 0x0) ioctl(r1, 0xc2604110, &(0x7f0000000000)) 2018/04/24 18:54:52 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) getgid() syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa00040000000086dd60d8652b00140600fe0100000000000000000000bc2e3793d75c668fa1c2352e8d34154345cb99ba89600033a33f000000aafe8000000000000000000000000000aa00004e202ebc34ad0f93b5e325e2b792891a58cb205849c92743993364703d1a242c58dd3cbc78899fba1db764a01f93e13922ecfcee85b47ebb2a0d2ffff5e4fcdcba9cdb0dca533a5d915066c5c2d1cb49b63cd884d2df2b0a3cb0cdfdcab2c17730eb6c23b31a4bd14763535d62142bc284d291cb44e643535107da0bcdb38786f7c3bff836f271b6349984ee6b513983ca075b6919ce11cdb2632ff96962cf2605945c81a847098b1b57b3a72dfeab29b4ce41e7c8c2c502905c0b083f01c44322774fb184fe0a2b9095504c02ec858eb8b9", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 2018/04/24 18:54:52 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f00005e2000/0x1000)=nil, 0x1000, 0x2, 0x2032, 0xffffffffffffffff, 0x0) vmsplice(r1, &(0x7f00005e48eb)=[{&(0x7f00005e2f97)="f8", 0x1}], 0x1, 0x0) mmap(&(0x7f00005e2000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f000017f000)=[{&(0x7f00003d5000)='=', 0x1}], 0x1, 0x0) 2018/04/24 18:54:52 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000200)={0x7fff, 0x1, 0x3}, 0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r2) 2018/04/24 18:54:52 executing program 6 (fault-call:0 fault-nth:1): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) [ 88.420189] FAULT_INJECTION: forcing a failure. [ 88.420189] name failslab, interval 1, probability 0, space 0, times 0 [ 88.431619] CPU: 0 PID: 6913 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 88.438496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 88.447877] Call Trace: [ 88.450510] dump_stack+0x185/0x1d0 [ 88.454183] should_fail+0x87b/0xab0 [ 88.457950] should_failslab+0x279/0x2a0 [ 88.462060] __kmalloc_track_caller+0x208/0xcb0 2018/04/24 18:54:52 executing program 4: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1f) bind(r0, &(0x7f0000000100)=@can={0x1d}, 0x80) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)=0x0) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x5, 0x0, 0xfff, 0x5, 0xfffffffffffffffb, 0x3, 0xfffffffffffffffd}, 0x0) 2018/04/24 18:54:52 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3ff, 0x30, 0x7bb6d996, 0x2}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x0, 0x2, 0x0, 0x14d0, 0x100000001}, 0x14) mq_getsetattr(r1, &(0x7f00000001c0)={0x7, 0xff, 0x4dc7e986, 0x72d, 0x1, 0x2, 0x3f, 0x100000000}, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x80000000, 0x5, 0x7, 0x8, 0x7ff, 0xb3c3}) getsockopt$inet6_int(r1, 0x29, 0x7b, &(0x7f0000000140), &(0x7f0000000180)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) socket$can_raw(0x1d, 0x3, 0x1) 2018/04/24 18:54:52 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f00000001c0)=@ethtool_regs={0x17}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team0\x00', 0x9900}) [ 88.466777] ? strndup_user+0x134/0x1f0 [ 88.470816] ? kmsan_set_origin+0x9e/0x160 [ 88.475114] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 88.480523] memdup_user+0x7c/0x200 [ 88.484199] strndup_user+0x134/0x1f0 [ 88.488086] SYSC_request_key+0x2a9/0x790 [ 88.492337] SyS_request_key+0x65/0x90 [ 88.496308] do_syscall_64+0x309/0x430 [ 88.500249] ? SYSC_add_key+0x960/0x960 [ 88.504271] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 88.509488] RIP: 0033:0x455389 [ 88.512695] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 88.520448] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 88.527753] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 88.535053] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 88.542363] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 88.549674] R13: 00000000000004a7 R14: 00000000006fa048 R15: 0000000000000001 [ 88.563416] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2018/04/24 18:54:52 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000200)={0x7fff, 0x1, 0x3}, 0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000100)=r2) [ 88.601998] device team0 entered promiscuous mode [ 88.607085] device team_slave_0 entered promiscuous mode [ 88.612851] device team_slave_1 entered promiscuous mode 2018/04/24 18:54:52 executing program 0: getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000000)={0x0}, &(0x7f000005c000)=0x20) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x6, 0x0) ioctl$int_out(r1, 0x1, &(0x7f000005bff8)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f00000001c0)={r0, @in={{0x2, 0x4e22}}, [0x8, 0xffff, 0x7, 0x0, 0x200, 0x3f, 0x8000, 0x401, 0xeb1, 0x1, 0x901, 0x5, 0x100000095, 0x4, 0x4]}, &(0x7f0000000140)=0x100) 2018/04/24 18:54:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x1, 0x4) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x121080, 0x0) r2 = shmget$private(0x0, 0x4000, 0x31, &(0x7f0000ffa000/0x4000)=nil) getresuid(&(0x7f00000000c0)=0x0, &(0x7f0000000100)=0x0, &(0x7f0000000140)) getresgid(&(0x7f0000000180), &(0x7f00000001c0)=0x0, &(0x7f0000000200)) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r4) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000480)={0x4, &(0x7f0000000440)=[{}, {}, {0x0}, {}]}) ioctl$DRM_IOCTL_DMA(r1, 0xc0406429, &(0x7f00000005c0)={r7, 0x3, &(0x7f00000004c0)=[0x40, 0x25, 0x2], &(0x7f0000000500)=[0x5f, 0xffffffffffffffe0, 0x3d3f, 0x7f, 0x10001, 0x7, 0x0, 0x100000000], 0x24, 0x3, 0x7, &(0x7f0000000540)=[0x0, 0x9, 0x1], &(0x7f0000000580)=[0x2, 0x6844, 0x0, 0xd2000, 0x8, 0x8]}) getresgid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r9 = getpid() ioctl$KDDISABIO(r1, 0x4b37) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0x5, r3, r5, r6, r8, 0x120, 0x3}, 0x10000, 0x2, 0x200, 0x6, r9, r10, 0x20}) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000080)={0xcc, 0x8, 0x7, 0xca, 0xfffffffffffffe01, 0x2, 0x401, 0x80000000, 0x1000, 0x80}) 2018/04/24 18:54:52 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) getgid() syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa00040000000086dd60d8652b00140600fe0100000000000000000000bc2e3793d75c668fa1c2352e8d34154345cb99ba89600033a33f000000aafe8000000000000000000000000000aa00004e202ebc34ad0f93b5e325e2b792891a58cb205849c92743993364703d1a242c58dd3cbc78899fba1db764a01f93e13922ecfcee85b47ebb2a0d2ffff5e4fcdcba9cdb0dca533a5d915066c5c2d1cb49b63cd884d2df2b0a3cb0cdfdcab2c17730eb6c23b31a4bd14763535d62142bc284d291cb44e643535107da0bcdb38786f7c3bff836f271b6349984ee6b513983ca075b6919ce11cdb2632ff96962cf2605945c81a847098b1b57b3a72dfeab29b4ce41e7c8c2c502905c0b083f01c44322774fb184fe0a2b9095504c02ec858eb8b9", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) 2018/04/24 18:54:52 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000200)={0x7fff, 0x1, 0x3}, 0xc) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) [ 88.898631] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2018/04/24 18:54:53 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f00000001c0)=@ethtool_regs={0x17}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team0\x00', 0x9900}) 2018/04/24 18:54:53 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000200)={0x7fff, 0x1, 0x3}, 0xc) 2018/04/24 18:54:53 executing program 0: mmap(&(0x7f0000000000/0x709000)=nil, 0x709000, 0x0, 0x20004403d, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x400000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@mcast2, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000180)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r0, &(0x7f0000000040)='./file0\x00', r1, r2, 0x400) madvise(&(0x7f00005f6000/0x2000)=nil, 0x2000, 0x11) 2018/04/24 18:54:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3ff, 0x30, 0x7bb6d996, 0x2}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x0, 0x2, 0x0, 0x14d0, 0x100000001}, 0x14) mq_getsetattr(r1, &(0x7f00000001c0)={0x7, 0xff, 0x4dc7e986, 0x72d, 0x1, 0x2, 0x3f, 0x100000000}, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x80000000, 0x5, 0x7, 0x8, 0x7ff, 0xb3c3}) getsockopt$inet6_int(r1, 0x29, 0x7b, &(0x7f0000000140), &(0x7f0000000180)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) socket$can_raw(0x1d, 0x3, 0x1) 2018/04/24 18:54:53 executing program 6 (fault-call:0 fault-nth:2): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) 2018/04/24 18:54:53 executing program 4: r0 = socket$pptp(0x18, 0x1, 0x2) socket$pptp(0x18, 0x1, 0x2) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0xb7, 0x1) bind$unix(r1, &(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000100), &(0x7f00000001c0)=0x68) bind$pptp(r0, &(0x7f0000000180)={0x18, 0x2, {0x0, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x1e) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0xe0000002, @multicast2=0xe0000002}}, 0x1e) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000200)=""/208) 2018/04/24 18:54:53 executing program 3: socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f00000067c0)={0xffffffffffffffff}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000006800)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000006900)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000006940)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000006a40)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000006a80)={{{@in=@dev={0xac, 0x14, 0x14, 0x1e}, @in=@dev={0xac, 0x14, 0x14, 0xc}, 0x4e22, 0x0, 0x4e22, 0x0, 0xa, 0x0, 0x20, 0x33, r1, r2}, {0x3, 0x2, 0x0, 0x6, 0x6f, 0xfff, 0x3, 0x1}, {0xfffffffffffffff9, 0x6, 0xc3, 0x6b}, 0x3, 0x0, 0x2, 0x0, 0x1, 0x3}, {{@in=@local={0xac, 0x14, 0x14, 0xaa}, 0x4d2, 0x7f}, 0x2, @in6=@mcast1={0xff, 0x1, [], 0x1}, 0x3505, 0x2, 0x0, 0x80, 0x942b, 0x3, 0x10001}}, 0xe8) r3 = socket$netlink(0xa, 0x6, 0x0) listen(r3, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r3, 0x10d, 0xf, &(0x7f0000001ffc)=0x21dab656, 0x4) r4 = socket$inet6_icmp(0xa, 0x2, 0x3a) setsockopt$inet6_IPV6_ADDRFORM(r4, 0x29, 0x1, &(0x7f0000000100)=0x2, 0x4) socket$packet(0x11, 0x2, 0x300) getsockopt$netlink(r3, 0x10e, 0xf, &(0x7f0000000000)=""/189, &(0x7f00000000c0)=0xbd) 2018/04/24 18:54:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) getgid() syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa00040000000086dd60d8652b00140600fe0100000000000000000000bc2e3793d75c668fa1c2352e8d34154345cb99ba89600033a33f000000aafe8000000000000000000000000000aa00004e202ebc34ad0f93b5e325e2b792891a58cb205849c92743993364703d1a242c58dd3cbc78899fba1db764a01f93e13922ecfcee85b47ebb2a0d2ffff5e4fcdcba9cdb0dca533a5d915066c5c2d1cb49b63cd884d2df2b0a3cb0cdfdcab2c17730eb6c23b31a4bd14763535d62142bc284d291cb44e643535107da0bcdb38786f7c3bff836f271b6349984ee6b513983ca075b6919ce11cdb2632ff96962cf2605945c81a847098b1b57b3a72dfeab29b4ce41e7c8c2c502905c0b083f01c44322774fb184fe0a2b9095504c02ec858eb8b9", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000000)={'HL\x00'}, &(0x7f0000000040)=0x1e) [ 89.245976] FAULT_INJECTION: forcing a failure. [ 89.245976] name failslab, interval 1, probability 0, space 0, times 0 [ 89.257345] CPU: 1 PID: 6966 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 89.257829] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 89.264207] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.264223] Call Trace: [ 89.264266] dump_stack+0x185/0x1d0 [ 89.264314] should_fail+0x87b/0xab0 2018/04/24 18:54:53 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000005540)=[{{&(0x7f0000000180)=@ipx, 0x80, &(0x7f0000001500)}}], 0x1, 0x0, &(0x7f0000005680)={0x77359400}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1088}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x10, 0x70bd2b, 0x25dfdbfe, {0x1}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x8000) writev(r0, &(0x7f00006f6000)=[{&(0x7f000075bfc6)="39000000120003196906ffff7f0000070b00000004000000d901000300000014190012000f0001000000000000200000000000000400010090", 0x39}], 0x1) r2 = syz_open_dev$midi(&(0x7f0000000140)='/dev/midi#\x00', 0x2e81, 0x72000) r3 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x80000000) inotify_rm_watch(r2, r3) [ 89.293954] should_failslab+0x279/0x2a0 [ 89.298130] kmem_cache_alloc+0x136/0xb90 [ 89.302373] ? key_alloc+0x9b2/0x1f00 [ 89.306335] ? key_user_lookup+0x327/0x650 [ 89.310644] key_alloc+0x9b2/0x1f00 [ 89.314343] request_key_and_link+0xd27/0x2000 [ 89.318981] ? restrict_link_reject+0x30/0x30 [ 89.323516] ? keyring_search_aux+0x450/0x450 [ 89.328092] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 89.333547] SYSC_request_key+0x5c0/0x790 [ 89.337800] SyS_request_key+0x65/0x90 [ 89.341789] do_syscall_64+0x309/0x430 [ 89.345735] ? SYSC_add_key+0x960/0x960 [ 89.349771] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 89.354994] RIP: 0033:0x455389 [ 89.358208] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 89.368919] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 89.376226] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 89.383617] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 89.390926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 89.398231] R13: 00000000000004a7 R14: 00000000006fa048 R15: 0000000000000002 2018/04/24 18:54:53 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e21, 0x7fff, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x3f}, {0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x1000}, 0x8000, [0x8, 0x1, 0x6, 0x3f, 0x7, 0x3, 0x40, 0x9]}, 0x5c) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) close(r0) 2018/04/24 18:54:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f000002c000)='./file0\x00', &(0x7f000002cffa)='ramfs\x00', 0x0, &(0x7f000000a000)) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000d08ff7)='/dev/sg#\x00', 0x0, 0x81) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000652ff8)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r0, r3, 0x8, 0x0) r4 = dup2(r2, r3) ioctl$int_in(r4, 0x5452, &(0x7f0000e35ff8)=0x45) r5 = getpgrp(0x0) fcntl$setown(r2, 0x8, r5) ioctl$DRM_IOCTL_RM_MAP(r3, 0x4028641b, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, 0x40, 0x5, 0x20, &(0x7f00001a8000/0x1000)=nil, 0x80}) fcntl$setsig(r3, 0xa, 0x12) tkill(r5, 0x100000000000016) close(r1) creat(&(0x7f000001bff4)='./file0/bus\x00', 0x0) truncate(&(0x7f0000006000)='./file0/bus\x00', 0x2794) r6 = open$dir(&(0x7f0000000140)='./file0/bus\x00', 0x0, 0x0) mmap(&(0x7f000000a000/0x4000)=nil, 0x4000, 0x1, 0x30, r6, 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) 2018/04/24 18:54:53 executing program 3: r0 = memfd_create(&(0x7f000000e000)='\x00 ', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x4080) r2 = dup2(r1, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{}, 'port1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000100)={'bcsf0\x00', @ifru_ivalue}) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000140)=0x4) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000280)={{0x7968, 0x5}, 'port1\x00', 0x20, 0x20000, 0x5, 0x0, 0xaf3, 0x100000000, 0x4, 0x0, 0x4, 0x10000}) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'yam0\x00', {0x2, 0x4e22}}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f000002b000)={0x0, 0x0, 0x0, "9ede7a8c5ae95ec8672c93340f643a664f13eeab65c0322901dc6bd36cde2c51f01b7f0b014f9f91eeb7c37c7240f476c8d753d000aa8faf8fb574dbcfa6dc4d"}) write$sndseq(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time={0x77359400}, {}, {}, @connect}], 0x2cf) dup2(r0, r2) 2018/04/24 18:54:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) getgid() syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, &(0x7f00000002c0)) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:53 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, @multicast2}, &(0x7f00000001c0)=0x10) 2018/04/24 18:54:53 executing program 6 (fault-call:0 fault-nth:3): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) [ 89.666745] FAULT_INJECTION: forcing a failure. [ 89.666745] name failslab, interval 1, probability 0, space 0, times 0 [ 89.678198] CPU: 1 PID: 6996 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 89.685072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 89.694457] Call Trace: [ 89.697105] dump_stack+0x185/0x1d0 [ 89.700800] should_fail+0x87b/0xab0 [ 89.704584] should_failslab+0x279/0x2a0 [ 89.708751] __kmalloc_track_caller+0x208/0xcb0 2018/04/24 18:54:53 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e21, 0x7fff, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x3f}, {0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x1000}, 0x8000, [0x8, 0x1, 0x6, 0x3f, 0x7, 0x3, 0x40, 0x9]}, 0x5c) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) close(r0) [ 89.713506] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 89.718917] ? key_alloc+0xa7b/0x1f00 [ 89.722816] kmemdup+0x95/0x140 [ 89.726207] key_alloc+0xa7b/0x1f00 [ 89.729900] request_key_and_link+0xd27/0x2000 [ 89.734535] ? restrict_link_reject+0x30/0x30 [ 89.739069] ? keyring_search_aux+0x450/0x450 [ 89.743677] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 89.749136] SYSC_request_key+0x5c0/0x790 [ 89.753394] SyS_request_key+0x65/0x90 [ 89.757371] do_syscall_64+0x309/0x430 [ 89.761311] ? SYSC_add_key+0x960/0x960 2018/04/24 18:54:53 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3ff, 0x30, 0x7bb6d996, 0x2}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x0, 0x2, 0x0, 0x14d0, 0x100000001}, 0x14) mq_getsetattr(r1, &(0x7f00000001c0)={0x7, 0xff, 0x4dc7e986, 0x72d, 0x1, 0x2, 0x3f, 0x100000000}, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x80000000, 0x5, 0x7, 0x8, 0x7ff, 0xb3c3}) getsockopt$inet6_int(r1, 0x29, 0x7b, &(0x7f0000000140), &(0x7f0000000180)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) socket$can_raw(0x1d, 0x3, 0x1) [ 89.765331] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 89.770548] RIP: 0033:0x455389 [ 89.773762] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 89.781512] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 89.788814] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 89.796115] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 89.803435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 2018/04/24 18:54:53 executing program 3: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) socketpair(0x0, 0x6, 0x400, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x8) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000280), &(0x7f00000002c0)=0x8) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) [ 89.810751] R13: 00000000000004a7 R14: 00000000006fa048 R15: 0000000000000003 [ 89.822359] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 2018/04/24 18:54:53 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e21, 0x7fff, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x3f}, {0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x1000}, 0x8000, [0x8, 0x1, 0x6, 0x3f, 0x7, 0x3, 0x40, 0x9]}, 0x5c) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) close(r0) 2018/04/24 18:54:53 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:53 executing program 6 (fault-call:0 fault-nth:4): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) 2018/04/24 18:54:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) getgid() syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:54 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e21, 0x7fff, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x3f}, {0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x1000}, 0x8000, [0x8, 0x1, 0x6, 0x3f, 0x7, 0x3, 0x40, 0x9]}, 0x5c) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) close(r0) 2018/04/24 18:54:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3ff, 0x30, 0x7bb6d996, 0x2}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x0, 0x2, 0x0, 0x14d0, 0x100000001}, 0x14) mq_getsetattr(r1, &(0x7f00000001c0)={0x7, 0xff, 0x4dc7e986, 0x72d, 0x1, 0x2, 0x3f, 0x100000000}, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x80000000, 0x5, 0x7, 0x8, 0x7ff, 0xb3c3}) getsockopt$inet6_int(r1, 0x29, 0x7b, &(0x7f0000000140), &(0x7f0000000180)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) socket$can_raw(0x1d, 0x3, 0x1) [ 90.135886] FAULT_INJECTION: forcing a failure. [ 90.135886] name failslab, interval 1, probability 0, space 0, times 0 [ 90.147434] CPU: 0 PID: 7018 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 90.154306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.163692] Call Trace: [ 90.166326] dump_stack+0x185/0x1d0 [ 90.170008] should_fail+0x87b/0xab0 [ 90.173835] should_failslab+0x279/0x2a0 [ 90.178003] __kmalloc+0xc2/0x350 [ 90.181528] ? assoc_array_insert+0xee/0x4dc0 [ 90.186068] ? __key_link_begin+0x268/0x530 [ 90.190434] assoc_array_insert+0xee/0x4dc0 [ 90.194832] ? kmsan_set_origin_inline+0x6b/0x120 [ 90.199759] ? __msan_poison_alloca+0x15c/0x1d0 [ 90.204480] ? _cond_resched+0x3c/0xd0 [ 90.208418] ? rcu_all_qs+0x32/0x1f0 [ 90.212182] ? _cond_resched+0x3c/0xd0 [ 90.216130] __key_link_begin+0x268/0x530 [ 90.220343] request_key_and_link+0xe8e/0x2000 [ 90.224984] ? restrict_link_reject+0x30/0x30 [ 90.229521] ? keyring_search_aux+0x450/0x450 [ 90.234105] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 90.239559] SYSC_request_key+0x5c0/0x790 [ 90.243825] SyS_request_key+0x65/0x90 [ 90.247811] do_syscall_64+0x309/0x430 [ 90.251931] ? SYSC_add_key+0x960/0x960 [ 90.255953] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 90.261167] RIP: 0033:0x455389 [ 90.264376] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 90.272129] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 90.279586] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 90.286890] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 90.294195] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 90.301492] R13: 00000000000004a7 R14: 00000000006fa048 R15: 0000000000000004 2018/04/24 18:54:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:54 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:54 executing program 6 (fault-call:0 fault-nth:5): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) 2018/04/24 18:54:54 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3ff, 0x30, 0x7bb6d996, 0x2}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x0, 0x2, 0x0, 0x14d0, 0x100000001}, 0x14) mq_getsetattr(r1, &(0x7f00000001c0)={0x7, 0xff, 0x4dc7e986, 0x72d, 0x1, 0x2, 0x3f, 0x100000000}, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x80000000, 0x5, 0x7, 0x8, 0x7ff, 0xb3c3}) getsockopt$inet6_int(r1, 0x29, 0x7b, &(0x7f0000000140), &(0x7f0000000180)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:54:54 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./control\x00', 0x0) syz_fuse_mount(&(0x7f0000000080)='./control\x00', 0x0, 0x0, 0x0, 0x0, 0x282000) 2018/04/24 18:54:54 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x200002000101) mmap(&(0x7f0000000000/0xd25000)=nil, 0xd25000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x5, 0x2) r2 = syz_open_dev$mouse(&(0x7f0000834fee)='/dev/input/mouse#\x00', 0x0, 0x0) setsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, &(0x7f0000000000)={0x10000, 0x0, 0x80, 0x9a}, 0xffffffffffffff4d) dup2(r0, r2) 2018/04/24 18:54:54 executing program 0: r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e21, 0x7fff, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x3f}, {0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x1000}, 0x8000, [0x8, 0x1, 0x6, 0x3f, 0x7, 0x3, 0x40, 0x9]}, 0x5c) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x1}, 0x10) 2018/04/24 18:54:54 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:54 executing program 3: r0 = fanotify_init(0x4, 0x8000) preadv(r0, &(0x7f0000000280)=[{&(0x7f00000000c0)=""/215, 0xd7}, {&(0x7f0000000000)=""/103, 0x67}, {&(0x7f00000001c0)=""/172, 0xac}], 0x3, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000002c0)={0xffffffffffffffff}) getsockname$ipx(r1, &(0x7f0000000300), &(0x7f0000000340)=0x10) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='ns/pid\x00') preadv(r2, &(0x7f0000000240), 0x298, 0x0) [ 90.975675] FAULT_INJECTION: forcing a failure. [ 90.975675] name failslab, interval 1, probability 0, space 0, times 0 [ 90.987124] CPU: 0 PID: 7049 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 90.993996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.003385] Call Trace: [ 91.006054] dump_stack+0x185/0x1d0 [ 91.009750] should_fail+0x87b/0xab0 [ 91.013563] should_failslab+0x279/0x2a0 [ 91.017725] __kmalloc+0xc2/0x350 [ 91.021265] ? request_key_and_link+0x10e4/0x2000 2018/04/24 18:54:55 executing program 0: socket(0x1e, 0x4, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e21, 0x7fff, @ipv4={[], [0xff, 0xff], @multicast2=0xe0000002}, 0x3f}, {0xa, 0x4e20, 0x9, @remote={0xfe, 0x80, [], 0xbb}, 0x1000}, 0x8000, [0x8, 0x1, 0x6, 0x3f, 0x7, 0x3, 0x40, 0x9]}, 0x5c) [ 91.026155] request_key_and_link+0x10e4/0x2000 [ 91.030868] ? restrict_link_reject+0x30/0x30 [ 91.035398] ? keyring_search_aux+0x450/0x450 [ 91.039944] SYSC_request_key+0x5c0/0x790 [ 91.044189] SyS_request_key+0x65/0x90 [ 91.048167] do_syscall_64+0x309/0x430 [ 91.052111] ? SYSC_add_key+0x960/0x960 [ 91.056135] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 91.061349] RIP: 0033:0x455389 [ 91.064563] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 2018/04/24 18:54:55 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:55 executing program 0: socket(0x1e, 0x4, 0x0) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) [ 91.072316] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 91.079615] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 91.086918] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 91.094212] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 91.101504] R13: 00000000000004a7 R14: 00000000006fa048 R15: 0000000000000005 2018/04/24 18:54:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000939f01)='net/anycast6\x00') r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000019c0)={@dev={0xfe, 0x80}}, 0x14) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='loginuid\x00') sendfile(r2, r2, &(0x7f0000000000), 0x4) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f00000001c0), 0x14) preadv(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/202, 0xca}], 0x1, 0x3) 2018/04/24 18:54:55 executing program 7: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:55 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f00000001c0)='securitywlan1\\\x00', 0xfffffffffffffff9) keyctl$assume_authority(0x10, r1) write$rdma_cm(r0, &(0x7f0000000100)=@bind={0x14, 0x0, 0xfa00, {0xffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}}}}, 0xc8e9cb0b) 2018/04/24 18:54:55 executing program 2: socket$inet6(0xa, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:55 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000005c0)={&(0x7f00000004c0)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000000500)=@ipv4_delroute={0x1c, 0x19, 0x1, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, 0xfc}}, 0x1c}, 0x1}, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfff, 0x800) r2 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x3, 0x802) renameat2(r1, &(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00', 0x7) [ 91.377402] ucma_write: process 294 (syz-executor3) changed security contexts after opening file descriptor, this is not allowed. 2018/04/24 18:54:55 executing program 6 (fault-call:0 fault-nth:6): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) 2018/04/24 18:54:55 executing program 0: socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) 2018/04/24 18:54:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3ff, 0x30, 0x7bb6d996, 0x2}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x0, 0x2, 0x0, 0x14d0, 0x100000001}, 0x14) mq_getsetattr(r1, &(0x7f00000001c0)={0x7, 0xff, 0x4dc7e986, 0x72d, 0x1, 0x2, 0x3f, 0x100000000}, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x80000000, 0x5, 0x7, 0x8, 0x7ff, 0xb3c3}) getsockopt$inet6_int(r1, 0x29, 0x7b, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:54:55 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3ff, 0x30, 0x7bb6d996, 0x2}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x0, 0x2, 0x0, 0x14d0, 0x100000001}, 0x14) mq_getsetattr(r1, &(0x7f00000001c0)={0x7, 0xff, 0x4dc7e986, 0x72d, 0x1, 0x2, 0x3f, 0x100000000}, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x80000000, 0x5, 0x7, 0x8, 0x7ff, 0xb3c3}) getsockopt$inet6_int(r1, 0x29, 0x7b, &(0x7f0000000140), &(0x7f0000000180)=0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:54:55 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:55 executing program 7: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:55 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff800000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) poll(&(0x7f00000000c0)=[{}, {r0}], 0x2, 0xfffffffffffffffe) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x800) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x2, 0x9, 0x4, 0x5, 0x1f}, &(0x7f0000000100)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x4, 0x0, 0x204, 0x7, 0xff, 0x8, 0xffffffffffffffff, 0x1f, r2}, &(0x7f0000000180)=0x20) 2018/04/24 18:54:55 executing program 3: r0 = shmget$private(0x0, 0x600000, 0x0, &(0x7f0000a00000/0x600000)=nil) shmat(r0, &(0x7f0000c66000/0x4000)=nil, 0x4000) r1 = shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4000) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000000)=""/53) shmdt(r1) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x4000, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000080)) getsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f00000000c0)=0x4, &(0x7f0000000100)=0x2) 2018/04/24 18:54:55 executing program 7: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) [ 91.692728] FAULT_INJECTION: forcing a failure. [ 91.692728] name failslab, interval 1, probability 0, space 0, times 0 [ 91.704198] CPU: 1 PID: 7120 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 91.711070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.720448] Call Trace: [ 91.723085] dump_stack+0x185/0x1d0 [ 91.726770] should_fail+0x87b/0xab0 [ 91.730545] should_failslab+0x279/0x2a0 [ 91.734661] __kmalloc+0xc2/0x350 [ 91.738176] ? request_key_auth_new+0x96/0xb80 [ 91.742797] ? request_key_auth_new+0xf9/0xb80 [ 91.747460] request_key_auth_new+0xf9/0xb80 [ 91.751991] ? request_key_and_link+0x10e4/0x2000 [ 91.756884] request_key_and_link+0x1195/0x2000 [ 91.761618] ? restrict_link_reject+0x30/0x30 [ 91.766161] ? keyring_search_aux+0x450/0x450 [ 91.770745] SYSC_request_key+0x5c0/0x790 [ 91.775000] SyS_request_key+0x65/0x90 [ 91.778970] do_syscall_64+0x309/0x430 [ 91.782914] ? SYSC_add_key+0x960/0x960 [ 91.786939] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 2018/04/24 18:54:55 executing program 7: r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:55 executing program 0: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) 2018/04/24 18:54:55 executing program 2: syz_emit_ethernet(0x3, &(0x7f0000000300)=ANY=[@ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:55 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3ff, 0x30, 0x7bb6d996, 0x2}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x0, 0x2, 0x0, 0x14d0, 0x100000001}, 0x14) mq_getsetattr(r1, &(0x7f00000001c0)={0x7, 0xff, 0x4dc7e986, 0x72d, 0x1, 0x2, 0x3f, 0x100000000}, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x80000000, 0x5, 0x7, 0x8, 0x7ff, 0xb3c3}) getsockopt$inet6_int(r1, 0x29, 0x7b, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) [ 91.792156] RIP: 0033:0x455389 [ 91.795361] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 91.803106] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 91.810410] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 91.817710] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 91.825013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 91.832316] R13: 00000000000004a7 R14: 00000000006fa048 R15: 0000000000000006 2018/04/24 18:54:55 executing program 3: lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r0, r1) r2 = socket(0x200000000010, 0x3, 0x0) write(r2, &(0x7f0000000180)="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", 0xfc5d) 2018/04/24 18:54:55 executing program 5: unshare(0x40600) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x2, 0x400) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r1, 0x28, 0x0, &(0x7f0000000200)=0x3, 0x8) modify_ldt$read_default(0x2, &(0x7f0000000100)=""/239, 0xef) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000003c0)={0x6, 0x4}) geteuid() ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r3, 0x800443d3, &(0x7f0000000380)={{0x0, 0x10000, 0x8, 0x4, 0x7f, 0x1f}, 0x80000000, 0x4, 0x9}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x0, 0x0) r4 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0xfffffffffffffff9, 0x1ffffc) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000340)) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000440)=0x2, 0x4) getpgid(r0) r5 = syz_open_procfs(r0, &(0x7f00000000c0)='children\x00') fstat(r5, &(0x7f00000008c0)) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r4, &(0x7f0000000000)={0x10000000}) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r3, 0x40045542, &(0x7f0000000400)=0x9a8) 2018/04/24 18:54:56 executing program 2: syz_emit_ethernet(0x4, &(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:56 executing program 6 (fault-call:0 fault-nth:7): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) 2018/04/24 18:54:56 executing program 0: r0 = socket(0x0, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) 2018/04/24 18:54:56 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000f80)='/dev/sg#\x00', 0x3, 0x800) bind$nfc_llcp(r2, &(0x7f0000000fc0)={0x27, 0x1, 0x2, 0x0, 0x2bcd, 0x7, "eee8fb38b0b906cd302fc53813c78630b6e22e57a0a06712559a619251f43dd005ea264d91f29ec082e7bbfbab9a210113c08e6a41ec7301fe364cc960f091", 0x2}, 0x60) bind$unix(r1, &(0x7f0000003000)=@file={0x1, "e91f7189591e9233614b00"}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000f00)=@file={0x1, "e91f7189591e9233614b00"}, 0x6e) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000001040)=0x7, 0x4) sendto(r0, &(0x7f0000000000)="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", 0xec1, 0xffffffffffffffff, 0x0, 0xff93) 2018/04/24 18:54:56 executing program 7: r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000252000)='map_files\x00') openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='dctcp-reno\x00', 0xb) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) accept4$ax25(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1a5, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x2000, 0xfff, 0x0, 0x0, 0x0, 0x0, "9aab3d82b1776054d38127306e44ac8153b8b24804589ebd16cdd7a0c81b2f22aa4f80697755839f61c801fe88be1935b9942e1e0ff81774c2cb833d89837970", "66e4c3f56840f22734ab2845d16cbb4c46b8d2f616486137839829e6f173d68b65f7abd65f6c290317d948466e0dd150c6bdc096aaea8d463a4afc2db7cb4f24", "0501e7607b140f8d43310b68d4acb8c229b70c2fb9994c8aed7ee7c71e52c829", [0x0, 0x7]}) getdents(r0, &(0x7f0000000040), 0x7385baf8532ca971) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), 0x4) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0, 0x0, 0x3, 0x2}) r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) bind$inet(r1, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000740)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)=@delpolicy={0xb4, 0x14, 0x0, 0x70bd27, 0x25dfdbfd, {{@in, @in6=@loopback={0x0, 0x1}, 0x4e21, 0x101, 0x0, 0x1dc3, 0xa, 0x80, 0xa0, 0x6}, 0x6e6bb1, 0x2}, [@algo_comp={0x64, 0x3, {{'deflate\x00'}, 0xe0, "cf026b94c0238bc7c5785f5e59e68796168579ed5dc5fa28de650e41"}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4050}, 0x810) connect$inet(r1, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r2, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f00007cc000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) time(&(0x7f0000000780)) pselect6(0x40, &(0x7f0000000240)={0xffffffff, 0xff, 0xede1, 0x1, 0x8, 0x5, 0x23580000000, 0x3}, &(0x7f0000000280)={0x7, 0x2, 0x5, 0x1000, 0x80000001, 0xeeff, 0x3, 0x8}, &(0x7f00000002c0)={0x7, 0x7, 0x4, 0x1, 0x4, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f0000000440)={0x77359400}, &(0x7f00000004c0)={&(0x7f0000000480)={0x7bb20c2b}, 0x8}) ioctl$sock_netrom_TIOCINQ(r2, 0x541b, &(0x7f0000000040)) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$key(r2, &(0x7f0000351000)={0x0, 0x0, &(0x7f0000886000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="f9e9d3a0830a23beb26f93c716bd8c55049d1572036a765186937967b2075decd075123f9eb8d4a8e414217d438156d0b1597aeea3"], 0x35}, 0x1}, 0x40001) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x38, "28269bcb13202a2b2fee172fd0ce16245080087ac6e5dba05788e4ff6302529dba83dcc8cd21ff1656a0dbb21e312eb09bc8cc51043fb825"}, &(0x7f00000000c0)=0x40) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={r3, 0x6}, &(0x7f0000000180)=0x8) shutdown(r2, 0x1) 2018/04/24 18:54:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3ff, 0x30, 0x7bb6d996, 0x2}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x0, 0x2, 0x0, 0x14d0, 0x100000001}, 0x14) mq_getsetattr(r1, &(0x7f00000001c0)={0x7, 0xff, 0x4dc7e986, 0x72d, 0x1, 0x2, 0x3f, 0x100000000}, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x80000000, 0x5, 0x7, 0x8, 0x7ff, 0xb3c3}) getsockopt$inet6_int(r1, 0x29, 0x7b, &(0x7f0000000140), &(0x7f0000000180)=0x4) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:54:56 executing program 5: pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) vmsplice(r0, &(0x7f0000001840)=[{&(0x7f0000000000)='h', 0xfffffffffffffdb5}], 0x1, 0x0) 2018/04/24 18:54:56 executing program 2: syz_emit_ethernet(0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa00040000000086dd60d8652b00140600fe0100000000000000000000bc2e3793d75c668fa1c2352e8d34154345cb99ba89600033a33f000000aafe8000000000000000000000000000aa00004e202ebc34ad0f93b5e325e2b792891a58cb205849c92743993364703d1a242c58dd3cbc78899fba1db764a01f93e13922ecfcee85b47ebb2a0d2ffff5e4fcdc", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) [ 92.318181] FAULT_INJECTION: forcing a failure. [ 92.318181] name failslab, interval 1, probability 0, space 0, times 0 [ 92.329613] CPU: 0 PID: 7175 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 92.336484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 92.345859] Call Trace: [ 92.348479] dump_stack+0x185/0x1d0 [ 92.352132] should_fail+0x87b/0xab0 [ 92.355947] should_failslab+0x279/0x2a0 [ 92.360038] kmem_cache_alloc+0x136/0xb90 [ 92.364203] ? key_alloc+0x9b2/0x1f00 [ 92.368724] ? key_user_lookup+0x327/0x650 [ 92.372992] key_alloc+0x9b2/0x1f00 [ 92.376674] request_key_auth_new+0x804/0xb80 [ 92.381188] request_key_and_link+0x1195/0x2000 [ 92.385873] ? restrict_link_reject+0x30/0x30 [ 92.390371] ? keyring_search_aux+0x450/0x450 [ 92.394909] SYSC_request_key+0x5c0/0x790 [ 92.399110] SyS_request_key+0x65/0x90 [ 92.403049] do_syscall_64+0x309/0x430 [ 92.406952] ? SYSC_add_key+0x960/0x960 [ 92.410937] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 2018/04/24 18:54:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3ff, 0x30, 0x7bb6d996, 0x2}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x0, 0x2, 0x0, 0x14d0, 0x100000001}, 0x14) mq_getsetattr(r1, &(0x7f00000001c0)={0x7, 0xff, 0x4dc7e986, 0x72d, 0x1, 0x2, 0x3f, 0x100000000}, &(0x7f0000000200)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f00000000c0)={0x80000000, 0x5, 0x7, 0x8, 0x7ff, 0xb3c3}) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) [ 92.416127] RIP: 0033:0x455389 [ 92.419326] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 92.427045] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 92.434313] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 92.441580] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 92.448848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 92.456115] R13: 00000000000004a7 R14: 00000000006fa048 R15: 0000000000000007 2018/04/24 18:54:56 executing program 2: syz_emit_ethernet(0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa00040000000086dd60d8652b00140600fe0100000000000000000000bc2e3793d75c668fa1c2352e8d34154345cb99ba89600033a33f000000aafe8000000000000000000000000000aa00004e202ebc34ad0f93b5e325e2b792891a58cb205849c92743993364703d1a242c58dd3cbc78899fba1db764a01f93e13922ecfcee85b47ebb2a0d2ffff5e4fcdcba9cdb0dca533a5d915066c5c2d1cb49b63cd884d2df2b0a3cb0cdfdcab2c17730eb6c23b31a4bd14763535d62142bc284d291cb44e643535107da0bcdb38786f7c3bff836f271b634", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:56 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f00007a1ff5)='clear_refs\x00') writev(r1, &(0x7f0000001440)=[{&(0x7f0000000000)='f', 0x1}], 0x1) 2018/04/24 18:54:56 executing program 0: r0 = socket(0x1e, 0x0, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) 2018/04/24 18:54:56 executing program 4: r0 = socket$inet(0x10, 0x3, 0x0) r1 = dup2(r0, r0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}]}) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000006000)="240000005e00030207fffd946fa283bc0aeee6d8f9ffffffffffffffb51ba3a2d188737e", 0x24}], 0x1}, 0x0) 2018/04/24 18:54:56 executing program 7: r0 = socket$inet6(0xa, 0x0, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3ff, 0x30, 0x7bb6d996, 0x2}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x0, 0x2, 0x0, 0x14d0, 0x100000001}, 0x14) mq_getsetattr(r1, &(0x7f00000001c0)={0x7, 0xff, 0x4dc7e986, 0x72d, 0x1, 0x2, 0x3f, 0x100000000}, &(0x7f0000000200)) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:54:56 executing program 2: syz_emit_ethernet(0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:56 executing program 6 (fault-call:0 fault-nth:8): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) 2018/04/24 18:54:56 executing program 0: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) 2018/04/24 18:54:56 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) clock_settime(0x7, &(0x7f0000000000)={0x77359400}) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000000240), 0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value, 0x8) 2018/04/24 18:54:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xfffffffffffffffc}, 0xc, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001d000100000000000000000002000000"], 0x14}, 0x1}, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x400000, 0x0) 2018/04/24 18:54:56 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:56 executing program 2: syz_emit_ethernet(0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa00040000000086dd60d8652b00140600fe0100000000000000000000bc2e3793d75c668fa1c2352e8d34154345cb99ba89600033a33f000000aafe8000000000000000000000000000aa00004e202ebc34ad0f93b5e325e2b792891a58cb205849c92743993364703d1a242c58dd3cbc78899fba1db764a01f93e13922ecfcee85b47ebb2a0d2ffff5e4fcdcba9cdb0dca533a5d915066c5c2d1cb49b63cd884d2df2b0a3cb0cdfdcab2c17730eb6c23b31a4bd14763535d62142bc284d291cb44e643535107da0bcdb38786f7c3bff836f271b6349984ee6b513983ca075b6919ce11cdb2632ff96962cf2605945c81a847098b1b57b3a72dfeab29b4ce41e7c8c2c502905c0b083f01c443", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:56 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3ff, 0x30, 0x7bb6d996, 0x2}, &(0x7f0000000280)=0x18) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f00000002c0)={r2, 0x0, 0x2, 0x0, 0x14d0, 0x100000001}, 0x14) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:54:56 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000252000)='map_files\x00') openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='dctcp-reno\x00', 0xb) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) accept4$ax25(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1a5, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x2000, 0xfff, 0x0, 0x0, 0x0, 0x0, "9aab3d82b1776054d38127306e44ac8153b8b24804589ebd16cdd7a0c81b2f22aa4f80697755839f61c801fe88be1935b9942e1e0ff81774c2cb833d89837970", "66e4c3f56840f22734ab2845d16cbb4c46b8d2f616486137839829e6f173d68b65f7abd65f6c290317d948466e0dd150c6bdc096aaea8d463a4afc2db7cb4f24", "0501e7607b140f8d43310b68d4acb8c229b70c2fb9994c8aed7ee7c71e52c829", [0x0, 0x7]}) getdents(r0, &(0x7f0000000040), 0x7385baf8532ca971) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), 0x4) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0, 0x0, 0x3, 0x2}) r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) bind$inet(r1, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000740)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)=@delpolicy={0xb4, 0x14, 0x0, 0x70bd27, 0x25dfdbfd, {{@in, @in6=@loopback={0x0, 0x1}, 0x4e21, 0x101, 0x0, 0x1dc3, 0xa, 0x80, 0xa0, 0x6}, 0x6e6bb1, 0x2}, [@algo_comp={0x64, 0x3, {{'deflate\x00'}, 0xe0, "cf026b94c0238bc7c5785f5e59e68796168579ed5dc5fa28de650e41"}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4050}, 0x810) connect$inet(r1, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r2, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f00007cc000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) time(&(0x7f0000000780)) pselect6(0x40, &(0x7f0000000240)={0xffffffff, 0xff, 0xede1, 0x1, 0x8, 0x5, 0x23580000000, 0x3}, &(0x7f0000000280)={0x7, 0x2, 0x5, 0x1000, 0x80000001, 0xeeff, 0x3, 0x8}, &(0x7f00000002c0)={0x7, 0x7, 0x4, 0x1, 0x4, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f0000000440)={0x77359400}, &(0x7f00000004c0)={&(0x7f0000000480)={0x7bb20c2b}, 0x8}) ioctl$sock_netrom_TIOCINQ(r2, 0x541b, &(0x7f0000000040)) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$key(r2, &(0x7f0000351000)={0x0, 0x0, &(0x7f0000886000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="f9e9d3a0830a23beb26f93c716bd8c55049d1572036a765186937967b2075decd075123f9eb8d4a8e414217d438156d0b1597aeea3"], 0x35}, 0x1}, 0x40001) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x38, "28269bcb13202a2b2fee172fd0ce16245080087ac6e5dba05788e4ff6302529dba83dcc8cd21ff1656a0dbb21e312eb09bc8cc51043fb825"}, &(0x7f00000000c0)=0x40) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={r3, 0x6}, &(0x7f0000000180)=0x8) shutdown(r2, 0x1) [ 93.037606] FAULT_INJECTION: forcing a failure. [ 93.037606] name failslab, interval 1, probability 0, space 0, times 0 [ 93.049084] CPU: 1 PID: 7230 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 93.055983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.065369] Call Trace: [ 93.068002] dump_stack+0x185/0x1d0 [ 93.071680] should_fail+0x87b/0xab0 [ 93.075447] should_failslab+0x279/0x2a0 [ 93.079606] __kmalloc_track_caller+0x208/0xcb0 [ 93.084310] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 93.089715] ? key_alloc+0xa7b/0x1f00 [ 93.093587] kmemdup+0x95/0x140 [ 93.096952] key_alloc+0xa7b/0x1f00 [ 93.100658] request_key_auth_new+0x804/0xb80 [ 93.105210] request_key_and_link+0x1195/0x2000 [ 93.109927] ? restrict_link_reject+0x30/0x30 [ 93.114456] ? keyring_search_aux+0x450/0x450 [ 93.119006] SYSC_request_key+0x5c0/0x790 [ 93.123241] SyS_request_key+0x65/0x90 [ 93.127187] do_syscall_64+0x309/0x430 [ 93.131099] ? SYSC_add_key+0x960/0x960 [ 93.135094] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 93.140303] RIP: 0033:0x455389 [ 93.143491] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 93.151213] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 93.158513] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 93.165784] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 93.173053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 93.180349] R13: 00000000000004a7 R14: 00000000006fa048 R15: 0000000000000008 2018/04/24 18:54:57 executing program 2: syz_emit_ethernet(0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:57 executing program 0: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x0, 0x0, 0x3}, 0x10) 2018/04/24 18:54:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000252000)='map_files\x00') openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='dctcp-reno\x00', 0xb) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000540), &(0x7f0000000580)=0x4) accept4$ax25(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1a5, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x2000, 0xfff, 0x0, 0x0, 0x0, 0x0, "9aab3d82b1776054d38127306e44ac8153b8b24804589ebd16cdd7a0c81b2f22aa4f80697755839f61c801fe88be1935b9942e1e0ff81774c2cb833d89837970", "66e4c3f56840f22734ab2845d16cbb4c46b8d2f616486137839829e6f173d68b65f7abd65f6c290317d948466e0dd150c6bdc096aaea8d463a4afc2db7cb4f24", "0501e7607b140f8d43310b68d4acb8c229b70c2fb9994c8aed7ee7c71e52c829", [0x0, 0x7]}) getdents(r0, &(0x7f0000000040), 0x7385baf8532ca971) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), 0x4) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=[0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0], 0x0, 0x0, 0x3, 0x2}) r1 = socket$inet(0x2, 0x1, 0x0) r2 = dup(r1) bind$inet(r1, &(0x7f000012e000)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000e9bff0)={0x1, &(0x7f0000f07000)=[{0x6, 0x0, 0x0, 0x101}]}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f0000000740)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000100}, 0xc, &(0x7f0000000700)={&(0x7f0000000640)=@delpolicy={0xb4, 0x14, 0x0, 0x70bd27, 0x25dfdbfd, {{@in, @in6=@loopback={0x0, 0x1}, 0x4e21, 0x101, 0x0, 0x1dc3, 0xa, 0x80, 0xa0, 0x6}, 0x6e6bb1, 0x2}, [@algo_comp={0x64, 0x3, {{'deflate\x00'}, 0xe0, "cf026b94c0238bc7c5785f5e59e68796168579ed5dc5fa28de650e41"}}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4050}, 0x810) connect$inet(r1, &(0x7f0000987000)={0x2, 0x4e23}, 0x10) sendto$inet(r2, &(0x7f00004eef09)="96427feebcc603c266d2a2c2da2644124066d6c52746a66fd07a4a9370b924b494651c3febca0be535e0f30bbafe65b8b859d66972208f558b002bbc2366429da28cdb97727474f32fcce772ce439a1b5785bb74b8680705191a3d28e775b402a04cdf7881cf1c80eb042835db0e8c24fd0e3c0f396da612f44d9999de32f883521dfa4593a5772e19b5c0c27ace555870d7fe3a1819c614a8d9447cfa592c236d96bf255bf3966b0c1c34711ce489df2032a31902ae0742b79d7334ef248790fa0e3787e4b945215cddc03c4f384e6815bab43d34b8c04eb06ff00f10743a0e25f6", 0xe2, 0x4001, &(0x7f0000848ff0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff, 0xbb}}, 0x10) sendmsg$key(0xffffffffffffffff, &(0x7f0000e96fc8)={0x0, 0x0, &(0x7f00009df000)={&(0x7f00007cc000)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x10}, 0x1}, 0x0) time(&(0x7f0000000780)) pselect6(0x40, &(0x7f0000000240)={0xffffffff, 0xff, 0xede1, 0x1, 0x8, 0x5, 0x23580000000, 0x3}, &(0x7f0000000280)={0x7, 0x2, 0x5, 0x1000, 0x80000001, 0xeeff, 0x3, 0x8}, &(0x7f00000002c0)={0x7, 0x7, 0x4, 0x1, 0x4, 0x0, 0x0, 0xffffffffffffffff}, &(0x7f0000000440)={0x77359400}, &(0x7f00000004c0)={&(0x7f0000000480)={0x7bb20c2b}, 0x8}) ioctl$sock_netrom_TIOCINQ(r2, 0x541b, &(0x7f0000000040)) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000266ffc), 0x4) sendmsg$key(r2, &(0x7f0000351000)={0x0, 0x0, &(0x7f0000886000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="f9e9d3a0830a23beb26f93c716bd8c55049d1572036a765186937967b2075decd075123f9eb8d4a8e414217d438156d0b1597aeea3"], 0x35}, 0x1}, 0x40001) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x38, "28269bcb13202a2b2fee172fd0ce16245080087ac6e5dba05788e4ff6302529dba83dcc8cd21ff1656a0dbb21e312eb09bc8cc51043fb825"}, &(0x7f00000000c0)=0x40) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000140)={r3, 0x6}, &(0x7f0000000180)=0x8) shutdown(r2, 0x1) 2018/04/24 18:54:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={0x0, 0x3ff, 0x30, 0x7bb6d996, 0x2}, &(0x7f0000000280)=0x18) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:54:57 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:57 executing program 0: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc}, 0x10) 2018/04/24 18:54:57 executing program 2: syz_emit_ethernet(0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000fa8fe4)={0xa, 0x4e23}, 0x1c) connect$inet6(r0, &(0x7f0000966fe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) clock_settime(0x7, &(0x7f0000000000)={0x77359400}) r1 = dup(r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000140)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) write$eventfd(r1, &(0x7f0000000240), 0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000000c0)=@assoc_value, 0x8) 2018/04/24 18:54:57 executing program 6 (fault-call:0 fault-nth:9): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) 2018/04/24 18:54:57 executing program 3: mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x1000001, 0x44031, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000503000/0x4000)=nil, 0x4000) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000080)) r0 = getpgrp(0x0) r1 = syz_open_procfs(r0, &(0x7f0000000100)='net/dev_snmp6\x00') ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'bridge_slave_1\x00', &(0x7f0000000140)=@ethtool_rxnfc={0x3f, 0x1f, 0x40, {0x9, @ah_ip6_spec={@empty, @ipv4={[], [0xff, 0xff], @broadcast=0xffffffff}, 0x3ff, 0x9}, {"8e88", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0x6, 0x7e45, [0x73, 0x81]}, @tcp_ip6_spec={@mcast1={0xff, 0x1, [], 0x1}, @mcast2={0xff, 0x2, [], 0x1}, 0x4e21, 0x4e23, 0x5}, {"3084", @random="13fc561b3827", 0x8, 0x2, [0xed]}, 0x5, 0x100}, 0x2, [0x9, 0x6]}}) 2018/04/24 18:54:57 executing program 2: syz_emit_ethernet(0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa00040000000086dd60d8652b00140600fe0100000000000000000000bc2e3793d75c668fa1c2352e8d34154345cb99ba89600033a33f000000aafe8000000000000000000000000000aa00004e202ebc34ad0f93b5e325e2b792891a58cb205849c92743993364703d1a242c58dd3cbc78899fba1db764a01f93e13922ecfcee85b47ebb2a0d2ffff5e4fcdcba9cdb0dca533a5d915066c5c2d1cb49b63cd884d2df2b0a3cb0cdfdcab2c17730eb6c23b31a4bd14763535d62142bc284d291cb44e643535107da0bcdb38786f7c3bff836f271b6349984ee6b513983ca075b6919ce11cdb2632ff96962cf2605945c81a847098b1b57b3a72dfeab29b4ce41e7c8c2c502905c0b083f01c44322774fb184fe0a2b9095504c02ec858e", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:57 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:54:57 executing program 7: r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x4000000000084) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x200, 0x102) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x8ca, 0x4, 0x0, 0x5, 0x80, 0xff, 0x1, 0x800, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x7, 0xd77, 0x80000000, 0x101, 0x10000}, 0x14) connect$inet6(r0, &(0x7f000000cfe4)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x9}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [0xff, 0xff], @rand_addr=0x1}}, 0x1c) 2018/04/24 18:54:57 executing program 4: r0 = socket$packet(0x11, 0x1, 0x300) ioctl$fiemap(r0, 0xc020660b, &(0x7f0000000000)={0x5, 0xfffffffffffffffa, 0x0, 0x2, 0x7, [{0x7, 0x4, 0x7fffffff, 0x0, 0x0, 0x8}, {0xffffffffffff0000, 0x9, 0x9, 0x0, 0x0, 0x8}, {0x401, 0x8000, 0x4, 0x0, 0x0, 0x2800}, {0x3f, 0x6, 0xfffffffffffffffe, 0x0, 0x0, 0x4}, {0x70a, 0x0, 0x8}, {0x1f, 0x1ff, 0x5, 0x0, 0x0, 0x380}, {0x100000001, 0x2, 0x8}]}) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000340)=0x6, 0x4) sendto$inet6(r0, &(0x7f00000001c0)="040100000009000000000000611a54b932ce5b73832fdb040022d8707324ed75", 0x20, 0x0, &(0x7f0000005fe4)={0xa, 0x800000894f, 0x4, @dev={0xfe, 0x80}}, 0x1c) r1 = dup(r0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000200)) 2018/04/24 18:54:57 executing program 0 (fault-call:1 fault-nth:0): r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) [ 93.844520] FAULT_INJECTION: forcing a failure. [ 93.844520] name failslab, interval 1, probability 0, space 0, times 0 [ 93.855943] CPU: 0 PID: 7285 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 93.862814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.872192] Call Trace: [ 93.874832] dump_stack+0x185/0x1d0 [ 93.878518] should_fail+0x87b/0xab0 [ 93.882329] should_failslab+0x279/0x2a0 [ 93.886439] kmem_cache_alloc+0x136/0xb90 [ 93.890649] ? key_alloc+0x9b2/0x1f00 [ 93.894530] ? key_user_lookup+0x327/0x650 [ 93.898837] key_alloc+0x9b2/0x1f00 [ 93.902523] keyring_alloc+0x154/0x290 [ 93.906460] call_sbin_request_key+0x35e/0x1170 [ 93.911181] ? request_key_auth_new+0x933/0xb80 [ 93.915899] request_key_and_link+0x1765/0x2000 [ 93.920780] ? restrict_link_reject+0x30/0x30 [ 93.925307] ? keyring_search_aux+0x450/0x450 [ 93.929844] SYSC_request_key+0x5c0/0x790 [ 93.934088] SyS_request_key+0x65/0x90 [ 93.938064] do_syscall_64+0x309/0x430 [ 93.941999] ? SYSC_add_key+0x960/0x960 [ 93.946021] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 93.951238] RIP: 0033:0x455389 [ 93.954450] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 93.962191] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 93.969488] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 93.976782] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 93.984078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 2018/04/24 18:54:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000000), &(0x7f0000000040)=0xfee3) socket$inet6_tcp(0xa, 0x1, 0x0) 2018/04/24 18:54:57 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) [ 93.991372] R13: 00000000000004a7 R14: 00000000006fa048 R15: 0000000000000009 [ 94.000489] FAULT_INJECTION: forcing a failure. [ 94.000489] name failslab, interval 1, probability 0, space 0, times 0 [ 94.011811] CPU: 1 PID: 7281 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 94.018674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.028054] Call Trace: [ 94.030690] dump_stack+0x185/0x1d0 [ 94.034361] should_fail+0x87b/0xab0 [ 94.038181] should_failslab+0x279/0x2a0 [ 94.042284] __kmalloc+0xc2/0x350 [ 94.045826] ? tipc_group_create+0xfa/0x9c0 [ 94.050231] tipc_group_create+0xfa/0x9c0 [ 94.054474] ? local_bh_enable+0x36/0x40 [ 94.058621] tipc_setsockopt+0x120c/0x1e50 [ 94.062908] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 94.068344] ? __fget_light+0x6b9/0x710 [ 94.072361] ? security_socket_setsockopt+0x5b/0x200 [ 94.077561] ? tipc_shutdown+0x5c0/0x5c0 [ 94.081696] SYSC_setsockopt+0x4b8/0x570 [ 94.085862] SyS_setsockopt+0x76/0xa0 [ 94.089778] do_syscall_64+0x309/0x430 [ 94.093719] ? SYSC_recv+0xe0/0xe0 [ 94.097305] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 94.102515] RIP: 0033:0x455389 [ 94.105722] RSP: 002b:00007fcf32250c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 94.113549] RAX: ffffffffffffffda RBX: 00007fcf322516d4 RCX: 0000000000455389 [ 94.120844] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000013 [ 94.128140] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 94.135441] R10: 00000000200f7ff0 R11: 0000000000000246 R12: 0000000000000014 [ 94.142736] R13: 00000000000005fc R14: 00000000006fc040 R15: 0000000000000000 2018/04/24 18:54:58 executing program 6 (fault-call:0 fault-nth:10): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) 2018/04/24 18:54:58 executing program 5: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$rdma_cm(r0, &(0x7f00000000c0)=@create_id={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffff}, 0x2}}, 0x20) write$rdma_cm(r0, &(0x7f0000000340)=@bind={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}}, 0x90) write$rdma_cm(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="03000000400000fa0a0000000000000000000000000000000000000000000001000000000a00000000000000fe700000000000000000f40000800000000000009a91dc4b7c98da383d131de35305fd624fdeed38f1cafeb452b114f4c8f8", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00'], 0x7dbc) 2018/04/24 18:54:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:54:58 executing program 2: syz_emit_ethernet(0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:54:58 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:58 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x80, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:54:58 executing program 0 (fault-call:1 fault-nth:1): r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) 2018/04/24 18:54:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0xe29}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r2, 0x2, 0x30, 0xac8, 0x3f}, &(0x7f00000001c0)=0x18) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f00000000c0)=0x1, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 94.356689] FAULT_INJECTION: forcing a failure. [ 94.356689] name failslab, interval 1, probability 0, space 0, times 0 [ 94.369123] CPU: 0 PID: 7316 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 94.375992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.385378] Call Trace: [ 94.388019] dump_stack+0x185/0x1d0 [ 94.391697] should_fail+0x87b/0xab0 [ 94.395487] should_failslab+0x279/0x2a0 [ 94.399660] __kmalloc_track_caller+0x208/0xcb0 [ 94.404372] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 94.409786] ? key_alloc+0xa7b/0x1f00 [ 94.413650] kmemdup+0x95/0x140 [ 94.417016] key_alloc+0xa7b/0x1f00 [ 94.420712] keyring_alloc+0x154/0x290 [ 94.424657] call_sbin_request_key+0x35e/0x1170 [ 94.429384] ? request_key_auth_new+0x933/0xb80 [ 94.434111] request_key_and_link+0x1765/0x2000 [ 94.438818] ? restrict_link_reject+0x30/0x30 [ 94.443349] ? keyring_search_aux+0x450/0x450 [ 94.447899] SYSC_request_key+0x5c0/0x790 [ 94.452148] SyS_request_key+0x65/0x90 [ 94.456122] do_syscall_64+0x309/0x430 [ 94.460062] ? SYSC_add_key+0x960/0x960 [ 94.464080] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 94.469297] RIP: 0033:0x455389 [ 94.472504] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 94.480247] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 94.487541] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 94.494833] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/04/24 18:54:58 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = accept(r0, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0xe29}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000180)={r2, 0x2, 0x30, 0xac8, 0x3f}, &(0x7f00000001c0)=0x18) bind$inet6(r0, &(0x7f000044f000)={0xa, 0x4e20}, 0x1c) listen(r0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f00000000c0)=0x1, 0x4) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}, @broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [], 0xaa}, @local={0xfe, 0x80, [], 0xaa}, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 2018/04/24 18:54:58 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x4084, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:58 executing program 2: syz_emit_ethernet(0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) [ 94.502123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 94.509417] R13: 00000000000004a7 R14: 00000000006fa048 R15: 000000000000000a [ 94.556609] FAULT_INJECTION: forcing a failure. [ 94.556609] name failslab, interval 1, probability 0, space 0, times 0 [ 94.568041] CPU: 1 PID: 7325 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 94.574913] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.584295] Call Trace: [ 94.586936] dump_stack+0x185/0x1d0 [ 94.590612] should_fail+0x87b/0xab0 [ 94.594423] should_failslab+0x279/0x2a0 [ 94.598527] __kmalloc+0xc2/0x350 [ 94.602014] ? kmsan_set_origin_inline+0x6b/0x120 [ 94.606892] ? tipc_alloc_conn+0x56/0x6d0 [ 94.611082] tipc_alloc_conn+0x56/0x6d0 [ 94.615113] ? tipc_topsrv_kern_subscr+0xc7/0x610 [ 94.620041] tipc_topsrv_kern_subscr+0x218/0x610 [ 94.624902] tipc_group_create+0x63e/0x9c0 [ 94.629248] tipc_setsockopt+0x120c/0x1e50 [ 94.633539] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 94.638967] ? __fget_light+0x6b9/0x710 [ 94.642980] ? security_socket_setsockopt+0x5b/0x200 [ 94.648170] ? tipc_shutdown+0x5c0/0x5c0 [ 94.652302] SYSC_setsockopt+0x4b8/0x570 2018/04/24 18:54:58 executing program 4: timer_create(0x2, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={&(0x7f0000000180), &(0x7f00000001c0)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000000080)) r0 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400001, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x1, 0x81, 0x8, 0x0, 0x1c, r1, 0xffffffffffffffff}, 0x2c) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f00000001c0)={0x7, {0x2, 0x4e21, @local={0xac, 0x14, 0x14, 0xaa}}, {0x2, 0x4e21, @rand_addr=0x9}, {0x2, 0x4e24, @loopback=0x7f000001}, 0x4, 0x7f, 0x2, 0x4, 0x3ff, &(0x7f0000000180)='bridge_slave_0\x00', 0x14b, 0x6, 0x8}) ustat(0x401, &(0x7f0000000240)) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000280)={0x0, 0x7f, "85372865d1303f99a021994c090328c33e3cf46a6bbb3df7622173e864cd3e453696d9552ccf81f594c8e4f6db51c9a597efd48d14bcd6faaafabed8bc992966f6431a2de03647011ac39b5d635ab2e86fcd766d5800bd24d91322f5dda3593804fc923777e5682f0adf2011543096fdaac221ad3e5ef3a77b6e09d9796874"}, &(0x7f0000000340)=0x87) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000380)={r2, @in={{0x2, 0x4e23, @remote={0xac, 0x14, 0x14, 0xbb}}}, 0x10000, 0x4}, 0x90) fcntl$getflags(r0, 0x40a) timer_gettime(0x0, &(0x7f0000000140)) 2018/04/24 18:54:58 executing program 5: r0 = memfd_create(&(0x7f00000002c0)="bcf6", 0x0) write(r0, &(0x7f0000000080)="f0", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xfec) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000000)={0x6, 0xffffffffffff0000}) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x8011, r0, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000000c0)=""/195) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x401, 0x5}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={r1, 0x5, 0x10}, &(0x7f0000000240)=0xc) [ 94.656472] SyS_setsockopt+0x76/0xa0 [ 94.660365] do_syscall_64+0x309/0x430 [ 94.664306] ? SYSC_recv+0xe0/0xe0 [ 94.667895] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 94.673109] RIP: 0033:0x455389 [ 94.676321] RSP: 002b:00007fcf32250c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 94.684068] RAX: ffffffffffffffda RBX: 00007fcf322516d4 RCX: 0000000000455389 [ 94.691387] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000013 [ 94.698682] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 2018/04/24 18:54:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) [ 94.705981] R10: 00000000200f7ff0 R11: 0000000000000246 R12: 0000000000000014 [ 94.713275] R13: 00000000000005fc R14: 00000000006fc040 R15: 0000000000000001 2018/04/24 18:54:58 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:58 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:54:58 executing program 6 (fault-call:0 fault-nth:11): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) 2018/04/24 18:54:58 executing program 3: r0 = userfaultfd(0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x22000, 0x2908b80c2392d980) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x3}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x1}) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f00000001c0)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f00000002c0), &(0x7f0000000300)=0xc) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x0, 0x2, 0x5, 0x65, 0xfffffffffffffff8, 0x8001, 0x8001, {0x0, @in6={{0xa, 0x4e23, 0xfffffffffffffffa, @mcast2={0xff, 0x2, [], 0x1}, 0x23}}, 0x2, 0x4, 0x1, 0x35f2, 0x7}}, &(0x7f0000000100)=0xb0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000040)={r2, 0x5, 0x2, 0x6, 0x52, 0x2}, &(0x7f0000000080)=0x14) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={r3, 0x80000000}, 0x8) 2018/04/24 18:54:58 executing program 2: syz_emit_ethernet(0x2, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344], &(0x7f00000002c0)) 2018/04/24 18:54:58 executing program 4: socket$inet(0x2, 0x4000000000000001, 0x0) [ 94.971181] FAULT_INJECTION: forcing a failure. [ 94.971181] name failslab, interval 1, probability 0, space 0, times 0 [ 94.982600] CPU: 1 PID: 7350 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 94.989477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.998861] Call Trace: [ 95.001498] dump_stack+0x185/0x1d0 [ 95.005176] should_fail+0x87b/0xab0 [ 95.008986] should_failslab+0x279/0x2a0 [ 95.013112] __kmalloc+0xc2/0x350 [ 95.016674] ? assoc_array_insert+0xee/0x4dc0 [ 95.021241] ? __key_link_begin+0x268/0x530 [ 95.025612] assoc_array_insert+0xee/0x4dc0 [ 95.030014] ? kmsan_set_origin_inline+0x6b/0x120 [ 95.034902] ? __msan_poison_alloca+0x15c/0x1d0 [ 95.039615] ? _cond_resched+0x3c/0xd0 [ 95.043541] ? rcu_all_qs+0x32/0x1f0 [ 95.047293] ? _cond_resched+0x3c/0xd0 [ 95.051235] __key_link_begin+0x268/0x530 [ 95.055427] ? call_sbin_request_key+0x583/0x1170 [ 95.060348] ? call_sbin_request_key+0x583/0x1170 [ 95.065222] key_link+0xd4/0x900 [ 95.068655] ? keyring_alloc+0x222/0x290 [ 95.072765] call_sbin_request_key+0x583/0x1170 [ 95.077503] request_key_and_link+0x1765/0x2000 [ 95.082206] ? restrict_link_reject+0x30/0x30 [ 95.086737] ? keyring_search_aux+0x450/0x450 [ 95.091282] SYSC_request_key+0x5c0/0x790 [ 95.095528] SyS_request_key+0x65/0x90 [ 95.099506] do_syscall_64+0x309/0x430 [ 95.103447] ? SYSC_add_key+0x960/0x960 [ 95.107463] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 95.112682] RIP: 0033:0x455389 [ 95.115889] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 95.123629] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 95.130923] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 95.138217] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 95.145502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 95.152796] R13: 00000000000004a7 R14: 00000000006fa048 R15: 000000000000000b 2018/04/24 18:54:59 executing program 0 (fault-call:1 fault-nth:2): r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) 2018/04/24 18:54:59 executing program 2: syz_emit_ethernet(0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaa00040000000086dd60d8652b00140600fe0100000000000000000000bc2e3793d75c668fa1c2352e8d34154345cb99ba89600033a33f000000aafe8000000000000000000000000000aa00004e202ebc34ad0f93b5e325e2b792891a58cb205849c92743993364703d1a242c58dd3cbc78899fba1db764a01f93e13922ecfcee85b47ebb2a0d2ffff5e4fcdcba9cdb0dca533a5d915066c5c2d1cb49b63cd884d2df2b0a3cb0cdfdcab2c17730eb6c23b31a4bd14763535d62142bc284d291cb44e643535107da0bcdb38786f7c3bff836f271b6349984ee6b513983ca075b6919ce11cdb2632ff96962cf2605945c81a847098b1b57b3a72dfeab29b4ce41e7c8c2c502905c0b083f01c44322774fb184fe0a2b9095504c02ec858eb8b9", @ANYRES32=0x41424344, @ANYBLOB], &(0x7f00000002c0)) 2018/04/24 18:54:59 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:54:59 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000740)='\x00{', 0x2, r2) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0, 0x63ca3dd4}, 0x8) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = geteuid() ioprio_set$uid(0x3, r5, 0x6) getsockname(r4, &(0x7f0000000400)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000300)=0xffffffffffffff42) r6 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 2018/04/24 18:54:59 executing program 3: getcwd(&(0x7f0000000300), 0xffffffffffffff4d) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x40, 0x20800) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f00000002c0)=0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r1, 0x7800000000000000}, &(0x7f0000000100)=0x8) name_to_handle_at(r0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="cc000000030000006afaef9d6d7197a0c76d550fb069a1b2b8aadb9f4367a10352b9015298337833753b03ebb092349317dd5d4e07dbfc51ec9e2513cbed4dfe0f0f12c0a2b9d065a9a4b6c55fd5c0cfaf14b7e24c39dcb8b8d95e85cdf5b808d8f9607afb1aaec601a035db011e19abdaf4c92c22e888e3880c665626208add0c42c43f047f5abcde5fd0f63046dad8dfdd702351e438cf76d16cb932d1182a070c09c70272cb84d523e22cf8921cb74b12bbd251072510938506eca88065471c87113e79ccc03aead8e5dc"], &(0x7f0000000280), 0x1000) 2018/04/24 18:54:59 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:54:59 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000003fe8)={0xaa}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r3, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000080), &(0x7f00000000c0)=0xc) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r3) 2018/04/24 18:54:59 executing program 6 (fault-call:0 fault-nth:12): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) [ 95.386966] FAULT_INJECTION: forcing a failure. [ 95.386966] name failslab, interval 1, probability 0, space 0, times 0 [ 95.398340] CPU: 1 PID: 7374 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 95.405329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.414739] Call Trace: [ 95.417381] dump_stack+0x185/0x1d0 [ 95.421062] should_fail+0x87b/0xab0 [ 95.424888] should_failslab+0x279/0x2a0 [ 95.429009] __kmalloc+0xc2/0x350 [ 95.432566] ? assoc_array_insert+0x2b00/0x4dc0 [ 95.437287] assoc_array_insert+0x2b00/0x4dc0 [ 95.441864] ? kmsan_set_origin_inline+0x6b/0x120 [ 95.446748] ? __msan_poison_alloca+0x15c/0x1d0 [ 95.451458] ? _cond_resched+0x3c/0xd0 [ 95.455386] ? rcu_all_qs+0x32/0x1f0 [ 95.459182] ? _cond_resched+0x3c/0xd0 [ 95.463129] __key_link_begin+0x268/0x530 [ 95.467335] ? call_sbin_request_key+0x583/0x1170 [ 95.472255] ? call_sbin_request_key+0x583/0x1170 [ 95.477167] key_link+0xd4/0x900 [ 95.480605] ? keyring_alloc+0x222/0x290 [ 95.484720] call_sbin_request_key+0x583/0x1170 [ 95.487879] FAULT_INJECTION: forcing a failure. [ 95.487879] name failslab, interval 1, probability 0, space 0, times 0 [ 95.489458] request_key_and_link+0x1765/0x2000 [ 95.489494] ? restrict_link_reject+0x30/0x30 [ 95.489524] ? keyring_search_aux+0x450/0x450 [ 95.489575] SYSC_request_key+0x5c0/0x790 [ 95.489678] SyS_request_key+0x65/0x90 [ 95.522514] do_syscall_64+0x309/0x430 [ 95.526438] ? SYSC_add_key+0x960/0x960 [ 95.530431] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 95.535627] RIP: 0033:0x455389 [ 95.538815] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 95.546533] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 95.553806] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 95.561076] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 95.568348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 95.575617] R13: 00000000000004a7 R14: 00000000006fa048 R15: 000000000000000c [ 95.582914] CPU: 0 PID: 7385 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 95.589776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.599152] Call Trace: [ 95.601789] dump_stack+0x185/0x1d0 [ 95.605556] should_fail+0x87b/0xab0 [ 95.609322] should_failslab+0x279/0x2a0 [ 95.613479] kmem_cache_alloc+0x136/0xb90 [ 95.618070] ? radix_tree_node_alloc+0x1c7/0x5c0 [ 95.622894] ? kmsan_set_origin+0x9e/0x160 [ 95.627179] radix_tree_node_alloc+0x1c7/0x5c0 [ 95.631812] radix_tree_extend+0x22a/0x8f0 [ 95.636132] ? __msan_poison_alloca+0x15c/0x1d0 [ 95.640849] idr_get_free+0x347/0x1490 [ 95.644833] idr_alloc_u32+0x27c/0x550 [ 95.648765] idr_alloc+0x161/0x220 [ 95.652342] tipc_alloc_conn+0x2f7/0x6d0 [ 95.656499] tipc_topsrv_kern_subscr+0x218/0x610 [ 95.661365] tipc_group_create+0x63e/0x9c0 [ 95.665721] tipc_setsockopt+0x120c/0x1e50 [ 95.670006] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 95.675441] ? __fget_light+0x6b9/0x710 [ 95.679449] ? security_socket_setsockopt+0x5b/0x200 [ 95.684639] ? tipc_shutdown+0x5c0/0x5c0 2018/04/24 18:54:59 executing program 3: unshare(0x40600) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000100)={0x1}) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x401, 0x40040) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)={0x6, 0x10001}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e21}, 0xffffffffffffffe4) 2018/04/24 18:54:59 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000740)='\x00{', 0x2, r2) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0, 0x63ca3dd4}, 0x8) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = geteuid() ioprio_set$uid(0x3, r5, 0x6) getsockname(r4, &(0x7f0000000400)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000300)=0xffffffffffffff42) r6 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) [ 95.688783] SYSC_setsockopt+0x4b8/0x570 [ 95.692952] SyS_setsockopt+0x76/0xa0 [ 95.696846] do_syscall_64+0x309/0x430 [ 95.700786] ? SYSC_recv+0xe0/0xe0 [ 95.704371] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 95.709579] RIP: 0033:0x455389 [ 95.712787] RSP: 002b:00007fcf32250c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 95.720530] RAX: ffffffffffffffda RBX: 00007fcf322516d4 RCX: 0000000000455389 [ 95.727820] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000013 [ 95.735106] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 95.742393] R10: 00000000200f7ff0 R11: 0000000000000246 R12: 0000000000000014 [ 95.749690] R13: 00000000000005fc R14: 00000000006fc040 R15: 0000000000000002 2018/04/24 18:55:00 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:55:00 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:55:00 executing program 2: syz_emit_ethernet(0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="50020000"], &(0x7f00000002c0)) 2018/04/24 18:55:00 executing program 6 (fault-call:0 fault-nth:13): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) 2018/04/24 18:55:00 executing program 0 (fault-call:1 fault-nth:3): r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) 2018/04/24 18:55:00 executing program 3: r0 = socket(0x40000000015, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000003c0)={'syz_tun\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="c80000000000000000000000720729e80f7ee1506df218abaf793ad87b20ee944e30b1c8685936dc9da8dfbb1f73672836691e40f8e8bc6f4d2e36fb1386f4c2ab06e2eff9be0659f0d771db2b1c7ae5833239b1c036f25a32aa7f42524074e0d017b142416fd9023ebecf769692c756446b385b253c3d5c5dcf2fea56e8d6f591965ee1bcfce11d5a5674247011f904860e2fcf8d624c6d57a86b5558dec9d7d31f811d90694ac075de666d"]}) r1 = socket$inet6(0xa, 0x80002, 0x88) bind$inet6(r1, &(0x7f000092bfe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) getsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000000)=0x20, &(0x7f0000000040)=0x1) recvfrom$inet6(r1, &(0x7f0000ff1f47)=""/185, 0xb9, 0x3ffffffc, 0x0, 0x3c) r2 = socket$inet6(0xa, 0x8000000000000802, 0x88) sendmsg$inet_sctp(r2, &(0x7f0000957000)={&(0x7f00005dafe4)=@in6={0xa, 0x4e23}, 0x1c}, 0x8000) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000140)) sendto$inet6(r2, &(0x7f0000b0cf6e), 0xffed, 0x0, &(0x7f000001b000)={0xa}, 0x1c) 2018/04/24 18:55:00 executing program 5: r0 = socket(0x10, 0x803, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000140)=""/187, &(0x7f0000000040)=0xbb) sendto(r0, &(0x7f0000000000)="120000001200e7ff40dfe70009149b00f99b", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000fd0ed4)=[{{0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f0000fd0000)=""/100, 0x64}}], 0x1, 0x0, &(0x7f00000000c0)) clock_gettime(0x5, &(0x7f0000001780)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000002780)=[{{0x0, 0x0, &(0x7f0000002980), 0x0, &(0x7f0000001880)=""/207, 0xcf}}, {{0x0, 0x0, &(0x7f0000001b00), 0x0, &(0x7f0000001b40)=""/196, 0xc4}}, {{0x0, 0x0, &(0x7f0000001d40), 0x0, &(0x7f0000001d80)=""/171, 0xab}}, {{&(0x7f0000001e40)=@in6, 0x80, &(0x7f0000002200)=[{&(0x7f0000001f40)=""/144, 0x90}, {&(0x7f0000002000)=""/164, 0xa4}, {&(0x7f0000003040)=""/4096, 0x1000}, {&(0x7f00000020c0)=""/196, 0xc4}], 0x4, &(0x7f0000002280)=""/113, 0x71}}, {{&(0x7f0000002300)=@nfc_llcp, 0x80, &(0x7f0000002540), 0x0, &(0x7f0000002580)}}, {{&(0x7f00000025c0)=@vsock, 0x80, &(0x7f0000002700), 0x0, &(0x7f0000002740)=""/62, 0x3e}}], 0x6, 0x0, &(0x7f0000000100)={0x0, r1+10000000}) 2018/04/24 18:55:00 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000740)='\x00{', 0x2, r2) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0, 0x63ca3dd4}, 0x8) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = geteuid() ioprio_set$uid(0x3, r5, 0x6) getsockname(r4, &(0x7f0000000400)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000300)=0xffffffffffffff42) r6 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) [ 96.415700] FAULT_INJECTION: forcing a failure. [ 96.415700] name failslab, interval 1, probability 0, space 0, times 0 [ 96.427271] CPU: 0 PID: 7410 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 96.434138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.443495] Call Trace: [ 96.446106] dump_stack+0x185/0x1d0 [ 96.449753] should_fail+0x87b/0xab0 [ 96.453485] should_failslab+0x279/0x2a0 [ 96.457595] __kmalloc+0xc2/0x350 [ 96.461111] ? call_usermodehelper_setup+0x104/0x4d0 [ 96.466256] call_usermodehelper_setup+0x104/0x4d0 [ 96.471264] ? call_sbin_request_key+0x1170/0x1170 [ 96.476231] ? umh_keys_init+0xa0/0xa0 [ 96.480134] call_sbin_request_key+0xcae/0x1170 [ 96.484843] request_key_and_link+0x1765/0x2000 [ 96.489523] ? restrict_link_reject+0x30/0x30 [ 96.494033] ? keyring_search_aux+0x450/0x450 [ 96.498732] SYSC_request_key+0x5c0/0x790 [ 96.502953] SyS_request_key+0x65/0x90 [ 96.506905] do_syscall_64+0x309/0x430 [ 96.510826] ? SYSC_add_key+0x960/0x960 [ 96.514836] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 96.520038] RIP: 0033:0x455389 [ 96.523230] RSP: 002b:00007f56c53bfc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 96.530949] RAX: ffffffffffffffda RBX: 00007f56c53c06d4 RCX: 0000000000455389 [ 96.538237] RDX: 0000000020000180 RSI: 0000000020000140 RDI: 0000000020000100 [ 96.545612] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 96.552897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 96.560169] R13: 00000000000004a7 R14: 00000000006fa048 R15: 000000000000000d [ 96.581435] FAULT_INJECTION: forcing a failure. [ 96.581435] name failslab, interval 1, probability 0, space 0, times 0 [ 96.592813] CPU: 1 PID: 7408 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 96.599693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.609085] Call Trace: [ 96.611739] dump_stack+0x185/0x1d0 [ 96.615435] should_fail+0x87b/0xab0 [ 96.619262] should_failslab+0x279/0x2a0 [ 96.623386] __kmalloc+0xc2/0x350 [ 96.626923] ? tipc_subscrb_connect_cb+0x59/0x270 [ 96.631923] tipc_subscrb_connect_cb+0x59/0x270 [ 96.636661] ? tipc_subscrb_rcv_cb+0xe80/0xe80 [ 96.641343] tipc_topsrv_kern_subscr+0x3c1/0x610 [ 96.646248] tipc_group_create+0x63e/0x9c0 [ 96.650614] tipc_setsockopt+0x120c/0x1e50 [ 96.654919] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 96.660379] ? __fget_light+0x6b9/0x710 [ 96.664407] ? security_socket_setsockopt+0x5b/0x200 [ 96.669611] ? tipc_shutdown+0x5c0/0x5c0 [ 96.673761] SYSC_setsockopt+0x4b8/0x570 [ 96.677936] SyS_setsockopt+0x76/0xa0 [ 96.681834] do_syscall_64+0x309/0x430 [ 96.685782] ? SYSC_recv+0xe0/0xe0 [ 96.689367] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 96.694583] RIP: 0033:0x455389 [ 96.697795] RSP: 002b:00007fcf32250c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 96.705547] RAX: ffffffffffffffda RBX: 00007fcf322516d4 RCX: 0000000000455389 2018/04/24 18:55:00 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:55:00 executing program 5: r0 = socket(0x1e, 0x1000000000005, 0x0) sendmsg(r0, &(0x7f0000db5fc8)={&(0x7f00004aeb5c)=@generic={0x10000001001e, "030000000000000000000001e526cc573c5bf86c483724c71e14dd6a739effea1b48007be61ffe06d79f00000000000000076c3f010039d8f986ff01000000000000af06d5fe32c419d67bcbc7e3ad316a198356edb9b7341c1fd45624281e27800ece70b076c3979ac40000bd767e2e78a1dfd300881a1565b3b16d7436"}, 0x80, &(0x7f000045d000), 0x0, &(0x7f000016cf61)}, 0x0) recvmsg$kcm(r0, &(0x7f0000008000)={&(0x7f0000c1d000)=@ax25, 0x10, &(0x7f0000241ff0)=[{&(0x7f00009a9fff)=""/1, 0x1}], 0x1, &(0x7f0000c21000)}, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) recvmmsg(r0, &(0x7f00000035c0)=[{{&(0x7f0000002880)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @dev}}}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002bc0)=""/60, 0x3c}], 0x1, &(0x7f0000002c80)=""/123, 0x7b}}, {{&(0x7f0000002d00)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000002dc0)=[{&(0x7f0000002d80)=""/58, 0x3a}], 0x3e4}}], 0x2, 0x3, &(0x7f0000001340)={0x0, r1+30000000}) bind$nfc_llcp(r2, &(0x7f0000000180)={0x27, 0x1, 0x1, 0x5, 0x5, 0x7, "f9804b606f0c0216d897742259cc075724f92e68dd47f35ea34c14acb321319781630ca02535ee9b89b7619a6199064ef68b9d3cf367d0c0ca05153c6f86ec", 0x1a}, 0x60) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xdd5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x9) r4 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3f, 0x49a400) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETGROUP(r4, 0x400454ce, r5) 2018/04/24 18:55:00 executing program 6 (fault-call:0 fault-nth:14): request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) [ 96.712851] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000013 [ 96.720168] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 96.727478] R10: 00000000200f7ff0 R11: 0000000000000246 R12: 0000000000000014 [ 96.734784] R13: 00000000000005fc R14: 00000000006fc040 R15: 0000000000000003 [ 96.742954] Subscriber rejected, no memory 2018/04/24 18:55:00 executing program 2: syz_emit_ethernet(0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="500200009078"], &(0x7f00000002c0)) 2018/04/24 18:55:00 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:55:00 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000540)='/dev/snd/controlC#\x00', 0x0, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000000c0)=0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x2, &(0x7f0000000140)=[{&(0x7f0000000100)="68aa9f587088432e1291227bcf469aa80a73e7cb08cc2c3e4af88bb20f2d71f8ca70d0ad8b2e7865baf3bed4b5e774778954bfc16ab24a008a63", 0x3a}, {&(0x7f0000000580)="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", 0x1000, 0x8001}], 0x800, &(0x7f0000000180)) 2018/04/24 18:55:01 executing program 1: bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:55:01 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:55:01 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000740)='\x00{', 0x2, r2) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0, 0x63ca3dd4}, 0x8) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = geteuid() ioprio_set$uid(0x3, r5, 0x6) getsockname(r4, &(0x7f0000000400)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000300)=0xffffffffffffff42) r6 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r6, r6}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 2018/04/24 18:55:01 executing program 2: syz_emit_ethernet(0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="50020000907800"], &(0x7f00000002c0)) 2018/04/24 18:55:01 executing program 3: r0 = syz_open_dev$sndctrl(&(0x7f0000000540)='/dev/snd/controlC#\x00', 0x0, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000000)) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000000c0)=0x1) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x7, 0x2, &(0x7f0000000140)=[{&(0x7f0000000100)="68aa9f587088432e1291227bcf469aa80a73e7cb08cc2c3e4af88bb20f2d71f8ca70d0ad8b2e7865baf3bed4b5e774778954bfc16ab24a008a63", 0x3a}, {&(0x7f0000000580)="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", 0x1000, 0x8001}], 0x800, &(0x7f0000000180)) 2018/04/24 18:55:01 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x24b, &(0x7f0000004000)=[{&(0x7f0000000080)="2f0000001c0003fd6d0000360000000007dd0700e82c00001f5f08c908000200000087730beeffff005867855e7fa5", 0x251}], 0x1}, 0x0) 2018/04/24 18:55:01 executing program 6: request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000040)={&(0x7f0000000000)=[0x9, 0xffff, 0x4, 0x800, 0x4, 0x2, 0x10000, 0x6], 0x8, 0x400, 0x7, 0x1ff, 0xadf, 0x29, {0x479, 0x1ff, 0xf8e, 0x8e9c, 0x7f, 0x1ff, 0x0, 0x4cb4, 0x6, 0xf5ab, 0x0, 0x200, 0x9, 0x0, "eea6d90bd8c09464f9a59d7a1ad8b37fe6e536b15a1c9b61ab85b8d87d114fdf"}}) 2018/04/24 18:55:01 executing program 0 (fault-call:1 fault-nth:4): r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) [ 97.233903] FAULT_INJECTION: forcing a failure. [ 97.233903] name failslab, interval 1, probability 0, space 0, times 0 [ 97.242087] netlink: 11 bytes leftover after parsing attributes in process `syz-executor5'. [ 97.245326] CPU: 1 PID: 7456 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 97.245341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.245355] Call Trace: [ 97.245397] dump_stack+0x185/0x1d0 [ 97.245442] should_fail+0x87b/0xab0 [ 97.280145] should_failslab+0x279/0x2a0 2018/04/24 18:55:01 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) [ 97.284271] __kmalloc+0xc2/0x350 [ 97.287888] ? tipc_subscrb_rcv_cb+0x7d/0xe80 [ 97.292435] ? tipc_subscrb_rcv_cb+0x566/0xe80 [ 97.297084] tipc_subscrb_rcv_cb+0x566/0xe80 [ 97.301577] ? tipc_topsrv_start+0x650/0x650 [ 97.306086] ? tipc_topsrv_start+0x650/0x650 [ 97.310694] tipc_topsrv_kern_subscr+0x4ff/0x610 [ 97.315579] tipc_group_create+0x63e/0x9c0 [ 97.319948] tipc_setsockopt+0x120c/0x1e50 [ 97.324245] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 97.329689] ? __fget_light+0x6b9/0x710 2018/04/24 18:55:01 executing program 2 (fault-call:0 fault-nth:0): syz_emit_ethernet(0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f00000002c0)) 2018/04/24 18:55:01 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='/exe\x00\x00\x00\x00\x00\x00') fcntl$setstatus(r0, 0x4, 0x10004004) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8002, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x19, 0x0, 0x0, r0, &(0x7f0000002200)='0', 0x1, 0x8000000}]) [ 97.333714] ? security_socket_setsockopt+0x5b/0x200 [ 97.338921] ? tipc_shutdown+0x5c0/0x5c0 [ 97.343072] SYSC_setsockopt+0x4b8/0x570 [ 97.347275] SyS_setsockopt+0x76/0xa0 [ 97.351195] do_syscall_64+0x309/0x430 [ 97.355187] ? SYSC_recv+0xe0/0xe0 [ 97.358784] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 97.364010] RIP: 0033:0x455389 [ 97.367231] RSP: 002b:00007fcf32250c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 97.374991] RAX: ffffffffffffffda RBX: 00007fcf322516d4 RCX: 0000000000455389 [ 97.382298] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000013 [ 97.389613] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 [ 97.396918] R10: 00000000200f7ff0 R11: 0000000000000246 R12: 0000000000000014 [ 97.404229] R13: 00000000000005fc R14: 00000000006fc040 R15: 0000000000000004 [ 97.413212] Subscription rejected, no memory 2018/04/24 18:55:01 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) 2018/04/24 18:55:01 executing program 3: recvmsg(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000000280)=@pppol2tpv3={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @multicast1}}}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000300)=""/29, 0x1d}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x2, &(0x7f0000001380)=""/22, 0x16, 0x20}, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000001400)={@empty, 0x0}, &(0x7f0000001440)=0x14) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001480)={r1, @rand_addr=0x3fffffffc0, @multicast1=0xe0000001}, 0xc) r2 = socket$netlink(0x10, 0x3, 0xd) writev(r2, &(0x7f0000000180)=[{&(0x7f00000001c0)="290000002000190700003f01ffffda060200000622e80002040000140d000400000600000092d14c81", 0x29}], 0x1) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCEXCL(r3, 0x540c) r4 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x1ff, 0x154f712dd63a96f2) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xf, 0xf, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x5a35171f}, [@ldst={0x3, 0x3, 0x0, 0x7, 0xe, 0xf, 0x14}, @call={0x85, 0x0, 0x0, 0x27}, @alu={0x7, 0x29ab, 0xf, 0x8, 0x3, 0x38, 0xfffffffffffffff9}, @jmp={0x5, 0x3ff, 0xd, 0xf, 0x9, 0x110, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0xb}, @jmp={0x5, 0x20, 0xd, 0x4, 0x7, 0xffffffc0, 0xfffffffffffffffc}], {0x95}}, &(0x7f00000000c0)='syzkaller\x00', 0x6192, 0x3a, &(0x7f0000000100)=""/58, 0x40f00, 0x1}, 0x48) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f00000014c0)) ioctl$TUNSETFILTEREBPF(r4, 0x800454e1, &(0x7f0000000140)=r5) 2018/04/24 18:55:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f00000000c0)=ANY=[@ANYBLOB="090000000c000000000e01008100000000000000"]) 2018/04/24 18:55:01 executing program 6: socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000001c0)={@local={0xfe, 0x80, [], 0xaa}, 0x1, 0x2, 0x0, 0x1, 0xfffffffffffffffa, 0xffffffff, 0x9}, &(0x7f0000000200)=0x20) request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x80000001, 0x40) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000080)={&(0x7f0000ff9000/0x4000)=nil, 0x69, 0x3, 0x81, &(0x7f0000ffa000/0x2000)=nil, 0x101}) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000040)=0x20, 0x4) 2018/04/24 18:55:01 executing program 2: syz_emit_ethernet(0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYBLOB="5002000090780000"], &(0x7f0000000000)) 2018/04/24 18:55:01 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:55:01 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000740)='\x00{', 0x2, r2) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0, 0x63ca3dd4}, 0x8) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = geteuid() ioprio_set$uid(0x3, r5, 0x6) getsockname(r4, &(0x7f0000000400)=@pppol2tpv3in6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @ipv4={[], [], @remote}}}}, &(0x7f0000000300)=0xffffffffffffff42) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) 2018/04/24 18:55:01 executing program 3: request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000040)={&(0x7f0000000000)=[0x9, 0xffff, 0x4, 0x800, 0x4, 0x2, 0x10000, 0x6], 0x8, 0x400, 0x7, 0x1ff, 0xadf, 0x29, {0x479, 0x1ff, 0xf8e, 0x8e9c, 0x7f, 0x1ff, 0x0, 0x4cb4, 0x6, 0xf5ab, 0x0, 0x200, 0x9, 0x0, "eea6d90bd8c09464f9a59d7a1ad8b37fe6e536b15a1c9b61ab85b8d87d114fdf"}}) 2018/04/24 18:55:01 executing program 0 (fault-call:1 fault-nth:5): r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f00000f7ff0)=@req={0x3fc, 0x0, 0x3}, 0x10) 2018/04/24 18:55:01 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="0cd57b85eba93a96ade37bb5cc77fa44385cbebfc579860c604b628df3247aae13b4d6bd91acf69f", 0x28}], 0x1, &(0x7f0000000800)}, 0x0) [ 97.858314] FAULT_INJECTION: forcing a failure. [ 97.858314] name failslab, interval 1, probability 0, space 0, times 0 [ 97.869721] CPU: 0 PID: 7519 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 97.876592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.885985] Call Trace: [ 97.888631] dump_stack+0x185/0x1d0 [ 97.892313] should_fail+0x87b/0xab0 [ 97.896090] should_failslab+0x279/0x2a0 [ 97.900203] __kmalloc+0xc2/0x350 [ 97.903890] ? kmsan_set_origin_inline+0x6b/0x120 [ 97.908779] ? tipc_nameseq_create+0x70/0x590 [ 97.913358] tipc_nameseq_create+0x70/0x590 [ 97.917741] tipc_nametbl_subscribe+0x510/0x1330 [ 97.922558] tipc_subscrb_rcv_cb+0xb6b/0xe80 [ 97.927091] ? tipc_topsrv_start+0x650/0x650 [ 97.931580] tipc_topsrv_kern_subscr+0x4ff/0x610 [ 97.936533] tipc_group_create+0x63e/0x9c0 [ 97.940874] tipc_setsockopt+0x120c/0x1e50 [ 97.945154] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 97.950598] ? __fget_light+0x6b9/0x710 [ 97.954632] ? security_socket_setsockopt+0x5b/0x200 [ 97.959838] ? tipc_shutdown+0x5c0/0x5c0 [ 97.963982] SYSC_setsockopt+0x4b8/0x570 [ 97.968170] SyS_setsockopt+0x76/0xa0 [ 97.972081] do_syscall_64+0x309/0x430 [ 97.976038] ? SYSC_recv+0xe0/0xe0 [ 97.979640] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 97.984869] RIP: 0033:0x455389 [ 97.988092] RSP: 002b:00007fcf32250c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 97.995859] RAX: ffffffffffffffda RBX: 00007fcf322516d4 RCX: 0000000000455389 2018/04/24 18:55:02 executing program 3: request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000040)={&(0x7f0000000000)=[0x9, 0xffff, 0x4, 0x800, 0x4, 0x2, 0x10000, 0x6], 0x8, 0x400, 0x7, 0x1ff, 0xadf, 0x29, {0x479, 0x1ff, 0xf8e, 0x8e9c, 0x7f, 0x1ff, 0x0, 0x4cb4, 0x6, 0xf5ab, 0x0, 0x200, 0x9, 0x0, "eea6d90bd8c09464f9a59d7a1ad8b37fe6e536b15a1c9b61ab85b8d87d114fdf"}}) 2018/04/24 18:55:02 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000740)='\x00{', 0x2, r2) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0, 0x63ca3dd4}, 0x8) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) r4 = geteuid() ioprio_set$uid(0x3, r4, 0x6) r5 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r5, r5}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) [ 98.003164] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000013 [ 98.010496] RBP: 000000000072bea0 R08: 0000000000000010 R09: 0000000000000000 2018/04/24 18:55:02 executing program 6: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000400)="776e735f7265716f6c76657242192765696983523af1", &(0x7f0000000440)={0x73, 0x79, 0x7a}, &(0x7f00000001c0)="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", r0) 2018/04/24 18:55:02 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000800)}, 0x0) 2018/04/24 18:55:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='projid_map\x00') bind$llc(r0, &(0x7f0000000200)={0x1a, 0xffff, 0x7f, 0x4, 0x6, 0x1, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xdcae47519e1fc459}}, 0x10) syz_emit_ethernet(0x0, &(0x7f0000000300)=ANY=[], &(0x7f00000002c0)) prctl$setfpexc(0xc, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000300)={{{@in=@multicast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}}}, &(0x7f0000000280)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000400)={@dev={0xfe, 0x80, [], 0x19}, 0x6e, r1}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x10000, 0x0) recvfrom(r2, &(0x7f0000000080)=""/165, 0xa5, 0x10022, &(0x7f0000000140)=@pppoe={0x18, 0x0, {0x2, @dev={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0x1a}, 'ip6gre0\x00'}}, 0x80) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x100, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r3, 0x6430) ioctl$sock_netrom_SIOCGSTAMP(r3, 0x8906, &(0x7f0000000240)) ioctl$TCSBRK(r3, 0x5409, 0x7c) [ 98.010516] R10: 00000000200f7ff0 R11: 0000000000000246 R12: 0000000000000014 [ 98.010534] R13: 00000000000005fc R14: 00000000006fc040 R15: 0000000000000005 [ 98.010672] Name sequence creation failed, no memory 2018/04/24 18:55:02 executing program 3: request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000040)={&(0x7f0000000000)=[0x9, 0xffff, 0x4, 0x800, 0x4, 0x2, 0x10000, 0x6], 0x8, 0x400, 0x7, 0x1ff, 0xadf, 0x29, {0x479, 0x1ff, 0xf8e, 0x8e9c, 0x7f, 0x1ff, 0x0, 0x4cb4, 0x6, 0xf5ab, 0x0, 0x200, 0x9, 0x0, "eea6d90bd8c09464f9a59d7a1ad8b37fe6e536b15a1c9b61ab85b8d87d114fdf"}}) 2018/04/24 18:55:02 executing program 4: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000000)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000500)={0x73, 0x79, 0x7a}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a}, 0x0, 0x0, r1) r3 = add_key$user(&(0x7f00003bd000)='user\x00', &(0x7f0000000b00)={0x73, 0x79, 0x7a}, &(0x7f0000000740)='\x00{', 0x2, r2) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000280)={0x0, 0x63ca3dd4}, 0x8) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000100)) geteuid() r4 = add_key$user(&(0x7f0000002cc0)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a}, &(0x7f0000000280), 0x10c, r1) keyctl$dh_compute(0x17, &(0x7f0000000180)={r3, r4, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000c61fc8)={&(0x7f0000000140)={'crc32-generic\x00'}}) [ 98.010700] Failed to create subscription for {1020,0,4294967295} 2018/04/24 18:55:02 executing program 1: r0 = socket$inet6(0xa, 0x0, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000011c0)={0x0, 0x0, 0x9}, 0x10) 2018/04/24 18:55:02 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1=0xe0000001}, 0x10) sendto$inet(r0, &(0x7f0000fa0fff), 0xffffffffffffffbb, 0x20020003, &(0x7f0000385ff0)={0x2, 0x4e21, @loopback=0x7f000001}, 0x10) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f00000000c0)=ANY=[@ANYBLOB="090000000c000000000e01008100000000000000"]) 2018/04/24 18:55:02 executing program 6: request_key(&(0x7f0000000100)='ceph\x00', &(0x7f0000000140)={0x73, 0x79, 0x7a}, &(0x7f0000000180)='\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x26244, 0x0) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000040)={0x0, 0xffffffff7fffffff, 0xffffffffffff31e7, 0x8}) 2018/04/24 18:55:02 executing program 7: r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0xa}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080), 0x0, &(0x7f0000000800)}, 0x0) 2018/04/24 18:55:02 executing program 2: socketpair$inet(0x1e, 0xe, 0x8, &(0x7f0000000280)={0x0}) sendmmsg(r0, &(0x7f0000000040)=[{{0x0, 0x0, &(0x7f0000000000), 0x0, &(0x7f0000001100)}}, {{&(0x7f0000001b00)=@vsock={0x1e, 0x0, 0x0, @reserved=0x1}, 0x80, &(0x7f0000001bc0), 0x25e, &(0x7f0000003000)}}], 0x2, 0x0) syz_emit_ethernet(0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00040000000086dd60d8652b00140600fe0100000000000000000000bc2e3793d75c668fa1c2352e8d34154345cb99ba89600033a33f000000aafe8000000000000000000000000000aa00004e202ebc34ad0f93b5e325e2b792891a58cb205849c92743993364703d1a242c58dd3cbc78899fba1db764a01f93e13922ecfcee85b47ebb2a0d2ffff5e4fcdcba9cdb0dca533a5d915066c5c2d1cb49b63cd884d2df2b0a3cb0cdfdcab2c17730eb6c23b31a4bd14763535d62142bc284d291cb44e643535107da0bcdb38786f7c3bff836f271b6349984ee6b513983ca075b6919ce11cdb2632ff96962cf2605945c81a847098b1b57b3a72dfeab29b4ce41e7c8c2c502905c0b083f01c44322774fb184fe0a2b9095504c02ec858eb8b9", @ANYRES32=0x41424344, @ANYBLOB="5002000090780000469ce0bcb800e3df0b9e60e89b34fd6ff156f9f65b0fc78aa4c3b463523bffb39a761ea537d99bf3d4e4055a699ae5d3e1a070edbe7bd550e7f409095f0a638d4d512d59dccdf5af7e38d4fc092ea1d8cee89b41aa7c40bef24e1b1aaf69c144f7fbe3c8de2f23577c694eda01a4f2426daa7af9b665b8f8b8eebd814940424337c19e138ee1ed185b"], &(0x7f00000002c0)={0x1, 0x0, [0x0, 0x0, 0x0, 0xdaa]}) [ 98.494920] BUG: unable to handle kernel NULL pointer dereference at 0000000000000000 [ 98.503018] IP: __list_del_entry_valid+0xd1/0x440 [ 98.507881] PGD 8000000164011067 P4D 8000000164011067 PUD 164018067 PMD 0 [ 98.514965] Oops: 0000 [#1] SMP PTI [ 98.518615] Dumping ftrace buffer: [ 98.522172] (ftrace buffer empty) [ 98.525891] Modules linked in: [ 98.529123] CPU: 1 PID: 7519 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 98.535976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.545424] RIP: 0010:__list_del_entry_valid+0xd1/0x440 [ 98.545440] RSP: 0018:ffff8801551bf1a8 EFLAGS: 00010282 [ 98.545464] RAX: 0000000000000001 RBX: 00000000f20000d1 RCX: 0000000000000000 [ 98.545481] RDX: 0000000000000000 RSI: 00000000f20000d1 RDI: ffffffff83ed21ca [ 98.545498] RBP: ffff8801551bf200 R08: 0000000000000000 R09: 0000000000000000 [ 98.545516] R10: ffff88015709c040 R11: 0000000180400038 R12: ffffffffffffffff [ 98.545532] R13: 0000000000000000 R14: 00000000f20000d1 R15: 0000000000000000 [ 98.545555] FS: 00007fcf32251700(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 98.545573] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 98.545589] CR2: 0000000000000000 CR3: 00000001642a2000 CR4: 00000000001406e0 [ 98.545607] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 98.545622] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 98.545631] Call Trace: [ 98.545731] tipc_nametbl_unsubscribe+0x4a1/0xa90 [ 98.545822] ? tipc_subscrb_release_cb+0x61/0x100 [ 98.641360] tipc_subscrb_subscrp_delete+0x399/0x990 [ 98.646529] ? __msan_poison_alloca+0x15c/0x1d0 [ 98.651237] tipc_subscrb_release_cb+0x61/0x100 [ 98.656296] tipc_topsrv_kern_unsubscr+0x54b/0x630 [ 98.661307] ? tipc_subscrb_connect_cb+0x270/0x270 [ 98.666373] tipc_group_delete+0x4c8/0x520 [ 98.670731] ? tipc_group_self+0x16a/0x260 [ 98.675011] tipc_release+0x215/0x1730 [ 98.678976] ? fsnotify+0x493/0x18f0 [ 98.682777] ? __fsnotify_parent+0x132/0x560 [ 98.687278] ? tipc_sock_destruct+0x3b0/0x3b0 [ 98.691869] sock_close+0xe0/0x300 [ 98.695473] __fput+0x49e/0xa10 [ 98.698856] ____fput+0x37/0x40 [ 98.702191] ? fput+0x2e0/0x2e0 [ 98.705506] task_work_run+0x243/0x2c0 [ 98.709440] do_exit+0x10e1/0x38d0 [ 98.713065] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 98.718528] ? __dequeue_signal+0x70d/0xb10 [ 98.722881] do_group_exit+0x1a0/0x360 [ 98.726775] get_signal+0x1320/0x1f20 [ 98.730579] ? __msan_poison_alloca+0x15c/0x1d0 [ 98.735251] ? prepare_exit_to_usermode+0x271/0x3a0 [ 98.740267] do_signal+0xb8/0x1c80 [ 98.743826] ? kmsan_write_aligned_origin_inline+0x10/0x60 [ 98.749478] ? kmsan_set_origin_inline+0x6b/0x120 [ 98.754339] ? __msan_poison_alloca+0x15c/0x1d0 [ 98.759060] ? syscall_return_slowpath+0xe9/0x700 [ 98.763924] ? prepare_exit_to_usermode+0x4a/0x3a0 [ 98.768866] ? prepare_exit_to_usermode+0xec/0x3a0 [ 98.773791] prepare_exit_to_usermode+0x271/0x3a0 [ 98.778627] syscall_return_slowpath+0xe9/0x700 [ 98.783334] do_syscall_64+0x36d/0x430 [ 98.787230] ? futex_lock_pi+0x1e60/0x1e60 [ 98.791464] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 98.796644] RIP: 0033:0x455389 [ 98.799829] RSP: 002b:00007fcf32250ce8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 98.807531] RAX: fffffffffffffe00 RBX: 000000000072bec8 RCX: 0000000000455389 [ 98.814798] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000000072bec8 [ 98.822070] RBP: 000000000072bec8 R08: 0000000000000036 R09: 000000000072bea0 [ 98.829329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 98.836587] R13: 0000000000a3e81f R14: 00007fcf322519c0 R15: 0000000000000000 [ 98.843848] Code: 15 4c 89 f8 4c 31 f0 4c 89 e1 48 f7 d1 48 21 c1 0f 84 76 01 00 00 4d 39 f7 0f 84 7e 01 00 00 41 89 de 4d 85 e4 0f 85 01 02 00 00 <4d> 8b 27 4c 89 ff e8 e4 79 cb fd 48 8b 18 44 8b 3a 48 89 d8 48 [ 98.863200] RIP: __list_del_entry_valid+0xd1/0x440 RSP: ffff8801551bf1a8 [ 98.870035] CR2: 0000000000000000 [ 98.873486] ---[ end trace 175d6c5b15b341da ]--- [ 98.878234] Kernel panic - not syncing: Fatal exception in interrupt [ 98.885226] Dumping ftrace buffer: [ 98.888757] (ftrace buffer empty) [ 98.892451] Kernel Offset: disabled [ 98.896068] Rebooting in 86400 seconds..