INIT: Entering runlevel: 2 [info] Using makefile-style concurrent boot in runlevel 2. [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.4' (ECDSA) to the list of known hosts. 2018/05/08 17:37:59 fuzzer started 2018/05/08 17:38:00 dialing manager at 10.128.0.26:45587 syzkaller login: [ 51.889122] can: request_module (can-proto-0) failed. [ 51.900456] can: request_module (can-proto-0) failed. 2018/05/08 17:38:09 kcov=true, comps=false 2018/05/08 17:38:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r0, &(0x7f0000000000)="6c56bc876447583c16eff78ef28da410808cef874ad32cb56c3f8319eac862e561d5e5d2e482df596bbd1fe582215357df8375621599dcde1249c365149772685da18772c45479da8f220489f8f673adb53a2473fe0bc9022d4b98d3a8d824a18c44924fefae90a6a031069d0aa4", 0x6e, 0x2000c040, &(0x7f0000000080)={0xa, 0x4e23, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x50}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f00000000c0)=0x8, 0x4) ioctl$EVIOCSABS2F(r1, 0x401845ef, &(0x7f0000000100)={0x3, 0x9, 0x9, 0x3ff, 0x9}) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000140)={0x205, 0x337b}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x4010640d, &(0x7f0000000180)={0x7fff, 0x40000000}) r2 = add_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000240)="864031926cfd2468d3f27284068f8e6dc28ad32a713a7ce07e4537ae1d2bcefcc56b996e48b7685512466f7372ae893164b6b25a0e0ba32974aa59fb23712d87036347484f48847191bee27d8a4e6a3ddb3438d2c6b8509822ab2d7d6d71c9398d52e97a330c00cc85524569e98a437a2f404f4b904d070bdd8c6d6eee4105433b11d2ff25137d1e937b1072662cd74ab9e3242af49bf6846c7ec5b06a663675ea83293a95d6fd42d0d76d3403feee8bebc21dd78b49866e373ecc4f942c276021b505b4dba5e1aab05293f032e420ff2f2e9b02529c4d4db8cddabb09edd74419145e36459d9b5a83a81309e549", 0xee, 0xfffffffffffffff9) keyctl$describe(0x6, r2, &(0x7f0000000340)=""/149, 0x95) clock_gettime(0x0, &(0x7f0000000400)={0x0, 0x0}) write$sndseq(r1, &(0x7f0000000440)=[{0xffffffff, 0x40100000000, 0xccb, 0x1, @tick=0x1, {0xad, 0x7fff}, {0x100, 0x7}, @time=@time={0x77359400}}, {0x7, 0x2, 0x3, 0x6, @time={0x0, 0x1c9c380}, {0x3, 0x40}, {0x1, 0x7}, @addr={0x3, 0x9}}, {0x101, 0x10a, 0x100, 0x26, @tick=0x4, {0xffffffff, 0xaf4f}, {0x0, 0x200}, @time=@tick=0x7fffffff}, {0x0, 0x1, 0x1, 0x0, @time={0x0, 0x989680}, {0x1ff, 0xbb}, {0xcc1e, 0x6}, @addr={0x4, 0x24557592}}, {0x8, 0xb6c1, 0x4, 0x8, @time={r3, r4+10000000}, {0xf06, 0xff}, {0x9}, @note={0x9, 0xd298, 0xc05, 0x40, 0x1}}, {0x0, 0x4, 0xb1b, 0xffff, @time, {0xe93c, 0x2}, {0x8001, 0x7}, @addr={0x7fffffff, 0x3d}}], 0x120) recvfrom$llc(r1, &(0x7f0000000580)=""/4096, 0x1000, 0x1, &(0x7f0000001580)={0x1a, 0x2, 0x4, 0xfff, 0x0, 0x6, @random="a0411d31090a"}, 0x10) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/audio\x00', 0x102, 0x0) stat(&(0x7f0000001600)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockname(r0, &(0x7f00000016c0)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000001740)=0x80) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000001780)={r8, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) connect(r5, &(0x7f00000017c0)=@hci={0x1f, r8, 0x3}, 0x80) r9 = openat$dir(0xffffffffffffff9c, &(0x7f0000001840)='./file0\x00', 0x20800, 0xc) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r5, 0xc01064b5, &(0x7f00000018c0)={&(0x7f0000001880)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}) fchown(r9, r6, r7) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000001900), &(0x7f0000001940)=0x8) r10 = syz_genetlink_get_family_id$team(&(0x7f00000019c0)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000002340)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000002300)={&(0x7f0000001a00)={0x8d0, r10, 0xa10, 0x70bd27, 0x25dfdbfd, {0x3}, [{{0x8, 0x1, r8}, {0x244, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x4}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x3c, 0x4, [{0x0, 0x0, 0x8e, 0x8}, {0x7, 0x7, 0x3, 0x4}, {0x3f, 0x1ff, 0x1f}, {0x9, 0x400, 0x3d2, 0x5}, {0x7, 0x1, 0x4, 0x80000000}, {0x5, 0x7, 0x81, 0x80000001}, {0x2, 0x3}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4}}, {0x8, 0x7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xfffffffffffffffb}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0xc, 0x4, [{0xf11c, 0xe30, 0x9, 0x80000000}]}}}]}}, {{0x8, 0x1, r8}, {0x100, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x81}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}, {{0x8, 0x1, r8}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}}]}}, {{0x8, 0x1, r8}, {0x104, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}, {0x8, 0x7}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0xfffffffffffffff9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r8}, {0xd4, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x31}}, {0x8, 0x6, r8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0xc, 0x4, 'hash\x00'}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8, 0x3, 0xb}, {0x24, 0x4, [{0xfa1, 0x7, 0x400, 0xffffffffffffff80}, {0xea, 0x5, 0x5, 0x7}, {0x7, 0x0, 0x100, 0xfd}, {0xffffffff8a4732cf, 0x8, 0x7, 0x81}]}}}]}}, {{0x8, 0x1, r8}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}]}}, {{0x8, 0x1, r8}, {0x234, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8, 0x3, 0x6}, {0x4, 0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, r8}}, {0x8, 0x7}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8, 0x3, 0x5}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8, 0x3, 0x3}, {0x8, 0x4, 0x7ff}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8, 0x3, 0xe}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8, 0x3, 0xb}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r8}}}]}}]}, 0x8d0}, 0x1, 0x0, 0x0, 0x40044}, 0x0) connect$inet(r5, &(0x7f0000002380)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r5, 0x84, 0x75, &(0x7f00000023c0)={0x0, 0x2}, &(0x7f0000002400)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000002440)={r11, 0x9}, 0x8) keyctl$assume_authority(0x10, r2) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000002480)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r5, 0x84, 0x72, &(0x7f00000024c0)={r11, 0x4, 0x10}, &(0x7f0000002500)=0xc) 2018/05/08 17:38:13 executing program 7: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x4000, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f0000000040)=0x8001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0x0, 0x3, 0x2, 0x9, 0x3}, 0x14) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f00000000c0)=0x1, 0x4) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) recvfrom$inet6(r0, &(0x7f0000000180)=""/4096, 0x1000, 0x2000, 0x0, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000001180), &(0x7f00000011c0)=0x8) r1 = accept4$nfc_llcp(r0, &(0x7f0000001200), &(0x7f0000001280)=0x60, 0x800) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000012c0)='tls\x00', 0x4) syz_open_dev$amidi(&(0x7f0000001300)='/dev/amidi#\x00', 0x9c0, 0x0) ioctl$sock_SIOCGIFCONF(r1, 0x8910, &(0x7f0000001380)=@req={0x28, &(0x7f0000001340)={'teql0\x00', @ifru_names='yam0\x00'}}) syncfs(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) accept4$inet6(r2, &(0x7f00000013c0)={0x0, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f0000001400)=0x1c, 0x0) r3 = openat(r0, &(0x7f0000001440)='./file0\x00', 0x0, 0x121) r4 = syz_open_dev$amidi(&(0x7f0000001480)='/dev/amidi#\x00', 0x3, 0x200000) ioctl$BLKFRASET(r4, 0x1264, &(0x7f00000014c0)=0xffffffffffff5e28) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001500)='/dev/rtc0\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000001540)={0x0, 0xfffffffffffffff7, 0x0, 0x8, 0x1ff, 0x80000001, 0x3, 0xffff, 0x0}, &(0x7f0000001580)=0x20) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x71, &(0x7f00000015c0)={r7, 0x7fff}, &(0x7f0000001600)=0x8) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000001640)) bind(r6, &(0x7f0000001700)=@rc={0x1f, {0x7, 0x81, 0x7, 0x3, 0x4, 0x1f}, 0x4}, 0x80) socket$nl_generic(0x10, 0x3, 0x10) creat(&(0x7f0000001780)='./file0\x00', 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f00000017c0)={r8, 0x2, 0x20}, 0xc) socket$bt_hidp(0x1f, 0x3, 0x6) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001800)={0x0, 0x3, 0xc2, 0x3}, 0x8) getsockopt$IP_VS_SO_GET_DESTS(r4, 0x0, 0x484, &(0x7f0000001840)=""/122, &(0x7f00000018c0)=0x7a) 2018/05/08 17:38:13 executing program 3: r0 = memfd_create(&(0x7f0000000000)=']+ppp1$/\x00', 0x3) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) r1 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x80) inotify_rm_watch(r0, r1) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000000c0)={'raw\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000140)=0x0) sched_setscheduler(r2, 0x3, &(0x7f0000000180)=0x400) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x8000, 0x0) write$fuse(r0, &(0x7f0000000200)={0x28, 0x1, 0x4, @fuse_notify_inval_inode_out={0xc808, 0x6, 0x7}}, 0x28) setsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000240)=0x5, 0x4) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000280)={0x1000, 0x0}) ioctl$DRM_IOCTL_SG_ALLOC(r0, 0xc0106438, &(0x7f00000002c0)={0x3, r4}) ioctl$DRM_IOCTL_MODE_GETCRTC(r3, 0xc06864a1, &(0x7f0000000340)={&(0x7f0000000300)=[0x859d, 0x7c0], 0x2, 0x0, 0x2, 0x40, 0x18, 0x8, {0x8, 0x7, 0x7f, 0x10000, 0x300, 0x2, 0x9, 0x7, 0x7fffffff, 0xc4, 0x100000000, 0x100000000, 0x8000, 0xfffffffffffffff7, "f7adb2a9d1837cf9e0ad0795e4254a69c5d5200a3a6b1b40c478e2f0e723dd58"}}) r5 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r5) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000003c0)=@assoc_value={0x0, 0x7}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000440)=@assoc_value={r6, 0x1}, &(0x7f0000000480)=0x8) ioctl$DRM_IOCTL_SET_MASTER(r3, 0x641e) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f00000004c0)={0x8}) ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000500)='ip6_vti0\x00') r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000540)='/dev/ppp\x00', 0x20000, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000580)) sysinfo(&(0x7f00000005c0)=""/93) sendmsg(r0, &(0x7f0000001900)={&(0x7f0000000640)=@nfc_llcp={0x27, 0x1, 0x2, 0x3, 0x70b43d82, 0x200, "e6b7518c2ef02d684258a77d8dd316c3c0921cb1e9d1390399b939594b9164ed5a71abd673b301d889f6c39ef5f0cb8ba9c3666941499165d5c9e137f50a0b", 0x5}, 0x80, &(0x7f00000017c0)=[{&(0x7f00000006c0)="6d70d300028cb2dbcb55adcc3136478822c6057d73efac37993238227502aee7f7ed5182b6f8a5d6ce05b8b059d23c6c60a1c92cee2e0b9e2b690617606ca03d784820fde7546ecdd1384912e69468054e5051feb21d7975a20660be58aa1d1fc82f9e14d57d817cb98c70b73aec265ae44b8bbdd6d319d2aad1455e9e1cb4e196df386aae4331d063bf182e7d7b7241828f97e3c5b371bb3fff8734820ad1", 0x9f}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000001780)="66da0391c80c8ba4814c58031eb95e1226", 0x11}], 0x3, &(0x7f0000001800)=[{0xe0, 0x109, 0x8, "609f6198a2d26e0ac81a91ceff5045e6e9791903a6df5b9d2934c9fd299d4eafefc9293acbe48e682c206512d05b2aac520db67d7597734348e81430753b689167f766e84c14ca235c715a1000248add1760e865ed2ecaa5ddf562c206871a6baf7c7b0f35d73be38f3b9c5f91b309b90da42fa0ec16a128bc49d17883181ef01022e9c69ea67a9d6cc3fed774e671d1befe93bb5e6f7d3b0faaad532c47929d6dd44469dd6026757f53468cd9916b733eac9aeabff4ab8b480ffdf7d6ee022720d93ee3e4a6c441b90a734095"}], 0xe0, 0x40040}, 0x44) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000001940)={0xffffffff00000001}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000001980)={r7, 0xfffffffffffffe00}, &(0x7f00000019c0)=0x8) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000001a00)=0x7) write$cgroup_type(r0, &(0x7f0000001a40)='threaded\x00', 0x9) ioctl$EVIOCREVOKE(r8, 0x40044591, &(0x7f0000001a80)=0x8) ioctl$VHOST_SET_OWNER(r8, 0xaf01, 0x0) 2018/05/08 17:38:13 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x501000, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000040)=0x2, &(0x7f0000000080)=0x4) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000100)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x1c) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000180)={r3, 0x20}, 0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000001c0)={r2, @in={{0x2, 0x4e23, @broadcast=0xffffffff}}, 0x0, 0xd}, &(0x7f0000000280)=0x90) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000002c0)='veth0_to_bond\x00') ioctl$BLKTRACESTART(r0, 0x1274, 0x0) r4 = socket$netlink(0x10, 0x3, 0x1) ioctl$KDDISABIO(r1, 0x4b37) getsockopt$sock_buf(r4, 0x1, 0x1a, &(0x7f0000000300)=""/4096, &(0x7f0000001300)=0x1000) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000001340)='/dev/vhost-vsock\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000001380)={0x18000000000}, 0x4) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000013c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000014c0)=0xe8) ioctl$TUNSETOWNER(r1, 0x400454cc, r5) mq_open(&(0x7f0000001500)='ppp0+\x00', 0x840, 0x4, &(0x7f0000001540)={0x9, 0x100000001, 0x7ff, 0x101, 0x0, 0xae8c, 0xc0c, 0x5}) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000001580)={{0x7, 0x4, 0xbc4, 0x400, 0x7fff, 0x5}, 0x2}) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f00000015c0)=0x1, 0x4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000001600)={{0xa, 0x4e24, 0x401, @remote={0xfe, 0x80, [], 0xbb}}, {0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0x1f}, 0x7f}, 0x1ff, [0xa807, 0x7, 0x9, 0x3, 0x6, 0x1, 0x1, 0x202]}, 0x5c) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000001680)={0x20, 0x1}) ioctl$KDADDIO(r0, 0x4b34, 0x6) lseek(r0, 0x0, 0x34307ff55b075f8f) chmod(&(0x7f00000016c0)='./file0\x00', 0x58) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000001700)=0x7fff, 0x4) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000001740), 0x4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001780)={0x0, r0, 0x1}, 0x14) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f00000017c0)=""/151) getresgid(&(0x7f00000018c0)=0x0, &(0x7f0000001900), &(0x7f0000001940)) syz_fuse_mount(&(0x7f0000001880)='./file0\x00', 0x1, r5, r6, 0xb5, 0x40) pread64(r4, &(0x7f0000001980)=""/173, 0xad, 0x0) 2018/05/08 17:38:13 executing program 1: r0 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, @broadcast}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000080)=0x8, 0x4) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x100000000, 0x3, 0x0, 0xb3c, 0x3, 0x3, 0x800, 0x16c, 0x40, 0x31c, 0x80, 0x1, 0x38, 0x2, 0xe49e, 0x0, 0x400}, [{0x5, 0x3, 0x3, 0x7fff, 0x1, 0x4000000000000000, 0x7fff, 0x3ff}], "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", [[]]}, 0x276) io_setup(0x4, &(0x7f0000000340)=0x0) r2 = dup(r0) io_submit(r1, 0x1, &(0x7f0000000480)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x8, 0x3, r0, &(0x7f0000000380)="e4980f791e0071a529621ecf6e27bbc5c1fdcc595cb518b51d2b6a172209e05703a909e78a227384c98f26d6d5f4eeeb1a5cbf269718b4d6eef371dc041527a2ebaf3898fa8cad5af55f11c31a94670dabaf3d64f475015f5df15a3588ff87240b58e6fad4d3b034d73386fcc293fb93fb59ae0d2bfc4e6195b5821469fda87a716944138b372472219c3065f46a80ea806a8bf6", 0x94, 0x63, 0x0, 0x1, r2}]) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000004c0)={0x0, 0x17, 0x0, 0x19c, 0x7fff, 0x6, 0x101, 0x6, {0x0, @in={{0x2, 0x4e20, @broadcast=0xffffffff}}, 0xffffffffffff7fff, 0x4, 0x80000001, 0x872, 0x1ff}}, &(0x7f0000000580)=0xb0) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f00000005c0)={r3, 0x17e, 0x10000, 0x12000000000}, 0x10) setsockopt$inet6_dccp_int(r2, 0x21, 0x15, &(0x7f0000000600)=0x8, 0x4) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000640)={r4, 0x7}, &(0x7f0000000680)=0x8) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000006c0)=0xf4, 0x4) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r2) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000700)={r4, 0x8}, 0x8) r6 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000740)='/dev/urandom\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000780)=@assoc_value={0x0}, &(0x7f00000007c0)=0x8) getpeername$netrom(r2, &(0x7f0000000800), &(0x7f0000000840)=0x10) clock_gettime(0x7, &(0x7f0000000880)) accept(r2, &(0x7f00000008c0)=@pppoe={0x0, 0x0, {0x0, @remote}}, &(0x7f0000000940)=0x80) ioctl$TUNSETTXFILTER(r6, 0x400454d1, &(0x7f0000000980)={0x1, 0x3, [@remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}, @remote={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xbb}]}) readv(r0, &(0x7f0000000e00)=[{&(0x7f00000009c0)=""/191, 0xbf}, {&(0x7f0000000a80)=""/252, 0xfc}, {&(0x7f0000000b80)=""/90, 0x5a}, {&(0x7f0000000c00)=""/244, 0xf4}, {&(0x7f0000000d00)=""/31, 0x1f}, {&(0x7f0000000d40)=""/155, 0x9b}], 0x6) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000e80)={r5, 0x1, 0x2, 0x8, 0xfaa6, 0xfffffffffffffffc, 0x0, 0x7, {r7, @in6={{0xa, 0x4e22, 0x2, @ipv4={[], [0xff, 0xff], @rand_addr=0x7}, 0x4}}, 0x7ab, 0xc9f0, 0x200, 0x7, 0x4}}, &(0x7f0000000f40)=0xb0) flistxattr(r6, &(0x7f0000000f80)=""/242, 0xf2) syz_open_dev$evdev(&(0x7f0000001080)='/dev/input/event#\x00', 0x0, 0x20000) syz_open_dev$loop(&(0x7f00000010c0)='/dev/loop#\x00', 0x0, 0x80000) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, &(0x7f0000001100)={r4, 0xffffffff}, 0x8) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000001140)=0x1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r6, 0x800443d3, &(0x7f0000001180)={{0x133, 0x7, 0x100000001, 0x0, 0x10001, 0xffffffffffffffe0}, 0x80000000, 0x1, 0x8}) getsockopt$ax25_int(r2, 0x101, 0xf, &(0x7f00000011c0), &(0x7f0000001200)=0x4) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r2, 0x800455d1, &(0x7f0000001240)=""/234) getsockopt$inet6_int(r6, 0x29, 0x50, &(0x7f0000001340), &(0x7f0000001380)=0x4) 2018/05/08 17:38:13 executing program 2: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000000)={0x0, @in6={{0xa, 0x4e21, 0x6, @remote={0xfe, 0x80, [], 0xbb}, 0x8}}, 0x6, 0x4}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000100)={r1}, &(0x7f0000000140)=0x8) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000180)=""/162) write(r0, &(0x7f0000000240)="65311a847ecf1d6a226e95dcbd58191dac7ac509471aeafcbf480e5dc4133baa9960da6f59df2e276d9f1a3682c7dc8c7c991e2d22ea65b53bf6af5c8af0ad59dfa877aff6e8d0b5b858a4fcfa343f6daf5fa6c224cc6520fb129c2c4f49c3acc01f92f75f6c45948fdf93e379182bdb148097a5a08754302fce5c8cf84bc0135dc3d5a27624362a14913fdcb455dfb4a47786f64231530813fb49092b602183826cd83900313a6de0e07738beb4ad2482e18f21de41f37cc6c045c372d586548cc262b79aec62b765692312123ab528b5026f6fd5334e25b459ca96ab6d6300e0", 0xe1) r2 = accept$packet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000380)=0x14) sendmsg$key(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x2, 0xa, 0x1, 0xf, 0x2, 0x0, 0x70bd2b, 0x25dfdbfc}, 0x10}, 0x1}, 0x4000000) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000480)={0xfff, 0x6}) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f00000004c0)=""/73) fcntl$getownex(r0, 0x10, &(0x7f0000000540)={0x0, 0x0}) waitid(0x3, r4, &(0x7f0000000580), 0x100000c, &(0x7f00000005c0)) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000680)={'mangle\x00', 0xb6, "22989d0876810a2be0ef147c4737c4ab7f8ded1b037111660303c8163a657d28d85d8bb90d8d1e5696a01071f32eed4d49014856af0d6dbc548cb83c1dbeca90ab470083fb3e3bfdbfc2f32aac79500348fe3882f3d9e77cbf5eae602cd6b675585d82c6a2c7328ca63d956d2bb65a571020bf8d065442ce4b42ff78720a7eb6ab2f3fbb608493b804b79cc16f73aa4cafcb552e0d733312023b69122de027dba156f6d1c27068b881c3a6c6674064e6b97f5ed71afd"}, &(0x7f0000000780)=0xda) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f00000007c0)={0x1f}, 0x4) read$eventfd(r0, &(0x7f0000000800), 0x8) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000840)={0x2, 0x7ff, 0x0, 0xfffffffffffffff8, 0x1}, 0x14) ioctl$int_out(r0, 0x2, &(0x7f0000000880)) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000008c0)={'team0\x00', r3}) socketpair$inet_sctp(0x2, 0x5, 0x84, &(0x7f0000000900)={0xffffffffffffffff}) read$eventfd(r0, &(0x7f0000000940), 0x8) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000980)) accept$unix(r0, &(0x7f00000009c0), &(0x7f0000000a40)=0x6e) accept4$netrom(r0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x10, 0x800) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000b00)={0x6, 0xffffffffffffffff, 0x8208, 0x6, 0x400, 0x101, 0xc71f, 0x8ae, r1}, &(0x7f0000000b40)=0x20) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000b80)={'team0\x00', {0x2, 0x4e23, @loopback=0x7f000001}}) getsockopt$inet_mreqsrc(r5, 0x0, 0x27, &(0x7f0000000bc0)={@remote, @rand_addr, @loopback}, &(0x7f0000000c00)=0xc) ioctl$sock_inet_tcp_SIOCINQ(r6, 0x541b, &(0x7f0000000c40)) r7 = msgget$private(0x0, 0x600) msgctl$IPC_INFO(r7, 0x3, &(0x7f0000000c80)=""/253) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000f00)={0x3f, 0xa6a, 0xfffffffffffffffc, 0x5a, &(0x7f0000000d80)=""/90, 0x35, &(0x7f0000000e00)=""/53, 0x92, &(0x7f0000000e40)=""/146}) 2018/05/08 17:38:13 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4100, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x3) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2800, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x101000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000100)={{0x1, 0x9, 0xfffffffffffffeff, 0x26, 0x86e0, 0x7fffffff}, 0x1000, 0x5, 0x8, 0x800, 0x3, "717dd3d56b652c6490778bcc536878a5cc9925b3704c926ad12d8a2a9c2299e14645fc18490e9deee113edc0b6c8588ec83b6b78af4fda87f4cc9c1a43c4e47bd87100c52b3643d34e89df3a517825bebcc46304ca9799733ac9bee5face50a891cd6f59bde191210dd8ec01c2617998da4a1cbe49a0b895a825dab823c9d242"}) r3 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x2, 0x4000) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000200)) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000240)=0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e20, 0x5329, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x1c}}, 0x71cc}, &(0x7f0000000340)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000380)={0x7, 0x2, 0x8, 0x2, 0x1, 0x9, 0x3, 0x121eeef9, r4}, &(0x7f00000003c0)=0x20) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f0000000400)=@generic={0x401, 0x580c, 0x4}) bind$inet6(r2, &(0x7f0000000440)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, [], 0x17}, 0x7fff}, 0x1c) fcntl$setlease(r1, 0x400, 0x2) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x7, 0x9258}, &(0x7f0000000580)=0x90) ioctl$KIOCSOUND(r2, 0x4b2f, 0xb124) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000005c0)=0x3518) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000640)={r4, 0x5, 0x4, 0x49}, 0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000680)={r4, @in6={{0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0xf}, 0x6}}}, 0x84) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000740)='vegas\x00', 0x6) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000780)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x2}) ioctl$KDSKBLED(r2, 0x4b65, 0x2) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f00000007c0)=0x6, &(0x7f0000000800)=0x2) getsockname$unix(r0, &(0x7f0000000840)=@abs, &(0x7f00000008c0)=0x6e) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000900)={0x7, {0x2, 0x4e22, @loopback=0x7f000001}, {0x2, 0x4e21, @rand_addr=0x1ff}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x1, 0x4, 0x7fff, 0x9, 0x0, 0x0, 0x4, 0x0, 0xd5}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000980)={r4, @in6={{0xa, 0x4e24, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x8}}, 0x7, 0x7, 0x7, 0x3, 0x84}, &(0x7f0000000a40)=0x98) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x13, r2, 0x0) 2018/05/08 17:38:13 executing program 6: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x2, 0x40c000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000040)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@dev}}, &(0x7f0000000140)=0xe8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)={0x0, 0x6, 0x9, [0x0, 0x40, 0x0, 0x8000, 0x3f, 0x5, 0x0, 0x3ff, 0x9]}, &(0x7f00000001c0)=0x1a) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000002c0)={r2, 0xc0, &(0x7f0000000200)=[@in={0x2, 0x4e21, @loopback=0x7f000001}, @in6={0xa, 0x4e20, 0x3, @empty, 0x9}, @in={0x2, 0x4e23, @rand_addr=0x9}, @in6={0xa, 0x4e20, 0xc0000000, @loopback={0x0, 0x1}, 0x9}, @in6={0xa, 0x4e24, 0x1, @local={0xfe, 0x80, [], 0xaa}, 0x7a}, @in6={0xa, 0x4e22, 0x2, @mcast1={0xff, 0x1, [], 0x1}, 0x6}, @in={0x2, 0x4e20, @broadcast=0xffffffff}, @in={0x2, 0x4e21, @broadcast=0xffffffff}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}]}, &(0x7f0000000300)=0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000380)={0x6, &(0x7f0000000340)=[{0x6e, 0x4, 0x7fffffff, 0x8}, {0x5, 0x5, 0x9, 0x5}, {0x6059, 0x7fff, 0x8, 0x400080000}, {0x8, 0x76f99332, 0x401, 0xff}, {0x1, 0x3ff, 0x5, 0x1337977a}, {0x4, 0x4, 0x7fffffff, 0x5}]}, 0x10) unshare(0x2000000) r3 = memfd_create(&(0x7f00000003c0)='\x00', 0x3) modify_ldt$read(0x0, &(0x7f0000000400)=""/99, 0x63) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000480)={0x1, 0x2, 0x200, 0x3, 0xac, 0x0, 0x9, 0xfffffffffffffffa, r2}, 0x20) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) futimesat(r0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)={{}, {r4, r5/1000+30000}}) r6 = getpid() getpgid(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000580)) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000005c0)='illinois\x00', 0x9) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000600)={@dev={0xfe, 0x80, [], 0xf}, 0x5f, r1}) inotify_init1(0x80000) prctl$seccomp(0x16, 0x2, &(0x7f0000000680)={0x4, &(0x7f0000000640)=[{0xff, 0x7, 0x7, 0xfffffffffffffff7}, {0x80, 0x9, 0x10001, 0x7ff}, {0x86, 0x80000001, 0xffffffffffffeb07, 0x5}, {0xca, 0xb74, 0x5, 0x28}]}) ioctl$sock_inet6_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000006c0)) setsockopt$inet6_udp_encap(r3, 0x11, 0x64, &(0x7f0000000700)=0x4, 0x4) socket$bt_bnep(0x1f, 0x3, 0x4) syz_open_dev$ndb(&(0x7f0000000740)='/dev/nbd#\x00', 0x0, 0x121400) setsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000780)=0x7, 0x1) fcntl$lock(r0, 0x7, &(0x7f00000007c0)={0x0, 0x3, 0x3, 0x8, r6}) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000800)={0x4, 0x2, 0x9, 0x0, 0x3, 0xeac}) ioctl$TIOCNXCL(r3, 0x540d) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r3, 0x80dc5521, &(0x7f0000000840)=""/17) getresgid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)) rt_sigreturn() r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000980)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000000a40)={&(0x7f0000000940)={0x10}, 0xc, &(0x7f0000000a00)={&(0x7f00000009c0)={0x14, r7, 0x100, 0x70bd2a, 0x25dfdbfe, {0xd}}, 0x14}, 0x1, 0x0, 0x0, 0x4004004}, 0x4004044) [ 57.170224] IPVS: ftp: loaded support on port[0] = 21 [ 57.238845] IPVS: ftp: loaded support on port[0] = 21 [ 57.282586] IPVS: ftp: loaded support on port[0] = 21 [ 57.340742] IPVS: ftp: loaded support on port[0] = 21 [ 57.428225] IPVS: ftp: loaded support on port[0] = 21 [ 57.532515] IPVS: ftp: loaded support on port[0] = 21 [ 57.645808] IPVS: ftp: loaded support on port[0] = 21 [ 57.815504] IPVS: ftp: loaded support on port[0] = 21 [ 59.207426] ip (4662) used greatest stack depth: 53944 bytes left [ 60.385126] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.391607] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.424884] device bridge_slave_0 entered promiscuous mode [ 60.466823] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.473368] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.510954] device bridge_slave_0 entered promiscuous mode [ 60.545987] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.552475] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.569327] device bridge_slave_0 entered promiscuous mode [ 60.636901] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.643443] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.671151] device bridge_slave_0 entered promiscuous mode [ 60.688188] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.694655] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.711572] device bridge_slave_1 entered promiscuous mode [ 60.761744] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.768242] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.804445] device bridge_slave_1 entered promiscuous mode [ 60.831846] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.838369] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.859737] device bridge_slave_1 entered promiscuous mode [ 60.914705] bridge0: port 2(bridge_slave_1) entered blocking state [ 60.921224] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.953144] device bridge_slave_1 entered promiscuous mode [ 60.968575] bridge0: port 1(bridge_slave_0) entered blocking state [ 60.975081] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.997375] device bridge_slave_0 entered promiscuous mode [ 61.013674] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.027124] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.033633] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.055373] device bridge_slave_0 entered promiscuous mode [ 61.079558] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.105898] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.123940] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.130454] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.186751] device bridge_slave_1 entered promiscuous mode [ 61.215782] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.227821] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.245699] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.258221] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.299788] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.306283] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.348720] device bridge_slave_1 entered promiscuous mode [ 61.380776] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.387299] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.432352] device bridge_slave_0 entered promiscuous mode [ 61.447919] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.457170] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.512998] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 61.626874] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.634760] bridge0: port 1(bridge_slave_0) entered blocking state [ 61.641244] bridge0: port 1(bridge_slave_0) entered disabled state [ 61.675181] device bridge_slave_0 entered promiscuous mode [ 61.717548] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 61.741130] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.747584] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.768450] device bridge_slave_1 entered promiscuous mode [ 61.873630] bridge0: port 2(bridge_slave_1) entered blocking state [ 61.880133] bridge0: port 2(bridge_slave_1) entered disabled state [ 61.911164] device bridge_slave_1 entered promiscuous mode [ 61.948641] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.961909] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 61.982160] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.047376] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.075646] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.135519] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 62.155230] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.179687] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.191113] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.278827] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.305797] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.340193] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 62.349947] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.429114] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.436799] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.455282] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.525816] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.541392] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.551104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.584946] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.591969] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.638232] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 62.671085] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.678087] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.694563] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.702605] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.760232] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.767212] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.823246] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.830294] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.846052] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.853929] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 62.896248] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 62.907602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 62.928763] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 62.979134] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 62.986174] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.063427] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 63.132478] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.149650] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.202363] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.290093] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 63.395161] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.418648] team0: Port device team_slave_0 added [ 63.450273] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.466831] team0: Port device team_slave_0 added [ 63.475649] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.493177] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.540486] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.559539] team0: Port device team_slave_0 added [ 63.577863] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.609092] team0: Port device team_slave_0 added [ 63.623437] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 63.632975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 63.652701] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.674284] team0: Port device team_slave_1 added [ 63.687386] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.708333] team0: Port device team_slave_1 added [ 63.732578] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.752347] team0: Port device team_slave_0 added [ 63.761997] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.771122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.792095] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 63.801896] team0: Port device team_slave_0 added [ 63.817063] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.848087] team0: Port device team_slave_1 added [ 63.867973] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 63.888314] team0: Port device team_slave_1 added [ 63.906576] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 63.914384] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 63.934080] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 63.966369] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 63.973391] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 63.998203] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.011472] team0: Port device team_slave_1 added [ 64.025053] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.048119] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.068320] team0: Port device team_slave_1 added [ 64.092795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.114954] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.142514] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.152140] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.164899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.173437] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.202290] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.209323] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.219991] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.241539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.270527] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.302654] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.313971] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 64.324179] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.335626] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.351468] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.363348] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.382710] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 64.394221] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 64.409727] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.418997] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.428257] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.444258] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.467157] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.486650] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.494355] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.513557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.527695] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.539255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.552102] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.561829] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.570617] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 64.588773] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.606284] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.629558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.654364] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.668722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 64.678680] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 64.692482] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.699839] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.708688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.724524] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 64.733447] team0: Port device team_slave_0 added [ 64.750819] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.760866] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.768780] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.776652] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 64.789199] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 64.827786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.854273] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.883727] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.907628] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.921634] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 64.929214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 64.937819] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 64.953794] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 64.965535] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 64.985276] team0: Port device team_slave_1 added [ 64.991531] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.001015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.026356] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.050763] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.064066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.088922] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.105161] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.116781] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.126630] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 65.135101] team0: Port device team_slave_0 added [ 65.146150] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.153580] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.178981] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.218917] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 65.231365] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.238558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 65.266680] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 65.293903] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.320137] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.390885] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 65.422103] team0: Port device team_slave_1 added [ 65.462941] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.469943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.487226] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.671144] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 65.678569] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 65.692184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 65.733395] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 65.740754] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 65.755314] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 65.942752] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 65.949753] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 65.965462] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 65.992870] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.000315] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.028295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 66.190947] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 66.198590] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 66.212776] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 66.444169] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 66.451618] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 66.463438] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 67.456430] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.462934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.469830] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.476289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.549602] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.559583] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 67.585855] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.592334] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.599242] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.605660] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.622117] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.645268] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.651720] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.658571] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.665069] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.736132] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.743473] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.749919] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.756752] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.763256] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.772164] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.796542] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.803007] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.809900] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.816342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.882861] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 67.910598] bridge0: port 2(bridge_slave_1) entered blocking state [ 67.917117] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.923963] bridge0: port 1(bridge_slave_0) entered blocking state [ 67.930418] bridge0: port 1(bridge_slave_0) entered forwarding state [ 67.976971] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.575963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.588206] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.606887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.619840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.631806] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 68.646014] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.652487] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.659336] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.665770] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.673631] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 68.932655] bridge0: port 2(bridge_slave_1) entered blocking state [ 68.939145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 68.946056] bridge0: port 1(bridge_slave_0) entered blocking state [ 68.952506] bridge0: port 1(bridge_slave_0) entered forwarding state [ 68.991818] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 69.599773] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 69.617887] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 76.401692] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.628604] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.660075] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.678560] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.704300] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.894564] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.230986] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.375802] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.409525] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.538546] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.558388] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.585599] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.635883] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 77.770653] 8021q: adding VLAN 0 to HW filter on device bond0 [ 77.994579] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.001004] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.011233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.174675] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.181452] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.193852] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.241998] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.249722] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.258367] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.320648] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.469443] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.475724] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.483282] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.502540] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.509386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.535692] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.577797] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 78.586633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 78.600937] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 78.803005] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 78.836324] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.012506] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.105563] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.246797] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.253138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.261870] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 79.298852] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.360503] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.393823] 8021q: adding VLAN 0 to HW filter on device team0 [ 79.666538] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 79.672860] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 79.697774] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 80.050614] 8021q: adding VLAN 0 to HW filter on device team0 [ 80.570279] 8021q: adding VLAN 0 to HW filter on device team0 2018/05/08 17:38:41 executing program 1: r0 = socket$inet(0x2, 0x3, 0xfb) setsockopt$inet_mreq(r0, 0x0, 0x3, &(0x7f0000000040)={@loopback=0x7f000001}, 0x8) 2018/05/08 17:38:41 executing program 7: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r1) 2018/05/08 17:38:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00008f6ff9)='mounts\x00') fcntl$setlease(r0, 0x400, 0x1) 2018/05/08 17:38:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) r1 = inotify_init1(0x0) r2 = open(&(0x7f0000fa3000)='./file0\x00', 0x0, 0x0) dup2(r1, r2) 2018/05/08 17:38:41 executing program 7: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$describe(0x6, r0, &(0x7f0000000080)=""/238, 0xee) 2018/05/08 17:38:41 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7001, &(0x7f0000000000)) 2018/05/08 17:38:41 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000000000)={0x14, 0x0, 0x1, 0xffffffffffffffff}, 0x14}, 0x1}, 0x0) 2018/05/08 17:38:41 executing program 7: exit(0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_pid(r1, &(0x7f0000000580)=ANY=[], 0xfffffce5) fallocate(r1, 0x0, 0x0, 0x8) open(&(0x7f00000003c0)='./file0\x00', 0x200, 0x0) 2018/05/08 17:38:42 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x400000000000007, &(0x7f0000000200)={0x422470}, &(0x7f0000000240), 0x8, &(0x7f0000000280)) memfd_create(&(0x7f0000000080)='comm\x00', 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') 2018/05/08 17:38:42 executing program 4: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000001aff8)={0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000016ffc), 0x4) recvmsg(r1, &(0x7f0000000180)={0x0, 0x5c8, &(0x7f0000011000), 0x0, &(0x7f00000001c0)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) sendto$inet(r0, &(0x7f0000000340)='V', 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 2018/05/08 17:38:42 executing program 1: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000ed4000), 0x4) mkdir(&(0x7f0000cb3ff8)='./file0\x00', 0x0) mount(&(0x7f00005b9ff8)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x1000, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') symlink(&(0x7f0000ed6ffe)='..', &(0x7f0000000140)='../file0\x00') umount2(&(0x7f0000000000)='../file0\x00', 0x2) 2018/05/08 17:38:42 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)="59b0fd00ce78d665089e909116eb90e9", 0x10}], 0x1, &(0x7f0000001700), 0x0, 0x4}, 0x80) 2018/05/08 17:38:42 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)="59b0fd00ce78d665089e909116eb90e9", 0x10}], 0x1, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:42 executing program 6: exit(0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_pid(r1, &(0x7f0000000580)=ANY=[], 0xfffffce5) fallocate(r1, 0x3, 0x0, 0x8) open(&(0x7f00000003c0)='./file0\x00', 0x200, 0x0) 2018/05/08 17:38:42 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f000039c000)=0x400000000000001, 0x1ba) sendto$inet(r0, &(0x7f0000000240), 0x0, 0x800000020000000, &(0x7f0000000300)={0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}, 0x10) 2018/05/08 17:38:42 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rtc\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x7001, &(0x7f0000000000)) 2018/05/08 17:38:42 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)="59b0fd00ce78d665089e909116eb90e9", 0x10}], 0x1, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:42 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) 2018/05/08 17:38:42 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000002c0)="72616d667300bbc5a8a158c27467d9e1b53ce400e20399bd908d0483de95bbc916e17b0cc90852814e5607acbfbe05e0fefa12ed9ac83cfef95e7d672dbf3da0a97ced10c0b77a15237c74dca9f536c84c5ae51f55c80301203079c1410b9b1b2514ca1f59ce7e94c1ec81fc509cc6f3497c54ec14a07b8cc9a4c3c5ad531fe9d9a3f3eb84dc802c394d88c41737b7104d60b56ddb2681420527e84852b59177fc12c2e4d7b0cdec4a5028e635696c2c8f205a6ddb074f61", 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:42 executing program 1: syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) 2018/05/08 17:38:43 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) 2018/05/08 17:38:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000080)={{0x2, 0x0, @broadcast=0xffffffff}, {0x0, @local={[0xaa, 0xaa, 0xaa, 0xaa, 0xaa], 0xaa}}, 0x48, {0x2}, 'syz_tun\x00'}) 2018/05/08 17:38:43 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000040)={&(0x7f0000000080)={0x10}, 0xc, &(0x7f0000403000)={&(0x7f0000000000)={0x14, 0x3, 0x1, 0xffffffffffffffff}, 0x14}, 0x1}, 0x0) 2018/05/08 17:38:43 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigaction(0x400000000000007, &(0x7f0000000200)={0x422470}, &(0x7f0000000240), 0x8, &(0x7f0000000280)) memfd_create(&(0x7f0000000080)='comm\x00', 0x0) mmap(&(0x7f0000000000/0x95c000)=nil, 0x95c000, 0x4, 0x44031, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='comm\x00') 2018/05/08 17:38:43 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) fcntl$getown(r0, 0x9) 2018/05/08 17:38:43 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000c07e98)=ANY=[@ANYBLOB="38010000100013070000000000000000fe80000000000000010000800000000000000000000000000000ffffac14ffaa00000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000480001006d64350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3}, 0x1}, 0x0) 2018/05/08 17:38:43 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000dcc000)='/dev/snd/seq\x00', 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/28, 0xfffffffffffffde8) openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000200)='cgroup.type\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000418f50)={{0x80}, "0a4ceaa05d9a00000000000000039b3fd4cec307e8ef3d13eb790ec9c65abaf90d229db692542e5b78f8b29e0a27800f0000000000000009fb42f376589701a4", 0xa9824f69d1376637, 0x10800a}) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(0xffffffffffffffff, 0xc0105303, &(0x7f0000000000)={0x4, 0x7, 0xb3a}) ioctl$TCGETA(0xffffffffffffffff, 0x5405, &(0x7f00000001c0)) fstat(r0, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000002c0)) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000018c0)={&(0x7f0000000280)={0x10}, 0xc, &(0x7f0000001880)={&(0x7f0000000300)={0x180, 0x0, 0x0, 0x0, 0x0, 0x25dfdbfd, {0x7, 0x0, 0x3}, [@nested={0x168, 0x6, [@generic="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"]}, @nested={0x4}]}, 0x180}, 0x1}, 0x0) 2018/05/08 17:38:43 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)="59b0fd00ce78d665089e909116eb90e9", 0x10}], 0x1, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:44 executing program 3: r0 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1}}, 0x1c) 2018/05/08 17:38:44 executing program 0: removexattr(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)=@random={'user.', '(ppp1\x00'}) 2018/05/08 17:38:44 executing program 2: exit(0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_pid(r1, &(0x7f0000000580)=ANY=[], 0xfffffce5) fallocate(r1, 0x0, 0x0, 0x8) 2018/05/08 17:38:44 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/4096, &(0x7f0000001040)=0x1000) 2018/05/08 17:38:44 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000200)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000140)={0x0, 0x0, 'client1\x00', 0x0, "5cc1584dcd128c8a", "d8f6f6f4000df3aadd038d26c2361eba9b98e11c55eb2601898f45ec9219486b"}) 2018/05/08 17:38:44 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x6) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)="59b0fd00ce78d665089e909116eb90e9", 0x10}], 0x1, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:44 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00008f6ff9)='mounts\x00') fcntl$setlease(r0, 0x400, 0x0) 2018/05/08 17:38:44 executing program 4: request_key(&(0x7f00000010c0)='dns_resolver\x00', &(0x7f0000001100)={0x73, 0x79, 0x7a}, &(0x7f0000001140)="009a752dddc745b1d8719a5b4ced894d3b32095150a0c3a17c17746d0fb2b7ae6be032a956c781e06362df1c8670facdd47b3eeadcf9ff2e775a19e6fd9db890b3a62e8a8e1311ce4ef940fe86c9f42946ceb4a3f665d42d13a3b5c30f16164d1cb08e14dc2683321be4ba6439615885381a990ae14bfcea64de67fe9016c1f9bd001f2b3d5b174934ba774b5aa29d93a261db43a68011331c77fafa3b5967a364152c9148f6c3ee710b7f45903c6b4435756c6e66e9ac7856753d2d785be7bf99eeee80d67a6e0f8f04b34db4db7d58815957f4f459e7497488d544752673cc2cf9ce7524d191ea2b6256dd25cb56bd2e312e69a5e9780a3df511cdb2f2140cd098b9e88de9f13298be6748a42bbabc619478f180d9961685", 0x0) [ 87.136887] IPVS: length: 4096 != 24 2018/05/08 17:38:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/snmp\x00') readv(r0, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/100, 0x64}], 0x1) 2018/05/08 17:38:44 executing program 3: add_key(&(0x7f0000001140)='big_key\x00', &(0x7f0000001180)={0x73, 0x79, 0x7a}, &(0x7f00000011c0)='w', 0x1, 0xfffffffffffffffc) 2018/05/08 17:38:44 executing program 0: 2018/05/08 17:38:44 executing program 1: 2018/05/08 17:38:44 executing program 7: sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)="59b0fd00ce78d665089e909116eb90e9", 0x10}], 0x1, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:44 executing program 4: request_key(&(0x7f00000010c0)='dns_resolver\x00', &(0x7f0000001100)={0x73, 0x79, 0x7a}, &(0x7f0000001140)="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", 0x0) 2018/05/08 17:38:44 executing program 6: 2018/05/08 17:38:44 executing program 5: 2018/05/08 17:38:44 executing program 0: 2018/05/08 17:38:44 executing program 1: 2018/05/08 17:38:45 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)="59b0fd00ce78d665089e909116eb90e9", 0x10}], 0x1, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:45 executing program 5: 2018/05/08 17:38:45 executing program 0: 2018/05/08 17:38:45 executing program 2: 2018/05/08 17:38:45 executing program 1: 2018/05/08 17:38:45 executing program 3: 2018/05/08 17:38:45 executing program 6: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x4e23, @broadcast=0xffffffff}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x20000802, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f000001aff8)={0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000180)={0x0, 0x5c8, &(0x7f0000011000), 0x0, &(0x7f00000001c0)}, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000100)='syz_tun\x00', 0x10) sendto$inet(r0, &(0x7f0000000340)='V', 0x1, 0x0, &(0x7f0000000180)={0x2, 0x0, @multicast1=0xe0000001}, 0x10) 2018/05/08 17:38:45 executing program 4: 2018/05/08 17:38:45 executing program 4: 2018/05/08 17:38:45 executing program 3: 2018/05/08 17:38:45 executing program 0: 2018/05/08 17:38:45 executing program 5: 2018/05/08 17:38:45 executing program 1: 2018/05/08 17:38:45 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)="59b0fd00ce78d665089e909116eb90e9", 0x10}], 0x1, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:45 executing program 2: 2018/05/08 17:38:45 executing program 4: 2018/05/08 17:38:46 executing program 0: 2018/05/08 17:38:46 executing program 5: 2018/05/08 17:38:46 executing program 3: 2018/05/08 17:38:46 executing program 6: 2018/05/08 17:38:46 executing program 2: 2018/05/08 17:38:46 executing program 1: 2018/05/08 17:38:46 executing program 4: 2018/05/08 17:38:46 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:46 executing program 3: 2018/05/08 17:38:46 executing program 5: 2018/05/08 17:38:46 executing program 2: 2018/05/08 17:38:46 executing program 0: 2018/05/08 17:38:46 executing program 1: 2018/05/08 17:38:46 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)}, 0x0) 2018/05/08 17:38:46 executing program 4: 2018/05/08 17:38:46 executing program 6: 2018/05/08 17:38:46 executing program 3: 2018/05/08 17:38:46 executing program 5: 2018/05/08 17:38:46 executing program 2: 2018/05/08 17:38:46 executing program 4: 2018/05/08 17:38:46 executing program 0: 2018/05/08 17:38:46 executing program 1: 2018/05/08 17:38:46 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)}, 0x0) 2018/05/08 17:38:46 executing program 6: 2018/05/08 17:38:46 executing program 5: 2018/05/08 17:38:46 executing program 3: 2018/05/08 17:38:46 executing program 2: 2018/05/08 17:38:46 executing program 3: 2018/05/08 17:38:46 executing program 1: 2018/05/08 17:38:46 executing program 0: 2018/05/08 17:38:46 executing program 4: 2018/05/08 17:38:46 executing program 6: 2018/05/08 17:38:46 executing program 5: 2018/05/08 17:38:46 executing program 7: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)}, 0x0) 2018/05/08 17:38:47 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4)={0x10}, 0xc, &(0x7f0000000000)={&(0x7f0000c07e98)=ANY=[@ANYBLOB="38010000100013070000000000000000fe8000000000000000000000000000ff00000000000000000000ffffac14ffaa00000000000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000033000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000be180000000000000000000000000000000000000000000000000000000000000000000000000000000000008e5e7d73b1f16e1a0000000000000000000000eeff00000000000000000000000000000000000000020001007d00000000000000480001006d6435000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x3}, 0x1}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f00000000c0)=0x14, 0x80000) 2018/05/08 17:38:47 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:47 executing program 1: openat$rtc(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rtc\x00', 0x0, 0x0) mlock(&(0x7f0000000000/0x4000)=nil, 0x4000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 2018/05/08 17:38:47 executing program 4: perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000180)={'syzkaller1\x00', {0x2, 0x0, @remote={0xac, 0x14, 0x14, 0xbb}}}) perf_event_open(&(0x7f0000271000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x800, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x0) 2018/05/08 17:38:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:47 executing program 6: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e23, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x1}, 0x1c) 2018/05/08 17:38:47 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) dup(r0) 2018/05/08 17:38:47 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4100, 0x0) ioctl$KIOCSOUND(r0, 0x4b2f, 0x3) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x2800, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x101000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r0, 0x800448d3, &(0x7f0000000100)={{0x1, 0x9, 0xfffffffffffffeff, 0x26, 0x86e0, 0x7fffffff}, 0x1000, 0x5, 0x8, 0x800, 0x3, "717dd3d56b652c6490778bcc536878a5cc9925b3704c926ad12d8a2a9c2299e14645fc18490e9deee113edc0b6c8588ec83b6b78af4fda87f4cc9c1a43c4e47bd87100c52b3643d34e89df3a517825bebcc46304ca9799733ac9bee5face50a891cd6f59bde191210dd8ec01c2617998da4a1cbe49a0b895a825dab823c9d242"}) r3 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x2, 0x4000) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000200)) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000240)=0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e20, 0x5329, @ipv4={[], [0xff, 0xff], @remote={0xac, 0x14, 0x14, 0xbb}}, 0x1c}}, 0x71cc}, &(0x7f0000000340)=0x90) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000380)={0x7, 0x2, 0x8, 0x2, 0x1, 0x9, 0x3, 0x121eeef9, r4}, &(0x7f00000003c0)=0x20) ioctl$sock_SIOCSIFBR(r3, 0x8941, &(0x7f0000000400)=@generic={0x401, 0x580c, 0x4}) bind$inet6(r2, &(0x7f0000000440)={0xa, 0x4e21, 0xffffffff, @dev={0xfe, 0x80, [], 0x17}, 0x7fff}, 0x1c) fcntl$setlease(r1, 0x400, 0x2) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000480)) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000004c0)={r4, @in={{0x2, 0x4e23, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x7, 0x9258}, &(0x7f0000000580)=0x90) ioctl$KIOCSOUND(r2, 0x4b2f, 0xb124) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000005c0)=0x3518) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000600)) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000640)={r4, 0x5, 0x4, 0x49}, 0x10) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000680)={r4, @in6={{0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0xf}, 0x6}}}, 0x84) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000740)='vegas\x00', 0x6) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000780)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x2}) ioctl$KDSKBLED(r2, 0x4b65, 0x2) getsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f00000007c0)=0x6, &(0x7f0000000800)=0x2) getsockname$unix(r0, &(0x7f0000000840)=@abs, &(0x7f00000008c0)=0x6e) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000900)={0x7, {0x2, 0x4e22, @loopback=0x7f000001}, {0x2, 0x4e21, @rand_addr=0x1ff}, {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x1, 0x4, 0x7fff, 0x9, 0x0, 0x0, 0x4, 0x0, 0xd5}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f0000000980)={r4, @in6={{0xa, 0x4e24, 0x2, @local={0xfe, 0x80, [], 0xaa}, 0x8}}, 0x7, 0x7, 0x7, 0x3, 0x84}, &(0x7f0000000a40)=0x98) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000000, 0x13, r2, 0x0) 2018/05/08 17:38:47 executing program 5: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x4}, &(0x7f00000000c0), &(0x7f0000000100)={0x77359400}) [ 90.228708] FAULT_INJECTION: forcing a failure. [ 90.228708] name failslab, interval 1, probability 0, space 0, times 1 [ 90.240119] CPU: 1 PID: 6856 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 90.246982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 90.256359] Call Trace: [ 90.258988] dump_stack+0x185/0x1d0 [ 90.262658] should_fail+0x87b/0xab0 [ 90.266422] should_failslab+0x279/0x2a0 [ 90.270555] kmem_cache_alloc_node+0x151/0xc70 [ 90.270589] ? __alloc_skb+0x203/0x9f0 [ 90.270666] ? netlink_autobind+0x981/0x9e0 [ 90.270700] __alloc_skb+0x203/0x9f0 [ 90.270750] netlink_sendmsg+0x9a6/0x1310 [ 90.270813] ? netlink_getsockopt+0xc80/0xc80 [ 90.270866] ___sys_sendmsg+0xec0/0x1310 [ 90.270966] ? __fget_light+0x56/0x710 [ 90.303993] ? __fdget+0x4e/0x60 [ 90.307439] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 90.312875] ? __fget_light+0x6b9/0x710 [ 90.316942] SYSC_sendmsg+0x2a3/0x3d0 [ 90.320842] SyS_sendmsg+0x54/0x80 [ 90.324453] do_syscall_64+0x309/0x430 2018/05/08 17:38:47 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="d7", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x1}, 0x1c) listen(r0, 0x43) accept4(r0, &(0x7f0000000140)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x80, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 90.328386] ? ___sys_sendmsg+0x1310/0x1310 [ 90.332747] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 90.337961] RIP: 0033:0x455979 [ 90.341164] RSP: 002b:00007f2d5705bc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 90.348907] RAX: ffffffffffffffda RBX: 00007f2d5705c6d4 RCX: 0000000000455979 [ 90.356199] RDX: 0000000000000000 RSI: 00000000200005c0 RDI: 0000000000000013 [ 90.363495] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 [ 90.370786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 90.378075] R13: 000000000000051a R14: 00000000006fbb10 R15: 0000000000000000 2018/05/08 17:38:48 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt(r2, 0x5, 0x102, &(0x7f0000000080)=""/48, &(0x7f0000000100)=0x30) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000200)={{0xa2, 0x2}, {0x4b9}, 0x3, 0x4, 0xb}) poll(&(0x7f0000000200), 0x0, 0x1000053a) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000440)=0x14) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000002c0)) sendmsg$nl_route_sched(r2, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40020000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@gettfilter={0x4c, 0x2e, 0x800, 0x70bd2c, 0x25dfdbfe, {0x0, r4, {0xe, 0xd}, {0x0, 0x3}, {0xffff}}, [{0x8, 0xb, 0x1000}, {0x8, 0xb, 0x7fffffff}, {0x8, 0xb, 0x7fffffff}, {0x8, 0xb, 0x3}, {0x8, 0xb, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x40000) 2018/05/08 17:38:48 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:48 executing program 3: r0 = socket$nl_generic(0xa, 0x5, 0x84) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000b80)={'bridge0\x00', &(0x7f0000000b40)=@ethtool_ringparam={0x10}}) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000000)) 2018/05/08 17:38:48 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)="6664001a000000") fchdir(r0) lchown(&(0x7f0000000080)='8/file0\x00', 0x0, 0x0) 2018/05/08 17:38:48 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f798007439ed554fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a36dca30d55e4fda59435fe1fd4262d165a6ccb3f75372e1842ce015e10aad2f3479389f8ec7abe08a38776073709fb20b39b17e9fec21147cdd6390442436826385cb97f04dadc3393024b97b203b3e121d3c67c593ee9f0787a405a1d3ec1935bee8a24cb2123e4a0b98b88796b1311ea4c0dc94e61fcf4a1090f4c360818abd0dd134ae391fe99cf200991798d0cc90367c4ee08ae49075dd74dad19937e51e0812cefa80333d3ad38d5cf07a63513") setsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000100)=ANY=[@ANYRES16=r0], 0x1) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0c0583b, &(0x7f0000000080)={0x20030000000000, &(0x7f0000000040)}) 2018/05/08 17:38:48 executing program 4: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f000070c000), &(0x7f0000ca4000)=0x8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={r0}) r2 = getpid() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000540)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000040)={0x444, 0x34, 0x801, 0x70bd2a, 0x25dfdbfc, "", [@nested={0x190, 0x60, [@generic="79d6666614ed4d5540168c00b3290c572330e0b8ff79112baee8690bd686cc4957e381b09b32f285ff3d33dbf30e33ffc5385108fb6a6fd74f0c4a1fb3c697557ec2dac67ba6bd6d164707a3b263a792b20096922c7116c36dcb29099579561308475852fa4621460e8634703fa53e64f4ba8f37078978df808cb1b63093bef1c54be6014bb664a422cc683a4e598d1e5824b1f18a9c4649cc", @typed={0xc, 0x7e, @u64=0x3f}, @generic="98dbf67a2255fde930b3dc27f3ceac00a4b1758c0efe4d74d73ddce468be70acaa30fd5fa54f4ebf117e7f53e1bbc87bb0f7d5c91f374245291ae71e78846f12fa4485761f253f80c68428b0e7ac9be3ead0be1ade03c05f1b6b176db2f7595bd6bf55174f26bfe2293e1141eccfde61de7e464b930a76bc8bdecfcc6484a0f15be4bdfa0b7c32a9162af3c4abfefefab5fb4546b12c08eff246618557546075b0b9ba12e830f891975b3916d5ab99ec25", @generic="743d799318f01981d2819768a55465b5a2805eea6536aef650c094fb72dc6dcfd0b5ba9f9740676b3efce9b3c8f61fa19e922c"]}, @nested={0x2a4, 0x64, [@typed={0x8, 0x5e, @pid=r2}, @generic="9cc82d224098d96bb0f7913532c067a7ba3a5112603f30a133e6dd1ce9e3a7b46182f35182e08504a92dbf14a8714b3269a0b23c60ae4de036f54aa491781aabef8879fa612d380b6ad4701b68b342d4af7f52cd3c9f828bbd2d2f4e1288b6d26c7fcab86354a0a8f57150c4b0fe07378ee696f9d0dbf0e30616766f5cc3c0c9a5c72fa0dc7ba1189b822ff6c63f678b3c91a6a9bdc66fc549c1de5ed81a24fcf5a30e2f6ae37c0d5a50cd5d091789cc0bd32d538bbf975ea684a98e56ec3799a04f7b2b57a51d319392014430baeba33f2c20ae0c85010e86972834f68ef470ee80106d940807c29b02b03ebb4a47", @generic="8e7420616cf21ac2849ff16bf2902aca6110dc1a60e07218737ad5effd5585151e412a88f02c65f618d744b8f5d8e65f78b6061bcf68a8bd5ebd9d75955ee5f441e417cdc786506091643774da8580c22ed194845f3f6bd23c93708985b3768953fa947872ca0aeff7003e4364daafa6f975223a88b23f9a54221cbe885a84e10bd9b6b0c877e5d255b88321abb1", @generic="3b481e9a01628669582b253e71c17b904ed71fc1ca3383a0a87a355162cfc108c5cffc4635497171c60a73fe0fccb4beec322a42987972be805463735f8c61ea7c794ba1c0", @typed={0x8, 0x5b, @fd=r0}, @generic="61a810625f66c9d0ac4687fd262c2a3e2f18397a5bd433f588a96b34c7c1999cf8f908fc8707931bc0f7c121a176a518f2034e53d8594a8a5818fffdfed54e55ad79d08b9946fb6d58a2aaeacac1c18873566214ed6998d9b468b4532e496cc0ba67a910289db986295d550496df76436ce24d813bb64f23eb413ffeeb489ae2cb069c223a6067bd78227ca4ab94926ee323c29b252ac1a5ea1e1501b85ab453dbbc981cb63e06c473e9dd77338eba3cb572a5a5e7fe2ace5314521ac8a6ea95ffd0f7ac2bfbd045d02df93b75"]}]}, 0x444}], 0x1, &(0x7f0000000700)=[@cred={0x20, 0x1, 0x2, r3, r4, r5}], 0x20}, 0x40) 2018/05/08 17:38:48 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4={[], [0xff, 0xff]}}, 0x1c) sendto$inet6(r0, &(0x7f0000000000)="d7", 0x1, 0x0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xbb}, 0x1}, 0x1c) listen(r0, 0x43) accept4(r0, &(0x7f0000000140)=@ll={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000040)=0x80, 0x0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback={0x0, 0x1}}, 0x1c) [ 91.365419] FAULT_INJECTION: forcing a failure. [ 91.365419] name failslab, interval 1, probability 0, space 0, times 0 [ 91.376779] CPU: 0 PID: 6891 Comm: syz-executor2 Not tainted 4.16.0+ #87 [ 91.383638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 91.393007] Call Trace: [ 91.395637] dump_stack+0x185/0x1d0 [ 91.399300] should_fail+0x87b/0xab0 [ 91.403057] should_failslab+0x279/0x2a0 [ 91.407212] __kmalloc_node_track_caller+0x243/0x11c0 [ 91.412485] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 91.417887] ? netlink_sendmsg+0x9a6/0x1310 [ 91.422262] __alloc_skb+0x2cf/0x9f0 [ 91.426046] ? netlink_sendmsg+0x9a6/0x1310 [ 91.430412] netlink_sendmsg+0x9a6/0x1310 [ 91.434628] ? netlink_getsockopt+0xc80/0xc80 [ 91.439194] ___sys_sendmsg+0xec0/0x1310 [ 91.443363] ? __fget_light+0x56/0x710 [ 91.447316] ? __fdget+0x4e/0x60 [ 91.450766] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 91.456193] ? __fget_light+0x6b9/0x710 [ 91.460253] SYSC_sendmsg+0x2a3/0x3d0 [ 91.465814] SyS_sendmsg+0x54/0x80 [ 91.469440] do_syscall_64+0x309/0x430 [ 91.473374] ? ___sys_sendmsg+0x1310/0x1310 [ 91.477738] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 91.482955] RIP: 0033:0x455979 [ 91.486162] RSP: 002b:00007f2d5705bc68 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 91.493907] RAX: ffffffffffffffda RBX: 00007f2d5705c6d4 RCX: 0000000000455979 [ 91.501201] RDX: 0000000000000000 RSI: 00000000200005c0 RDI: 0000000000000013 [ 91.508494] RBP: 000000000072bea0 R08: 0000000000000000 R09: 0000000000000000 2018/05/08 17:38:48 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000619ff3)='/dev/snd/seq\x00', 0x0, 0x80001) r1 = epoll_create1(0x0) r2 = accept4(r0, &(0x7f00000000c0)=@sco, &(0x7f0000000140)=0x80, 0x800) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x25, "d08ef7dca6241773b2cfadeba9a7d3e385c33e74418e186cd580648cf134c2d5fb659edd51"}, &(0x7f00000002c0)=0x2d) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={r3, @in={{0x2, 0x4e23}}}, 0x84) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x80000004}) write$sndseq(r0, &(0x7f0000000340), 0x0) epoll_pwait(r1, &(0x7f0000000000)=[{}], 0x1, 0x0, &(0x7f0000000040), 0x8) 2018/05/08 17:38:48 executing program 4: r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$sock_int(r0, 0x1, 0x4000000000000002, &(0x7f0000d11000)=0x3fb, 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) listen(r1, 0x404) listen(r1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000000)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@rand_addr}}, &(0x7f0000000100)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000140)={@local={0xfe, 0x80, [], 0xaa}, 0x25, r2}) 2018/05/08 17:38:48 executing program 6: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000040)) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{}, {0x77359400}}, &(0x7f000000afe0)) [ 91.515791] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000014 [ 91.523086] R13: 000000000000051a R14: 00000000006fbb10 R15: 0000000000000001 2018/05/08 17:38:48 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00004f6000)='/dev/snd/timer\x00', 0x0, 0x0) unshare(0x48000001) madvise(&(0x7f00008e2000/0x2000)=nil, 0x2000, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x2100, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000300)=""/122) clock_settime(0x6, &(0x7f0000000000)) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000080)={0x0, 0x1f, 0x8, 0x7fffffff}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={r3, 0xf1, 0x30}, 0xc) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000180)=[{r2, 0x80}], 0x1, &(0x7f0000000240)={r4, r5+10000000}, &(0x7f0000000280)={0x8}, 0x8) mmap(&(0x7f0000000000/0xd15000)=nil, 0xd15000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000200)) bind$rds(r2, &(0x7f0000000140)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}, 0x10) 2018/05/08 17:38:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:48 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) getxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000b29f57)=@known="73656375726974792e6361706162696c69747900c9bd3012983e02155960196a2a84585f19c1c826172982a8de1ccc06000000ffc9715cef22cee4c673d4388d5e56040000000000000040e4c9ee649a371208309ca436bf919fd9636bfa255ff4b30008f88ecc9c2d812171c401624f0c142fc54f65f49239f27686b37d489e925da19bf31e30eccd92237957661ce8a1568418e6d3d428174f89a11cc821fbf64122a36f6b411c", &(0x7f0000000000)=""/140, 0x8c) 2018/05/08 17:38:48 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d}, 0x10) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x3}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "20f56ba903744bd0"}}, 0x48}, 0x1}, 0x0) close(r0) 2018/05/08 17:38:48 executing program 6: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000100), &(0x7f0000000000)=0xa9) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) getpriority(0x0, r1) r2 = open(&(0x7f0000000080)='./file0\x00', 0x381000, 0x31) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f00000000c0)={0x1, 'syzkaller1\x00', 0x1}, 0x18) 2018/05/08 17:38:49 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d}, 0x10) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x3}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "20f56ba903744bd0"}}, 0x48}, 0x1}, 0x0) close(r0) 2018/05/08 17:38:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:49 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:49 executing program 6: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) userfaultfd(0x800) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x80002) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000013000), &(0x7f0000002000)=0x20) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) close(r0) 2018/05/08 17:38:49 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt(r2, 0x5, 0x102, &(0x7f0000000080)=""/48, &(0x7f0000000100)=0x30) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000200)={{0xa2, 0x2}, {0x4b9}, 0x3, 0x4, 0xb}) poll(&(0x7f0000000200), 0x0, 0x1000053a) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000440)=0x14) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000002c0)) sendmsg$nl_route_sched(r2, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40020000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@gettfilter={0x4c, 0x2e, 0x800, 0x70bd2c, 0x25dfdbfe, {0x0, r4, {0xe, 0xd}, {0x0, 0x3}, {0xffff}}, [{0x8, 0xb, 0x1000}, {0x8, 0xb, 0x7fffffff}, {0x8, 0xb, 0x7fffffff}, {0x8, 0xb, 0x3}, {0x8, 0xb, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x40000) 2018/05/08 17:38:49 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7770bc23a", 0x9) 2018/05/08 17:38:49 executing program 3: socket$inet_icmp(0x2, 0x2, 0x1) r0 = socket$inet6(0xa, 0x1ffffe, 0x7) bind$inet6(r0, &(0x7f00001c1000)={0xa, 0x4e20}, 0x1c) r1 = memfd_create(&(0x7f0000000040)='\x00', 0x1) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x2abd}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0x154}, 0x8) sendto$inet6(r0, &(0x7f0000000000)='W', 0x1, 0x0, &(0x7f0000108fe4)={0xa, 0x4e20, 0x0, @loopback={0x0, 0x1}}, 0x1c) recvmmsg(r0, &(0x7f00000014c0)=[{{&(0x7f0000000cc0)=@hci, 0x80, &(0x7f0000000140)=[{&(0x7f0000000dc0)=""/102, 0x66}], 0x1, &(0x7f0000000e80)=""/14, 0xe}}, {{&(0x7f0000000ec0)=@pppol2tp={0x0, 0x0, {0x0, 0xffffffffffffffff, {0x0, 0x0, @dev}}}, 0x80, &(0x7f0000001380), 0x0, &(0x7f0000001400)=""/191, 0xbf}}], 0x4000000000006f2, 0x10000, &(0x7f0000001640)={0x0, 0x1c9c380}) 2018/05/08 17:38:49 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x202000, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080), 0x4) getsockopt$sock_int(r0, 0x1, 0x12, &(0x7f0000000040), &(0x7f00000000c0)=0x3f) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') 2018/05/08 17:38:49 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d}, 0x10) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x3}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "20f56ba903744bd0"}}, 0x48}, 0x1}, 0x0) close(r0) 2018/05/08 17:38:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x200000000000000) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="10000000000000000000007a68d2747c"], 0x10}, 0x0) 2018/05/08 17:38:49 executing program 3: creat(&(0x7f0000000040)='./file1\x00', 0x0) syz_mount_image$xfs(&(0x7f0000000080)='xfs\x00', &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000000480), 0x801080, &(0x7f00000004c0)={'nouuid,'}) r0 = semget(0x0, 0x4, 0xd) semctl$IPC_INFO(r0, 0x7, 0x3, &(0x7f0000000180)=""/112) quotactl(0x800001ff, &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000000)) 2018/05/08 17:38:49 executing program 0: mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:49 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) r2 = socket(0x1b, 0xe, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000000)={0x20, 0x800, 0x6, 0x8, 0x8, 0x1, 0x7fff}, 0xc) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x2, 0x10001, 0x5, 0xffff}, 0x8) 2018/05/08 17:38:49 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d}, 0x10) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x3}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "20f56ba903744bd0"}}, 0x48}, 0x1}, 0x0) close(r0) 2018/05/08 17:38:49 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7770bc23a", 0x9) 2018/05/08 17:38:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) socketpair(0x0, 0x0, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r2, 0x80000) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000040)={{0x0, 0x0, 0x401, 0x3, 0x7}, 0x3a20dacb, 0x6}) 2018/05/08 17:38:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d}, 0x10) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x3}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "20f56ba903744bd0"}}, 0x48}, 0x1}, 0x0) 2018/05/08 17:38:50 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000a8eff8)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000387000), 0x109) close(r0) dup3(r1, r0, 0x80000) socket$nl_netfilter(0x10, 0x3, 0xc) 2018/05/08 17:38:50 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) r2 = socket(0x1b, 0xe, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000000)={0x20, 0x800, 0x6, 0x8, 0x8, 0x1, 0x7fff}, 0xc) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x2, 0x10001, 0x5, 0xffff}, 0x8) 2018/05/08 17:38:50 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7770bc23a", 0x9) 2018/05/08 17:38:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x5) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="1000000000002300b83c000000000000"], 0x10}, 0x0) 2018/05/08 17:38:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x3}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "20f56ba903744bd0"}}, 0x48}, 0x1}, 0x0) 2018/05/08 17:38:50 executing program 3: unlink(&(0x7f0000000140)='./file0\x00') socketpair$ax25(0x3, 0x0, 0xcf, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x4e21, @rand_addr=0x6}}) keyctl$session_to_parent(0x12) utimensat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{}, {0x77359400}}, 0xa59e2a4fe716a2bf) r1 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100)='keyringlobdev\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, r1, 0x1029400) 2018/05/08 17:38:50 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) r2 = socket(0x1b, 0xe, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000000)={0x20, 0x800, 0x6, 0x8, 0x8, 0x1, 0x7fff}, 0xc) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x2, 0x10001, 0x5, 0xffff}, 0x8) 2018/05/08 17:38:50 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt(r2, 0x5, 0x102, &(0x7f0000000080)=""/48, &(0x7f0000000100)=0x30) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000200)={{0xa2, 0x2}, {0x4b9}, 0x3, 0x4, 0xb}) poll(&(0x7f0000000200), 0x0, 0x1000053a) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000440)=0x14) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000002c0)) sendmsg$nl_route_sched(r2, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40020000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@gettfilter={0x4c, 0x2e, 0x800, 0x70bd2c, 0x25dfdbfe, {0x0, r4, {0xe, 0xd}, {0x0, 0x3}, {0xffff}}, [{0x8, 0xb, 0x1000}, {0x8, 0xb, 0x7fffffff}, {0x8, 0xb, 0x7fffffff}, {0x8, 0xb, 0x3}, {0x8, 0xb, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x40000) 2018/05/08 17:38:50 executing program 6: r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x8) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e22}, 0x10) r1 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) unshare(0x2040600) fadvise64(r1, 0x40000000100002, 0x7, 0x4) 2018/05/08 17:38:50 executing program 0 (fault-call:1 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) [ 93.580156] FAULT_INJECTION: forcing a failure. [ 93.580156] name failslab, interval 1, probability 0, space 0, times 0 [ 93.591649] CPU: 0 PID: 7029 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 93.598511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 93.607891] Call Trace: [ 93.610541] dump_stack+0x185/0x1d0 [ 93.614217] should_fail+0x87b/0xab0 [ 93.618030] should_failslab+0x279/0x2a0 [ 93.622156] __kmalloc_track_caller+0x208/0xcb0 [ 93.626900] ? finish_task_switch+0xfe/0x230 [ 93.631386] ? strndup_user+0x134/0x1f0 [ 93.635410] memdup_user+0x7c/0x200 [ 93.639125] strndup_user+0x134/0x1f0 [ 93.643029] SYSC_mount+0xc4/0x3d0 [ 93.646674] SyS_mount+0x77/0xa0 [ 93.650122] do_syscall_64+0x309/0x430 [ 93.654070] ? put_mnt_ns+0x2f0/0x2f0 [ 93.657915] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 93.663128] RIP: 0033:0x455979 [ 93.666342] RSP: 002b:00007f830b127c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/08 17:38:50 executing program 6: unshare(0x60000000) r0 = socket(0xa, 0x3, 0x5) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="9de96cf0ffb053ecd7000001000000800100000002"]) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x9, 0x9, 0x7, 0x1f, 0x1}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0xeb}, &(0x7f0000000180)=0x8) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000001c0)) ioctl(r0, 0x8916, &(0x7f0000000000)) 2018/05/08 17:38:50 executing program 1: connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d}, 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x3}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "20f56ba903744bd0"}}, 0x48}, 0x1}, 0x0) [ 93.674088] RAX: ffffffffffffffda RBX: 00007f830b1286d4 RCX: 0000000000455979 [ 93.681383] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 93.689042] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 93.696334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 93.703620] R13: 0000000000000440 R14: 00000000006fa6a0 R15: 0000000000000000 [ 93.705267] IPVS: ftp: loaded support on port[0] = 21 2018/05/08 17:38:50 executing program 3: unlink(&(0x7f0000000140)='./file0\x00') socketpair$ax25(0x3, 0x0, 0xcf, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000001c0)={'ip6gre0\x00', {0x2, 0x4e21, @rand_addr=0x6}}) keyctl$session_to_parent(0x12) utimensat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{}, {0x77359400}}, 0xa59e2a4fe716a2bf) r1 = request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000100)='keyringlobdev\x00', 0xfffffffffffffffc) keyctl$set_timeout(0xf, r1, 0x1029400) 2018/05/08 17:38:50 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="100000000000f0ffffffff77f4e066d2"], 0x10}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x60000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000080)={0x7, 0x1, 0x9, 0x1000, 0x2, 0x80}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000100)={{0x80000001, 0x9}, {0x6baa, 0xfff}, 0x101, 0x7, 0xfff}) 2018/05/08 17:38:50 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) r2 = socket(0x1b, 0xe, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000000)={0x20, 0x800, 0x6, 0x8, 0x8, 0x1, 0x7fff}, 0xc) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000040)={0x2, 0x10001, 0x5, 0xffff}, 0x8) 2018/05/08 17:38:50 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7770bc23a", 0x9) 2018/05/08 17:38:50 executing program 0 (fault-call:1 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:50 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(0xffffffffffffffff, &(0x7f0000001ff0)={0x1d}, 0x10) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x3}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "20f56ba903744bd0"}}, 0x48}, 0x1}, 0x0) [ 94.042949] FAULT_INJECTION: forcing a failure. [ 94.042949] name failslab, interval 1, probability 0, space 0, times 0 [ 94.054321] CPU: 0 PID: 7066 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 94.061184] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.070558] Call Trace: [ 94.073187] dump_stack+0x185/0x1d0 [ 94.076863] should_fail+0x87b/0xab0 [ 94.080624] should_failslab+0x279/0x2a0 [ 94.084784] __kmalloc_track_caller+0x208/0xcb0 [ 94.089550] ? strndup_user+0x134/0x1f0 [ 94.093586] ? kmsan_set_origin+0x9e/0x160 [ 94.097887] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 94.103329] memdup_user+0x7c/0x200 [ 94.107058] strndup_user+0x134/0x1f0 [ 94.110963] SYSC_mount+0x193/0x3d0 [ 94.114694] SyS_mount+0x77/0xa0 [ 94.118150] do_syscall_64+0x309/0x430 [ 94.122091] ? put_mnt_ns+0x2f0/0x2f0 [ 94.125937] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 94.131143] RIP: 0033:0x455979 [ 94.134359] RSP: 002b:00007f830b127c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/08 17:38:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) r2 = socket(0x1b, 0xe, 0x20) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000000)={0x20, 0x800, 0x6, 0x8, 0x8, 0x1, 0x7fff}, 0xc) [ 94.142101] RAX: ffffffffffffffda RBX: 00007f830b1286d4 RCX: 0000000000455979 [ 94.149397] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 94.156696] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 94.163993] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 94.171285] R13: 0000000000000440 R14: 00000000006fa6a0 R15: 0000000000000001 2018/05/08 17:38:51 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x3a2, &(0x7f0000000540), 0x0, &(0x7f0000000000)=ANY=[]}, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) write(0xffffffffffffffff, &(0x7f0000000600)="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", 0x1000) 2018/05/08 17:38:51 executing program 6: unshare(0x60000000) r0 = socket(0xa, 0x3, 0x5) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="9de96cf0ffb053ecd7000001000000800100000002"]) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x9, 0x9, 0x7, 0x1f, 0x1}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0xeb}, &(0x7f0000000180)=0x8) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000001c0)) ioctl(r0, 0x8916, &(0x7f0000000000)) 2018/05/08 17:38:51 executing program 3: clock_gettime(0x0, &(0x7f00000004c0)={0x0}) nanosleep(&(0x7f0000000200)={r0}, &(0x7f0000000080)) nanosleep(&(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000280)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) shmdt(0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x100, 0x0) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6174000000cc0fa88b172b4413ce2e1f4a8a0000000000000000000000000000000000"], &(0x7f0000000040)=0x24) 2018/05/08 17:38:51 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d}, 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x3}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "20f56ba903744bd0"}}, 0x48}, 0x1}, 0x0) 2018/05/08 17:38:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) socket(0x1b, 0xe, 0x20) 2018/05/08 17:38:51 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7770bc23a", 0x9) 2018/05/08 17:38:51 executing program 0 (fault-call:1 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:51 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt(r2, 0x5, 0x102, &(0x7f0000000080)=""/48, &(0x7f0000000100)=0x30) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000200)={{0xa2, 0x2}, {0x4b9}, 0x3, 0x4, 0xb}) poll(&(0x7f0000000200), 0x0, 0x1000053a) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000440)=0x14) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000002c0)) sendmsg$nl_route_sched(r2, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40020000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@gettfilter={0x4c, 0x2e, 0x800, 0x70bd2c, 0x25dfdbfe, {0x0, r4, {0xe, 0xd}, {0x0, 0x3}, {0xffff}}, [{0x8, 0xb, 0x1000}, {0x8, 0xb, 0x7fffffff}, {0x8, 0xb, 0x7fffffff}, {0x8, 0xb, 0x3}, {0x8, 0xb, 0x3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x40000) [ 94.582651] FAULT_INJECTION: forcing a failure. [ 94.582651] name failslab, interval 1, probability 0, space 0, times 0 [ 94.594095] CPU: 0 PID: 7092 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 94.600961] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.610339] Call Trace: [ 94.612975] dump_stack+0x185/0x1d0 [ 94.616649] should_fail+0x87b/0xab0 [ 94.620419] should_failslab+0x279/0x2a0 [ 94.624581] __kmalloc+0xc2/0x350 [ 94.628080] ? copy_mount_options+0x91/0x540 [ 94.632525] ? SYSC_mount+0x251/0x3d0 [ 94.636376] copy_mount_options+0x91/0x540 [ 94.640692] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 94.646218] ? strndup_user+0x1a3/0x1f0 [ 94.650275] SYSC_mount+0x251/0x3d0 [ 94.654005] SyS_mount+0x77/0xa0 [ 94.657454] do_syscall_64+0x309/0x430 [ 94.661391] ? put_mnt_ns+0x2f0/0x2f0 [ 94.665234] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 94.670447] RIP: 0033:0x455979 [ 94.673655] RSP: 002b:00007f830b127c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/08 17:38:51 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="10000000000000ff07000000009dff00"], 0x10}, 0x0) 2018/05/08 17:38:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) [ 94.681398] RAX: ffffffffffffffda RBX: 00007f830b1286d4 RCX: 0000000000455979 [ 94.688690] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 94.695988] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 94.703280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 94.710579] R13: 0000000000000440 R14: 00000000006fa6a0 R15: 0000000000000002 2018/05/08 17:38:51 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d}, 0x10) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0x0, 0x0, {}, {0x0, 0x7530}, {0x0, 0x0, 0x0, 0x3}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "20f56ba903744bd0"}}, 0x48}, 0x1}, 0x0) 2018/05/08 17:38:51 executing program 0 (fault-call:1 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:51 executing program 7: bind$alg(0xffffffffffffffff, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7770bc23a", 0x9) 2018/05/08 17:38:51 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x80200, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r0, r1, 0x0, 0x5) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:51 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) [ 94.925766] FAULT_INJECTION: forcing a failure. [ 94.925766] name failslab, interval 1, probability 0, space 0, times 0 [ 94.937250] CPU: 1 PID: 7111 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 94.944122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 94.953503] Call Trace: [ 94.956142] dump_stack+0x185/0x1d0 [ 94.959817] should_fail+0x87b/0xab0 [ 94.963586] should_failslab+0x279/0x2a0 [ 94.967696] kmem_cache_alloc+0x136/0xb90 [ 94.971883] ? getname_flags+0x12a/0xaa0 [ 94.975982] ? kmsan_set_origin_inline+0x6b/0x120 [ 94.980870] getname_flags+0x12a/0xaa0 [ 94.984857] user_path_at_empty+0xbb/0x140 [ 94.989192] do_mount+0x2a4/0x4ed0 [ 94.992815] ? __kmalloc+0x23c/0x350 [ 94.996605] ? copy_mount_options+0x91/0x540 [ 95.001101] SYSC_mount+0x32e/0x3d0 [ 95.004832] SyS_mount+0x77/0xa0 [ 95.008291] do_syscall_64+0x309/0x430 [ 95.012225] ? put_mnt_ns+0x2f0/0x2f0 [ 95.016067] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 95.021281] RIP: 0033:0x455979 2018/05/08 17:38:52 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7770bc23a", 0x9) [ 95.024485] RSP: 002b:00007f830b127c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 95.032227] RAX: ffffffffffffffda RBX: 00007f830b1286d4 RCX: 0000000000455979 [ 95.039518] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 95.046811] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 95.054131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 2018/05/08 17:38:52 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) [ 95.054149] R13: 0000000000000440 R14: 00000000006fa6a0 R15: 0000000000000003 2018/05/08 17:38:52 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000001ff0)={0x1d}, 0x10) sendmsg$can_bcm(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1d}, 0x10, &(0x7f0000000080)={&(0x7f0000000000)={0x5, 0x0, 0x0, {}, {0x0, 0x7530}, {}, 0x1, @can={{}, 0x0, 0x0, 0x0, 0x0, "20f56ba903744bd0"}}, 0x48}, 0x1}, 0x0) 2018/05/08 17:38:52 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7770bc23a", 0x9) 2018/05/08 17:38:52 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000e53423a4206bc674270b0000000000000000000000000000"], 0x10}, 0x0) 2018/05/08 17:38:52 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:52 executing program 0 (fault-call:1 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:52 executing program 6: unshare(0x60000000) r0 = socket(0xa, 0x3, 0x5) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="9de96cf0ffb053ecd7000001000000800100000002"]) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x9, 0x9, 0x7, 0x1f, 0x1}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0xeb}, &(0x7f0000000180)=0x8) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000001c0)) ioctl(r0, 0x8916, &(0x7f0000000000)) 2018/05/08 17:38:52 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x80200, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r0, r1, 0x0, 0x5) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:52 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt(r2, 0x5, 0x102, &(0x7f0000000080)=""/48, &(0x7f0000000100)=0x30) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000200)={{0xa2, 0x2}, {0x4b9}, 0x3, 0x4, 0xb}) poll(&(0x7f0000000200), 0x0, 0x1000053a) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000440)=0x14) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f00000002c0)) [ 95.958199] FAULT_INJECTION: forcing a failure. [ 95.958199] name failslab, interval 1, probability 0, space 0, times 0 [ 95.969618] CPU: 0 PID: 7151 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 95.976480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 95.985852] Call Trace: [ 95.988480] dump_stack+0x185/0x1d0 [ 95.992154] should_fail+0x87b/0xab0 [ 95.995928] should_failslab+0x279/0x2a0 [ 96.000038] kmem_cache_alloc+0x136/0xb90 [ 96.004228] ? alloc_vfsmnt+0x7b/0xcf0 2018/05/08 17:38:53 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:38:53 executing program 4: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r0, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) [ 96.008170] alloc_vfsmnt+0x7b/0xcf0 [ 96.011938] ? get_fs_type+0x30a/0x9c0 [ 96.014758] IPVS: ftp: loaded support on port[0] = 21 [ 96.015901] vfs_kern_mount+0xaf/0x990 [ 96.015993] do_mount+0xca5/0x4ed0 [ 96.016077] ? __kmalloc+0x23c/0x350 [ 96.032394] ? copy_mount_options+0x91/0x540 [ 96.036906] SYSC_mount+0x32e/0x3d0 [ 96.040664] SyS_mount+0x77/0xa0 [ 96.040752] do_syscall_64+0x309/0x430 [ 96.040802] ? put_mnt_ns+0x2f0/0x2f0 [ 96.040841] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 2018/05/08 17:38:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockname$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="10000000000000000000000000000000"], 0x10}, 0x0) [ 96.040862] RIP: 0033:0x455979 [ 96.040878] RSP: 002b:00007f830b127c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 96.040910] RAX: ffffffffffffffda RBX: 00007f830b1286d4 RCX: 0000000000455979 2018/05/08 17:38:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) [ 96.040928] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 96.040945] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 96.040962] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 96.040979] R13: 0000000000000440 R14: 00000000006fa6a0 R15: 0000000000000004 2018/05/08 17:38:53 executing program 4: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r0, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:53 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:38:53 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000040)=@buf={0x3a, &(0x7f0000000000)="28328a06d1b801e9720f6c6c75a315d0d7f8370e670cbfbf2f5baf89174dca678cb821fc6bf80ac89979aff5e219acc1b10d207c3e20f436fb90"}) r1 = dup3(r0, r0, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r2, 0x40, 0x40, 0x2, 0x0, 0x6}, &(0x7f0000000140)=0x14) 2018/05/08 17:38:53 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:53 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x80200, 0x0) socketpair$inet_icmp(0x2, 0x2, 0x1, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r0, r1, 0x0, 0x5) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:53 executing program 0 (fault-call:1 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:53 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt(r2, 0x5, 0x102, &(0x7f0000000080)=""/48, &(0x7f0000000100)=0x30) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000200)={{0xa2, 0x2}, {0x4b9}, 0x3, 0x4, 0xb}) poll(&(0x7f0000000200), 0x0, 0x1000053a) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000440)=0x14) 2018/05/08 17:38:53 executing program 6: unshare(0x60000000) r0 = socket(0xa, 0x3, 0x5) ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000000)=ANY=[@ANYBLOB="9de96cf0ffb053ecd7000001000000800100000002"]) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e20, @local={0xac, 0x14, 0x14, 0xaa}}}, 0x9, 0x9, 0x7, 0x1f, 0x1}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000140)={r1, 0xeb}, &(0x7f0000000180)=0x8) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f00000001c0)) ioctl(r0, 0x8916, &(0x7f0000000000)) [ 96.923306] FAULT_INJECTION: forcing a failure. [ 96.923306] name failslab, interval 1, probability 0, space 0, times 0 [ 96.934661] CPU: 1 PID: 7191 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 96.941523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.950899] Call Trace: [ 96.953531] dump_stack+0x185/0x1d0 [ 96.957210] should_fail+0x87b/0xab0 [ 96.960976] should_failslab+0x279/0x2a0 [ 96.965129] __kmalloc_track_caller+0x208/0xcb0 2018/05/08 17:38:53 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) [ 96.969896] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 96.975393] ? alloc_vfsmnt+0x30d/0xcf0 [ 96.979463] kstrdup_const+0x154/0x270 [ 96.983407] alloc_vfsmnt+0x30d/0xcf0 [ 96.987260] vfs_kern_mount+0xaf/0x990 [ 96.991197] do_mount+0xca5/0x4ed0 [ 96.994824] ? __kmalloc+0x23c/0x350 [ 96.998611] ? copy_mount_options+0x91/0x540 [ 97.003114] SYSC_mount+0x32e/0x3d0 [ 97.006843] SyS_mount+0x77/0xa0 [ 97.010302] do_syscall_64+0x309/0x430 [ 97.014250] ? put_mnt_ns+0x2f0/0x2f0 [ 97.018092] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 2018/05/08 17:38:54 executing program 4: getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r0, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) [ 97.023309] RIP: 0033:0x455979 [ 97.026519] RSP: 002b:00007f830b127c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 97.034269] RAX: ffffffffffffffda RBX: 00007f830b1286d4 RCX: 0000000000455979 [ 97.041565] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 97.048859] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 97.056155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 97.063451] R13: 0000000000000440 R14: 00000000006fa6a0 R15: 0000000000000005 2018/05/08 17:38:54 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7", 0x5) 2018/05/08 17:38:54 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="100000000000f0ffffffff77f4e066d2"], 0x10}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x60000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000080)={0x7, 0x1, 0x9, 0x1000, 0x2, 0x80}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000100)={{0x80000001, 0x9}, {0x6baa, 0xfff}, 0x101, 0x7, 0xfff}) 2018/05/08 17:38:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700), 0x0, 0xfffffffffffffffd}, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x30, 0x2000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0xffff, 0x49, 0x100}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={r2, 0x107, 0x3, 0x920, 0x8, 0x7}, &(0x7f0000000240)=0x14) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_sctp(0xa, 0x1, 0x84) accept$packet(r3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000180)=0x14) recvfrom$packet(r4, &(0x7f0000000040)=""/27, 0x1b, 0x1, &(0x7f00000001c0)={0x11, 0xf8, r5, 0x1, 0x6b, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x14) 2018/05/08 17:38:54 executing program 0 (fault-call:1 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:54 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="100000000000f0ffffffff77f4e066d2"], 0x10}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x60000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000080)={0x7, 0x1, 0x9, 0x1000, 0x2, 0x80}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000100)={{0x80000001, 0x9}, {0x6baa, 0xfff}, 0x101, 0x7, 0xfff}) 2018/05/08 17:38:54 executing program 1: getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:54 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) [ 97.546223] IPVS: ftp: loaded support on port[0] = 21 [ 97.668327] FAULT_INJECTION: forcing a failure. [ 97.668327] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 97.680380] CPU: 1 PID: 7223 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 97.687252] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 97.696627] Call Trace: [ 97.699268] dump_stack+0x185/0x1d0 [ 97.702945] should_fail+0x87b/0xab0 [ 97.706768] __alloc_pages_nodemask+0x5fe/0x5dc0 [ 97.711588] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 97.716995] ? pcpu_block_update_hint_alloc+0xb85/0xcb0 [ 97.722399] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 97.727831] ? pcpu_chunk_relocate+0x1c7/0xa20 [ 97.732456] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 97.737882] ? find_next_bit+0x25b/0x2a0 [ 97.741994] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 97.747394] ? pcpu_alloc+0x1c81/0x2040 [ 97.751416] alloc_pages_current+0x6b5/0x970 [ 97.755919] get_zeroed_page+0x3f/0xd0 [ 97.759899] mount_fs+0xf9/0x780 [ 97.763327] ? alloc_vfsmnt+0x7bb/0xcf0 [ 97.767466] vfs_kern_mount+0x222/0x990 [ 97.771484] do_mount+0xca5/0x4ed0 [ 97.775075] ? __kmalloc+0x23c/0x350 [ 97.778816] ? copy_mount_options+0x91/0x540 [ 97.783260] SYSC_mount+0x32e/0x3d0 [ 97.786956] SyS_mount+0x77/0xa0 [ 97.790352] do_syscall_64+0x309/0x430 [ 97.794253] ? put_mnt_ns+0x2f0/0x2f0 [ 97.798065] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 97.803252] RIP: 0033:0x455979 [ 97.806435] RSP: 002b:00007f830b127c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/05/08 17:38:54 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="100000000000000000000000000000000192389b7d47158fef9213c4823636a97fd1905a9276a0ec11aed3ffd4366069cbb22cff30bc8906a5ba63c737666437d7d885000f1097b826242b560938a3050c071cd1865f9b4f21ec9dd09ea2bc67963e7f5e5b8dfbcdd5d63ba6d8ae0cbeee2e085881da00b158f4ab043e9e675a5478d422dc988f105c61beeb1d13facbf333a12ea77f08"], 0x10}, 0x0) 2018/05/08 17:38:54 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="100000000000f0ffffffff77f4e066d2"], 0x10}, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x60000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r2, 0x4058534c, &(0x7f0000000080)={0x7, 0x1, 0x9, 0x1000, 0x2, 0x80}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000100)={{0x80000001, 0x9}, {0x6baa, 0xfff}, 0x101, 0x7, 0xfff}) 2018/05/08 17:38:54 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:54 executing program 1: getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:54 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:38:54 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:54 executing program 0 (fault-call:1 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) [ 97.814152] RAX: ffffffffffffffda RBX: 00007f830b1286d4 RCX: 0000000000455979 [ 97.821430] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 97.828693] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 97.835961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 97.843225] R13: 0000000000000440 R14: 00000000006fa6a0 R15: 0000000000000006 2018/05/08 17:38:54 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt(r2, 0x5, 0x102, &(0x7f0000000080)=""/48, &(0x7f0000000100)=0x30) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000200)={{0xa2, 0x2}, {0x4b9}, 0x3, 0x4, 0xb}) poll(&(0x7f0000000200), 0x0, 0x1000053a) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x0, 0x0) [ 97.988423] FAULT_INJECTION: forcing a failure. [ 97.988423] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 98.000262] CPU: 1 PID: 7255 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 98.007085] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.016417] Call Trace: [ 98.018998] dump_stack+0x185/0x1d0 [ 98.022616] should_fail+0x87b/0xab0 [ 98.026325] __alloc_pages_nodemask+0x5fe/0x5dc0 [ 98.031071] ? kernel_poison_pages+0x40/0x360 [ 98.035555] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 98.040908] ? kernel_poison_pages+0x1a0/0x360 [ 98.045478] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 98.050915] ? get_page_from_freelist+0xab28/0xb600 [ 98.055924] ? save_stack_trace+0xa5/0xf0 [ 98.060059] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 98.065500] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 98.070854] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 98.076292] ? update_stack_state+0x885/0xa40 [ 98.080779] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 98.086133] kmsan_alloc_meta_for_pages+0x8d/0x3a0 [ 98.091058] ? __save_stack_trace+0x90d/0xb00 [ 98.095544] ? kmsan_set_origin_inline+0x6b/0x120 [ 98.100375] ? __alloc_pages_nodemask+0xae2/0x5dc0 [ 98.105293] kmsan_alloc_page+0x82/0xe0 [ 98.109257] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 98.114000] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 98.119353] ? pcpu_block_update_hint_alloc+0xb85/0xcb0 [ 98.124700] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 98.130045] ? pcpu_chunk_relocate+0x1c7/0xa20 [ 98.134613] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 98.139961] ? find_next_bit+0x25b/0x2a0 [ 98.144012] ? pcpu_alloc+0x1c81/0x2040 [ 98.147977] alloc_pages_current+0x6b5/0x970 [ 98.152371] get_zeroed_page+0x3f/0xd0 [ 98.156245] mount_fs+0xf9/0x780 [ 98.159594] ? alloc_vfsmnt+0x7bb/0xcf0 [ 98.163553] vfs_kern_mount+0x222/0x990 [ 98.167515] do_mount+0xca5/0x4ed0 [ 98.171044] ? __kmalloc+0x23c/0x350 [ 98.174745] ? copy_mount_options+0x91/0x540 [ 98.179144] SYSC_mount+0x32e/0x3d0 [ 98.182760] SyS_mount+0x77/0xa0 [ 98.186113] do_syscall_64+0x309/0x430 [ 98.189987] ? put_mnt_ns+0x2f0/0x2f0 [ 98.193776] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 98.198958] RIP: 0033:0x455979 [ 98.202128] RSP: 002b:00007f830b127c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 98.209822] RAX: ffffffffffffffda RBX: 00007f830b1286d4 RCX: 0000000000455979 [ 98.217074] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 98.224346] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 98.231619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 98.238873] R13: 0000000000000440 R14: 00000000006fa6a0 R15: 0000000000000007 2018/05/08 17:38:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) r1 = socket(0x2, 0x7, 0x1) accept4$packet(r1, 0x0, &(0x7f0000000040), 0x80000) ioctl$sock_netrom_SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000000)) 2018/05/08 17:38:55 executing program 1: getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7", 0x5) 2018/05/08 17:38:55 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:38:55 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:55 executing program 4: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:55 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:55 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7", 0x5) 2018/05/08 17:38:55 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:38:55 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:55 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:55 executing program 0 (fault-call:1 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:55 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:55 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt(r2, 0x5, 0x102, &(0x7f0000000080)=""/48, &(0x7f0000000100)=0x30) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000200)={{0xa2, 0x2}, {0x4b9}, 0x3, 0x4, 0xb}) poll(&(0x7f0000000200), 0x0, 0x1000053a) 2018/05/08 17:38:55 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) pselect6(0x40, &(0x7f00000000c0)={0xa67c, 0x2, 0xffffffffffffff00, 0x1, 0x4ce, 0x4, 0x7, 0x1}, &(0x7f0000000100)={0x1, 0x4fb, 0x81, 0x7, 0x7f, 0xfffffffffffffff7, 0x80000000, 0x6}, &(0x7f0000000140)={0xfff, 0x9, 0x30b1, 0x6, 0x3, 0x70, 0x65, 0x9}, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f0000000200)={&(0x7f00000001c0)={0x9}, 0x8}) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8910, &(0x7f0000000040)=@req={0x28, &(0x7f0000000000)={'ip6_vti0\x00', @ifru_names='syz_tun\x00'}}) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080), 0x10) [ 98.905847] FAULT_INJECTION: forcing a failure. [ 98.905847] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 98.917690] CPU: 0 PID: 7306 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 98.924534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 98.933881] Call Trace: [ 98.936469] dump_stack+0x185/0x1d0 [ 98.940100] should_fail+0x87b/0xab0 [ 98.943821] __alloc_pages_nodemask+0x5fe/0x5dc0 [ 98.948577] ? kernel_poison_pages+0x40/0x360 2018/05/08 17:38:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'ifb0\x00', {0x2, 0x4e22, @rand_addr=0x3a89111}}) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="100000090000f21e0100000000000000"], 0x10}, 0x0) [ 98.953072] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 98.958435] ? kernel_poison_pages+0x1a0/0x360 [ 98.963018] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 98.968472] ? get_page_from_freelist+0xab28/0xb600 [ 98.973488] ? save_stack_trace+0xa5/0xf0 [ 98.977638] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 98.983093] ? entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 98.988453] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 98.993906] ? update_stack_state+0x885/0xa40 [ 98.998404] ? __msan_metadata_ptr_for_load_4+0x10/0x20 2018/05/08 17:38:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7", 0x5) [ 99.003777] kmsan_alloc_meta_for_pages+0x10c/0x3a0 [ 99.008812] ? __save_stack_trace+0x90d/0xb00 [ 99.013317] ? kmsan_set_origin_inline+0x6b/0x120 [ 99.018171] ? __alloc_pages_nodemask+0xae2/0x5dc0 [ 99.023110] kmsan_alloc_page+0x82/0xe0 [ 99.027096] __alloc_pages_nodemask+0xf5b/0x5dc0 [ 99.031863] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 99.037227] ? pcpu_block_update_hint_alloc+0xb85/0xcb0 [ 99.042590] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 99.047951] ? pcpu_chunk_relocate+0x1c7/0xa20 [ 99.052540] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 99.057906] ? find_next_bit+0x25b/0x2a0 [ 99.061974] ? pcpu_alloc+0x1c81/0x2040 [ 99.065953] alloc_pages_current+0x6b5/0x970 [ 99.070362] get_zeroed_page+0x3f/0xd0 [ 99.074252] mount_fs+0xf9/0x780 [ 99.077621] ? alloc_vfsmnt+0x7bb/0xcf0 [ 99.081603] vfs_kern_mount+0x222/0x990 [ 99.085590] do_mount+0xca5/0x4ed0 [ 99.089130] ? msan_get_shadow_origin_ptr+0x55/0x230 [ 99.094242] SYSC_mount+0x32e/0x3d0 [ 99.097876] SyS_mount+0x77/0xa0 [ 99.101246] do_syscall_64+0x309/0x430 2018/05/08 17:38:56 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:56 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) [ 99.105138] ? put_mnt_ns+0x2f0/0x2f0 [ 99.108939] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 99.114125] RIP: 0033:0x455979 [ 99.117314] RSP: 002b:00007f830b127c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 99.125023] RAX: ffffffffffffffda RBX: 00007f830b1286d4 RCX: 0000000000455979 [ 99.132290] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 99.139557] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 99.146828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 2018/05/08 17:38:56 executing program 7: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) [ 99.154093] R13: 0000000000000440 R14: 00000000006fa6a0 R15: 0000000000000008 2018/05/08 17:38:56 executing program 6: bind$alg(0xffffffffffffffff, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:56 executing program 7 (fault-call:2 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:56 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="100000000000000000f56a18166e7eae420369e2b0f0db3bf0a15584de01e3a40c0ad8ca30852046b75776dd6ae75f4f38da8d9a523e0711f3a25a766d77af4a9dbac1d948cd"], 0x10}, 0x0) 2018/05/08 17:38:56 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7", 0x5) 2018/05/08 17:38:56 executing program 1: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) [ 99.527771] FAULT_INJECTION: forcing a failure. [ 99.527771] name failslab, interval 1, probability 0, space 0, times 0 [ 99.539201] CPU: 0 PID: 7343 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 99.546067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 99.555444] Call Trace: [ 99.558079] dump_stack+0x185/0x1d0 [ 99.561763] should_fail+0x87b/0xab0 [ 99.565571] should_failslab+0x279/0x2a0 [ 99.569737] __kmalloc+0xc2/0x350 [ 99.573293] ? __local_bh_enable_ip+0x3b/0x140 [ 99.577961] ? sock_kmalloc+0x14e/0x270 [ 99.582024] sock_kmalloc+0x14e/0x270 [ 99.585878] ? rng_release+0x50/0x50 [ 99.589622] alg_setsockopt+0x452/0x740 [ 99.593679] ? alg_accept+0xd0/0xd0 [ 99.597369] SYSC_setsockopt+0x4b8/0x570 [ 99.601528] SyS_setsockopt+0x76/0xa0 [ 99.605413] do_syscall_64+0x309/0x430 [ 99.609353] ? SYSC_recv+0xe0/0xe0 [ 99.612939] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 99.618152] RIP: 0033:0x455979 [ 99.621359] RSP: 002b:00007fcd31884c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 99.629102] RAX: ffffffffffffffda RBX: 00007fcd318856d4 RCX: 0000000000455979 [ 99.636393] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 99.643684] RBP: 000000000072bea0 R08: 0000000000000001 R09: 0000000000000000 [ 99.650977] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000014 [ 99.658268] R13: 000000000000055f R14: 00000000006fc188 R15: 0000000000000000 2018/05/08 17:38:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:57 executing program 0 (fault-call:1 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:57 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:57 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = accept(r0, &(0x7f0000000400)=@ethernet={0x0, @link_local}, &(0x7f0000000480)=0x4422c1c96dd9012b) r2 = accept4$packet(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x14, 0x80800) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000140)=@hci={0x1f, r3, 0x3}, 0x80, &(0x7f0000000340)=[{&(0x7f00000001c0)="6d00afbef0958033b53be423cabe4eb987d7e26531af4ab5245774f62eddcd4c01e056594238e53d22e2bc9eddc8a4c69332845a0f70d9dce22c6de1ba2550039df1e50df51a9dca66b92cb2f3d2e04010f8a44bb8ed1b889d474e1f62cf8145ff00000000c92efbee15f39050456816c3f2810fd13822790a04db28b1dfd4cb1fa5470f505b166ee585ef632ea11b405e44e5c48da7cf917f", 0x68}, {&(0x7f00000007c0)="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", 0x3fd}], 0x1000000000000343, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x1a8, 0x1}, 0x8000) r4 = fcntl$getown(r2, 0x9) r5 = getpgrp(r4) rt_sigqueueinfo(r5, 0x16, &(0x7f00000003c0)={0x7, 0x401, 0xfffffffffffffbff, 0x8}) r6 = getpgrp(0x0) prctl$getname(0x10, &(0x7f00000004c0)) openat$vnet(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vhost-net\x00', 0x2, 0x0) getpriority(0x0, r6) r7 = syz_open_dev$vcsa(&(0x7f00000004c0)='/dev/vcsa#\x00', 0xb8, 0x200) ioctl$KDSKBSENT(r7, 0x4b49, &(0x7f0000000d40)="cd96a414dcabd4b647140f79956ef56c2da1418ccec3656d7f9bb030bd3136d18649cfddc2488cd4fc2aeba6e7e25d17fe96a57980a9e555886d37be84934548be4a5db1208d55b51c3427cd2fd4d75d4699452f1b0133bc17579bd693a4f0cf9f655574756204490ad331ffb2bf1f910f319f1250f3f24af6ed341a56a20da77f3e3118b50c38f1a6aa91dcd46c98d59a295158f8c37fa4f40065227d210cd53b8bda814da727ddbd99edbf2f06401f910b9e387bc2ec524586570e4167c499f1d2015809117ea5e171273dac38756f517cbb03") sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) socket$netlink(0x10, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f0000000300)={&(0x7f0000000000)=@generic={0x0, "dec0c13b479f3ee35df1302fdd2b7d78e1cde87145919686ae4253d2337d8daf8fddba8547a5daf77eadedc8d45df4f4b8360613d980ac347a1dca9fb98f3aca114149a08f12eed326e39e2cc5bfd1622660f1fb11545a926be0a42d88f646733667af6b42914a6b968b9ea00ccf9e4351fb88c874cf07a860420512c20b"}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000600)="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", 0xfe}, {&(0x7f0000000ac0)="1f4d88f14b1bb7fe112d9be673b5326976d2f2f5fabc1fc3c0a9cf42c5ec51692116813948bcf42d9b6334c945ebeb453c69c554b378d5f88a48d311ac9ac2fe5cccb65c36883b10b9f712b5749db7ae3fadcdb2b854433a0fbf8e9ab418a3e55834cd62323bf0bce8f8e4056b8a9c908790c16a4a07315419575fb0a9e69ef96ad2c960366dc2630e2a716e3e2deb64d4daa22818b3b36ce0a13052082599a457903f8ea87e9cf30412a8e743286d5dc866423da6ee0b3664d2de11889d8bdad8867bc3", 0xc4}, {&(0x7f0000000280)="a642d8482a3b99a60d1dfe973aa7b27e74f895a578b61714457ee4070d0d21c14565bc513ad0915721c42f61f4557760eefb41bec7553bc0c1af08caca61c11f8cace2d3d4f00f201197cb3226099e8096d5c9b0e62b213ec673b3176104", 0x5e}], 0x3, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x150, 0x20000000}, 0x800) 2018/05/08 17:38:57 executing program 3: bind$alg(0xffffffffffffffff, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7", 0x5) 2018/05/08 17:38:57 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:57 executing program 7 (fault-call:2 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:57 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt(r2, 0x5, 0x102, &(0x7f0000000080)=""/48, &(0x7f0000000100)=0x30) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r3, 0x40505330, &(0x7f0000000200)={{0xa2, 0x2}, {0x4b9}, 0x3, 0x4, 0xb}) [ 100.091291] FAULT_INJECTION: forcing a failure. [ 100.091291] name failslab, interval 1, probability 0, space 0, times 0 [ 100.096248] FAULT_INJECTION: forcing a failure. [ 100.096248] name failslab, interval 1, probability 0, space 0, times 0 [ 100.102672] CPU: 1 PID: 7371 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 100.120664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.130023] Call Trace: [ 100.132631] dump_stack+0x185/0x1d0 [ 100.136276] should_fail+0x87b/0xab0 [ 100.140008] should_failslab+0x279/0x2a0 [ 100.144101] __kmalloc+0xc2/0x350 [ 100.147576] ? security_capable+0x1ef/0x220 [ 100.151908] ? kernfs_mount_ns+0xe1/0xdb0 [ 100.156098] kernfs_mount_ns+0xe1/0xdb0 [ 100.160132] sysfs_mount+0x1a3/0x3a0 [ 100.163898] ? sysfs_rename_link_ns+0x3f0/0x3f0 [ 100.168603] mount_fs+0x296/0x780 [ 100.172085] vfs_kern_mount+0x222/0x990 [ 100.176076] do_mount+0xca5/0x4ed0 [ 100.179636] ? copy_mount_options+0x2dd/0x540 [ 100.184186] SYSC_mount+0x32e/0x3d0 [ 100.187881] SyS_mount+0x77/0xa0 [ 100.191302] do_syscall_64+0x309/0x430 [ 100.195212] ? put_mnt_ns+0x2f0/0x2f0 [ 100.199037] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 100.204228] RIP: 0033:0x455979 [ 100.207423] RSP: 002b:00007f830b127c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 100.215142] RAX: ffffffffffffffda RBX: 00007f830b1286d4 RCX: 0000000000455979 [ 100.222417] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 100.229688] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 100.236972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 100.244244] R13: 0000000000000440 R14: 00000000006fa6a0 R15: 0000000000000009 [ 100.251544] CPU: 0 PID: 7363 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 100.258404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.267781] Call Trace: [ 100.270417] dump_stack+0x185/0x1d0 [ 100.274092] should_fail+0x87b/0xab0 [ 100.277858] should_failslab+0x279/0x2a0 [ 100.281973] __kmalloc+0xc2/0x350 [ 100.285519] ? __msan_metadata_ptr_for_load_4+0x10/0x20 2018/05/08 17:38:57 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:57 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) [ 100.290962] ? crypto_create_tfm+0x10a/0x640 [ 100.295438] ? crypto_alg_extsize+0x66/0xc0 [ 100.299836] crypto_create_tfm+0x10a/0x640 [ 100.304114] crypto_alloc_tfm+0x3a9/0x710 [ 100.308305] crypto_alloc_shash+0x99/0xb0 [ 100.312492] drbg_init_hash_kernel+0x87/0x4e0 [ 100.317015] ? _cond_resched+0x3c/0xd0 [ 100.320937] drbg_kcapi_seed+0xa5a/0x2270 [ 100.325182] ? trace_kmalloc+0xa3/0x2b0 [ 100.329231] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 100.334680] ? drbg_kcapi_random+0xc20/0xc20 [ 100.339164] crypto_rng_reset+0x262/0x310 [ 100.343408] rng_setkey+0x8b/0xa0 [ 100.346910] alg_setsockopt+0x6c5/0x740 [ 100.350958] ? rng_release+0x50/0x50 [ 100.354743] ? alg_accept+0xd0/0xd0 [ 100.358439] SYSC_setsockopt+0x4b8/0x570 [ 100.362604] SyS_setsockopt+0x76/0xa0 [ 100.366494] do_syscall_64+0x309/0x430 [ 100.370430] ? SYSC_recv+0xe0/0xe0 [ 100.374008] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 100.379220] RIP: 0033:0x455979 [ 100.382425] RSP: 002b:00007fcd31884c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 100.390166] RAX: ffffffffffffffda RBX: 00007fcd318856d4 RCX: 0000000000455979 [ 100.397457] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 100.404752] RBP: 000000000072bea0 R08: 0000000000000001 R09: 0000000000000000 [ 100.412046] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000014 [ 100.419333] R13: 000000000000055f R14: 00000000006fc188 R15: 0000000000000001 [ 100.427789] DRBG: could not allocate digest TFM handle: hmac(sha512) 2018/05/08 17:38:57 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:57 executing program 0 (fault-call:1 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:57 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7", 0x5) 2018/05/08 17:38:57 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) [ 100.579331] FAULT_INJECTION: forcing a failure. [ 100.579331] name failslab, interval 1, probability 0, space 0, times 0 [ 100.590722] CPU: 0 PID: 7387 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 100.597594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 100.606971] Call Trace: [ 100.609607] dump_stack+0x185/0x1d0 [ 100.613285] should_fail+0x87b/0xab0 [ 100.617101] should_failslab+0x279/0x2a0 [ 100.621254] __kmalloc+0xc2/0x350 [ 100.624833] ? rcu_all_qs+0x32/0x1f0 [ 100.628596] ? _cond_resched+0x3c/0xd0 [ 100.632527] ? get_mountpoint+0x463/0x9d0 [ 100.636716] ? get_mountpoint+0x2d/0x9d0 [ 100.640866] get_mountpoint+0x463/0x9d0 [ 100.644947] lock_mount+0x190/0x8e0 [ 100.648663] ? _cond_resched+0x3c/0xd0 [ 100.652591] do_add_mount+0x7e/0x770 [ 100.656351] ? down_read+0x2c/0x100 [ 100.660021] do_mount+0x29d1/0x4ed0 [ 100.663726] ? msan_get_shadow_origin_ptr+0x101/0x230 [ 100.668990] ? copy_mount_options+0x91/0x540 [ 100.673487] SYSC_mount+0x32e/0x3d0 [ 100.677220] SyS_mount+0x77/0xa0 [ 100.680668] do_syscall_64+0x309/0x430 [ 100.684604] ? put_mnt_ns+0x2f0/0x2f0 [ 100.688446] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 100.693656] RIP: 0033:0x455979 [ 100.696865] RSP: 002b:00007f830b127c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 100.704603] RAX: ffffffffffffffda RBX: 00007f830b1286d4 RCX: 0000000000455979 [ 100.711895] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 100.719189] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 100.726482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 100.733775] R13: 0000000000000440 R14: 00000000006fa6a0 R15: 000000000000000a 2018/05/08 17:38:58 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:38:58 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt(r2, 0x5, 0x102, &(0x7f0000000080)=""/48, &(0x7f0000000100)=0x30) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) 2018/05/08 17:38:58 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYBLOB="00000e00"], &(0x7f00000001c0)=0x1) 2018/05/08 17:38:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000000)="f6a73b94c7", 0x5) 2018/05/08 17:38:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:58 executing program 7 (fault-call:2 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfd, 0x400}, 0xc) 2018/05/08 17:38:58 executing program 0 (fault-call:1 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) [ 101.102349] FAULT_INJECTION: forcing a failure. [ 101.102349] name failslab, interval 1, probability 0, space 0, times 0 [ 101.113785] CPU: 0 PID: 7399 Comm: syz-executor0 Not tainted 4.16.0+ #87 [ 101.120649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.130025] Call Trace: [ 101.132660] dump_stack+0x185/0x1d0 [ 101.136344] should_fail+0x87b/0xab0 [ 101.140163] should_failslab+0x279/0x2a0 [ 101.142388] FAULT_INJECTION: forcing a failure. [ 101.142388] name failslab, interval 1, probability 0, space 0, times 0 [ 101.144267] __kmalloc+0xc2/0x350 [ 101.144330] ? get_mountpoint+0x463/0x9d0 [ 101.144372] ? get_mountpoint+0x2d/0x9d0 [ 101.144459] get_mountpoint+0x463/0x9d0 [ 101.171236] ? do_add_mount+0x732/0x770 [ 101.175224] ? attach_recursive_mnt+0x91/0x3c70 [ 101.179932] attach_recursive_mnt+0x12c/0x3c70 [ 101.184595] do_add_mount+0x732/0x770 [ 101.188417] ? down_read+0x2c/0x100 [ 101.192063] do_mount+0x29d1/0x4ed0 [ 101.195735] ? msan_get_shadow_origin_ptr+0xe1/0x230 [ 101.200878] ? copy_mount_options+0x91/0x540 [ 101.205336] SYSC_mount+0x32e/0x3d0 [ 101.209045] SyS_mount+0x77/0xa0 [ 101.212463] do_syscall_64+0x309/0x430 [ 101.216371] ? put_mnt_ns+0x2f0/0x2f0 [ 101.220183] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 101.225374] RIP: 0033:0x455979 [ 101.228561] RSP: 002b:00007f830b127c68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 101.236278] RAX: ffffffffffffffda RBX: 00007f830b1286d4 RCX: 0000000000455979 [ 101.243548] RDX: 0000000020000100 RSI: 0000000020000040 RDI: 0000000020000080 [ 101.250822] RBP: 000000000072bea0 R08: 00000000200001c0 R09: 0000000000000000 [ 101.258094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 101.265365] R13: 0000000000000440 R14: 00000000006fa6a0 R15: 000000000000000b [ 101.272666] CPU: 1 PID: 7407 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 101.279525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.288897] Call Trace: [ 101.291531] dump_stack+0x185/0x1d0 [ 101.295201] should_fail+0x87b/0xab0 [ 101.299013] should_failslab+0x279/0x2a0 [ 101.303134] __kmalloc+0xc2/0x350 [ 101.306647] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 101.312044] ? crypto_create_tfm+0x10a/0x640 [ 101.316492] ? crypto_alg_extsize+0x66/0xc0 [ 101.320903] crypto_create_tfm+0x10a/0x640 [ 101.325197] crypto_spawn_tfm2+0x17a/0x2c0 [ 101.329491] hmac_init_tfm+0xc7/0x2f0 [ 101.333389] ? crypto_shash_init_tfm+0x159/0x260 [ 101.338181] ? hmac_create+0xa80/0xa80 [ 101.342141] crypto_create_tfm+0x478/0x640 [ 101.346419] crypto_alloc_tfm+0x3a9/0x710 [ 101.350614] crypto_alloc_shash+0x99/0xb0 [ 101.354801] drbg_init_hash_kernel+0x87/0x4e0 [ 101.359341] ? _cond_resched+0x3c/0xd0 [ 101.363317] drbg_kcapi_seed+0xa5a/0x2270 [ 101.367567] ? trace_kmalloc+0xa3/0x2b0 [ 101.371572] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 101.377025] ? drbg_kcapi_random+0xc20/0xc20 [ 101.381511] crypto_rng_reset+0x262/0x310 [ 101.385758] rng_setkey+0x8b/0xa0 [ 101.389258] alg_setsockopt+0x6c5/0x740 [ 101.393314] ? rng_release+0x50/0x50 [ 101.397087] ? alg_accept+0xd0/0xd0 [ 101.400782] SYSC_setsockopt+0x4b8/0x570 [ 101.404936] SyS_setsockopt+0x76/0xa0 [ 101.408825] do_syscall_64+0x309/0x430 [ 101.412762] ? SYSC_recv+0xe0/0xe0 [ 101.416337] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 101.421545] RIP: 0033:0x455979 [ 101.424749] RSP: 002b:00007fcd31884c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 101.432487] RAX: ffffffffffffffda RBX: 00007fcd318856d4 RCX: 0000000000455979 [ 101.439777] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 2018/05/08 17:38:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x1f, 0x80000) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:58 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYBLOB="00000e00"], &(0x7f00000001c0)=0x1) 2018/05/08 17:38:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:38:58 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:38:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) [ 101.447069] RBP: 000000000072bea0 R08: 0000000000000001 R09: 0000000000000000 [ 101.454359] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000014 [ 101.461651] R13: 000000000000055f R14: 00000000006fc188 R15: 0000000000000002 [ 101.470279] DRBG: could not allocate digest TFM handle: hmac(sha512) [ 101.484834] random: crng init done [ 101.503621] mmap: syz-executor2 (7420) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.txt. 2018/05/08 17:38:58 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getsockopt(r2, 0x5, 0x102, &(0x7f0000000080)=""/48, &(0x7f0000000100)=0x30) 2018/05/08 17:38:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:58 executing program 6: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:38:58 executing program 0 (fault-call:1 fault-nth:12): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:38:58 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYBLOB="00000e00"], &(0x7f00000001c0)=0x1) 2018/05/08 17:38:58 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000000)=0x8000, 0x4) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:38:58 executing program 7 (fault-call:2 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:38:58 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2000, 0x0) [ 101.830032] FAULT_INJECTION: forcing a failure. [ 101.830032] name failslab, interval 1, probability 0, space 0, times 0 [ 101.841427] CPU: 1 PID: 7443 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 101.848293] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 101.857668] Call Trace: [ 101.860304] dump_stack+0x185/0x1d0 [ 101.863975] should_fail+0x87b/0xab0 [ 101.867743] should_failslab+0x279/0x2a0 [ 101.871849] __kmalloc+0xc2/0x350 [ 101.875352] ? drbg_init_hash_kernel+0x29c/0x4e0 [ 101.880163] drbg_init_hash_kernel+0x29c/0x4e0 [ 101.884849] drbg_kcapi_seed+0xa5a/0x2270 [ 101.889099] ? trace_kmalloc+0xa3/0x2b0 [ 101.893153] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 101.898607] ? drbg_kcapi_random+0xc20/0xc20 [ 101.903098] crypto_rng_reset+0x262/0x310 [ 101.907352] rng_setkey+0x8b/0xa0 [ 101.910852] alg_setsockopt+0x6c5/0x740 [ 101.914907] ? rng_release+0x50/0x50 [ 101.918692] ? alg_accept+0xd0/0xd0 [ 101.922389] SYSC_setsockopt+0x4b8/0x570 [ 101.926562] SyS_setsockopt+0x76/0xa0 2018/05/08 17:38:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1, 0x2000) r1 = getpgrp(0x0) fcntl$setown(r0, 0x8, r1) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='iso9660\x00', 0xfffffffffffffffd, &(0x7f0000000200)="b1bee725b68f8241c8b5dd9ea76f390ebfd63d15291ef2615274850fe9de78819e22000000000000000000000000") 2018/05/08 17:38:58 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) [ 101.930453] do_syscall_64+0x309/0x430 [ 101.934392] ? SYSC_recv+0xe0/0xe0 [ 101.937975] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 101.943190] RIP: 0033:0x455979 [ 101.946402] RSP: 002b:00007fcd31884c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 101.954143] RAX: ffffffffffffffda RBX: 00007fcd318856d4 RCX: 0000000000455979 [ 101.961441] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 101.968737] RBP: 000000000072bea0 R08: 0000000000000001 R09: 0000000000000000 [ 101.976031] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000014 [ 101.983332] R13: 000000000000055f R14: 00000000006fc188 R15: 0000000000000003 2018/05/08 17:38:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32], &(0x7f00000001c0)=0x1) 2018/05/08 17:38:59 executing program 6 (fault-call:2 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:38:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1000ff9c38a175f39b83dc62fa2f56a3fa25ef00f7947cbdc460d2a45c100f20875e3f1000d1efe5cf42295d493a619fcd0f0f53cd11d19ae7a7a4e69b9d738631e5ec46f228ac0d81b54f83a5ecc12ce9fc09ace885efcb937ec6d9934768015a0869522fad23859e14fdc4750d5185b3496d080cd5ec5a6963465d5e77bd9aa29b0798ec1892c95a98"], 0x1f}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f00000000c0)={'nat\x00', 0x23, "90464f1e8504fa02b3f2889010355a89dc989b703c476710eb1d110da7f4429a739e19"}, &(0x7f0000000140)=0x47) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000040)=0x3) 2018/05/08 17:38:59 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r2, 0x6430) [ 102.226530] FAULT_INJECTION: forcing a failure. [ 102.226530] name failslab, interval 1, probability 0, space 0, times 0 [ 102.237873] CPU: 1 PID: 7480 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 102.244742] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.254123] Call Trace: [ 102.256761] dump_stack+0x185/0x1d0 [ 102.260435] should_fail+0x87b/0xab0 [ 102.264255] should_failslab+0x279/0x2a0 [ 102.268416] __kmalloc+0xc2/0x350 [ 102.271961] ? __local_bh_enable_ip+0x3b/0x140 [ 102.276624] ? sock_kmalloc+0x14e/0x270 [ 102.280644] sock_kmalloc+0x14e/0x270 [ 102.284488] ? rng_release+0x50/0x50 [ 102.288242] alg_setsockopt+0x452/0x740 [ 102.292314] ? alg_accept+0xd0/0xd0 [ 102.296005] SYSC_setsockopt+0x4b8/0x570 [ 102.300166] SyS_setsockopt+0x76/0xa0 [ 102.304062] do_syscall_64+0x309/0x430 [ 102.308002] ? SYSC_recv+0xe0/0xe0 [ 102.311582] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 102.316794] RIP: 0033:0x455979 2018/05/08 17:38:59 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYBLOB="00000e00"], &(0x7f00000001c0)=0x1) 2018/05/08 17:38:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) setregid(r1, r2) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) 2018/05/08 17:38:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_open_dev$tun(&(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x200, 0x0) linkat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', r0, &(0x7f00000001c0)='./file0/bus\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) getxattr(&(0x7f0000000340)='./file0/bus\x00', &(0x7f0000000300)=@random={'security.', '\x00'}, &(0x7f0000000280)=""/43, 0x2b) [ 102.320001] RSP: 002b:00007f6c4fd26c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 102.327747] RAX: ffffffffffffffda RBX: 00007f6c4fd276d4 RCX: 0000000000455979 [ 102.335040] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 102.342331] RBP: 000000000072bea0 R08: 0000000000000001 R09: 0000000000000000 [ 102.349624] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000014 [ 102.356918] R13: 000000000000055f R14: 00000000006fc188 R15: 0000000000000000 2018/05/08 17:38:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6a73b", 0x3) 2018/05/08 17:38:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32], &(0x7f00000001c0)=0x1) 2018/05/08 17:38:59 executing program 7 (fault-call:2 fault-nth:4): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:59 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYBLOB="00000e00"], &(0x7f00000001c0)=0x1) 2018/05/08 17:38:59 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x102, 0x0) 2018/05/08 17:38:59 executing program 6 (fault-call:2 fault-nth:1): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) init_module(&(0x7f00000000c0)='::system\\vboxnet0/keyring}%]\x00', 0x1d, &(0x7f0000000140)='sysfs\x00') mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x2, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f0000000240)={0x3, 0x4}) link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 2018/05/08 17:38:59 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x1001d) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="10000000000000000005007f00000000"], 0x10}, 0x0) fcntl$getown(r0, 0x9) [ 102.650809] FAULT_INJECTION: forcing a failure. [ 102.650809] name failslab, interval 1, probability 0, space 0, times 0 [ 102.662223] CPU: 1 PID: 7515 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 102.669091] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.678489] Call Trace: [ 102.678533] dump_stack+0x185/0x1d0 [ 102.678571] should_fail+0x87b/0xab0 [ 102.678613] should_failslab+0x279/0x2a0 [ 102.678657] __kmalloc+0xc2/0x350 2018/05/08 17:38:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32], &(0x7f00000001c0)=0x1) [ 102.678735] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 102.678809] ? crypto_create_tfm+0x10a/0x640 [ 102.678868] ? crypto_alg_extsize+0x66/0xc0 [ 102.678943] crypto_create_tfm+0x10a/0x640 [ 102.678986] crypto_alloc_tfm+0x3a9/0x710 [ 102.679031] crypto_alloc_shash+0x99/0xb0 [ 102.679069] drbg_init_hash_kernel+0x87/0x4e0 [ 102.679102] ? _cond_resched+0x3c/0xd0 [ 102.679140] drbg_kcapi_seed+0xa5a/0x2270 [ 102.679234] ? trace_kmalloc+0xa3/0x2b0 [ 102.679266] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 102.679348] ? drbg_kcapi_random+0xc20/0xc20 [ 102.679418] crypto_rng_reset+0x262/0x310 [ 102.679511] rng_setkey+0x8b/0xa0 [ 102.679554] alg_setsockopt+0x6c5/0x740 [ 102.679631] ? rng_release+0x50/0x50 [ 102.679693] ? alg_accept+0xd0/0xd0 [ 102.679762] SYSC_setsockopt+0x4b8/0x570 [ 102.679853] SyS_setsockopt+0x76/0xa0 [ 102.776931] do_syscall_64+0x309/0x430 [ 102.776984] ? SYSC_recv+0xe0/0xe0 [ 102.777023] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 102.777048] RIP: 0033:0x455979 [ 102.777064] RSP: 002b:00007f6c4fd26c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 102.777097] RAX: ffffffffffffffda RBX: 00007f6c4fd276d4 RCX: 0000000000455979 [ 102.777115] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 102.777133] RBP: 000000000072bea0 R08: 0000000000000001 R09: 0000000000000000 [ 102.777150] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000014 [ 102.777168] R13: 000000000000055f R14: 00000000006fc188 R15: 0000000000000001 [ 102.777441] DRBG: could not allocate digest TFM handle: hmac(sha512) [ 102.786845] FAULT_INJECTION: forcing a failure. [ 102.786845] name failslab, interval 1, probability 0, space 0, times 0 [ 102.855777] CPU: 0 PID: 7505 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 102.862639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 102.872014] Call Trace: [ 102.874642] dump_stack+0x185/0x1d0 [ 102.878314] should_fail+0x87b/0xab0 [ 102.882081] should_failslab+0x279/0x2a0 [ 102.886189] __kmalloc+0xc2/0x350 [ 102.889708] ? drbg_kcapi_seed+0xc51/0x2270 [ 102.894079] ? drbg_kcapi_seed+0xac8/0x2270 [ 102.898484] drbg_kcapi_seed+0xc51/0x2270 [ 102.902744] ? trace_kmalloc+0xa3/0x2b0 [ 102.906762] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 102.912213] ? drbg_kcapi_random+0xc20/0xc20 [ 102.916706] crypto_rng_reset+0x262/0x310 [ 102.920959] rng_setkey+0x8b/0xa0 [ 102.924467] alg_setsockopt+0x6c5/0x740 [ 102.928525] ? rng_release+0x50/0x50 [ 102.932308] ? alg_accept+0xd0/0xd0 [ 102.936008] SYSC_setsockopt+0x4b8/0x570 [ 102.940170] SyS_setsockopt+0x76/0xa0 [ 102.944057] do_syscall_64+0x309/0x430 [ 102.947993] ? SYSC_recv+0xe0/0xe0 [ 102.951574] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 102.956791] RIP: 0033:0x455979 [ 102.960000] RSP: 002b:00007fcd31884c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 102.967750] RAX: ffffffffffffffda RBX: 00007fcd318856d4 RCX: 0000000000455979 [ 102.975046] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 102.982342] RBP: 000000000072bea0 R08: 0000000000000001 R09: 0000000000000000 [ 102.989633] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000014 2018/05/08 17:38:59 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:38:59 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYBLOB="00000e00"], &(0x7f00000001c0)=0x1) 2018/05/08 17:38:59 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB], &(0x7f00000001c0)=0x2) 2018/05/08 17:38:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x7, 0x40000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000140)={0x0, 0x10000}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r1, 0x3}, &(0x7f0000000200)=0x8) 2018/05/08 17:38:59 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) accept4(r0, 0x0, &(0x7f0000000000), 0x80000) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000001700)=[{0x10}], 0x10}, 0x0) [ 102.996929] R13: 000000000000055f R14: 00000000006fc188 R15: 0000000000000004 2018/05/08 17:39:00 executing program 6 (fault-call:2 fault-nth:2): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:39:00 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)=0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") io_destroy(r0) 2018/05/08 17:39:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:39:00 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB], &(0x7f00000001c0)=0x2) [ 103.220214] FAULT_INJECTION: forcing a failure. [ 103.220214] name failslab, interval 1, probability 0, space 0, times 0 [ 103.231592] CPU: 0 PID: 7546 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 103.238462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.247840] Call Trace: [ 103.250468] dump_stack+0x185/0x1d0 [ 103.254145] should_fail+0x87b/0xab0 [ 103.257915] should_failslab+0x279/0x2a0 [ 103.262038] __kmalloc+0xc2/0x350 [ 103.265545] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 103.270951] ? crypto_create_tfm+0x10a/0x640 [ 103.275395] ? crypto_alg_extsize+0x66/0xc0 [ 103.279813] crypto_create_tfm+0x10a/0x640 [ 103.284106] crypto_spawn_tfm2+0x17a/0x2c0 [ 103.288397] hmac_init_tfm+0xc7/0x2f0 [ 103.292235] ? crypto_shash_init_tfm+0x159/0x260 [ 103.297030] ? hmac_create+0xa80/0xa80 [ 103.300956] crypto_create_tfm+0x478/0x640 [ 103.305238] crypto_alloc_tfm+0x3a9/0x710 [ 103.309441] crypto_alloc_shash+0x99/0xb0 [ 103.313631] drbg_init_hash_kernel+0x87/0x4e0 [ 103.318164] ? _cond_resched+0x3c/0xd0 [ 103.322098] drbg_kcapi_seed+0xa5a/0x2270 [ 103.326354] ? trace_kmalloc+0xa3/0x2b0 [ 103.330411] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 103.335869] ? drbg_kcapi_random+0xc20/0xc20 [ 103.340362] crypto_rng_reset+0x262/0x310 [ 103.344617] rng_setkey+0x8b/0xa0 [ 103.348123] alg_setsockopt+0x6c5/0x740 [ 103.352191] ? rng_release+0x50/0x50 [ 103.355979] ? alg_accept+0xd0/0xd0 [ 103.359689] SYSC_setsockopt+0x4b8/0x570 [ 103.363867] SyS_setsockopt+0x76/0xa0 [ 103.367784] do_syscall_64+0x309/0x430 [ 103.371732] ? SYSC_recv+0xe0/0xe0 [ 103.375315] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 103.380530] RIP: 0033:0x455979 [ 103.383741] RSP: 002b:00007f6c4fd26c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 103.391489] RAX: ffffffffffffffda RBX: 00007f6c4fd276d4 RCX: 0000000000455979 [ 103.398767] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 103.406043] RBP: 000000000072bea0 R08: 0000000000000001 R09: 0000000000000000 [ 103.413323] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000014 [ 103.420586] R13: 000000000000055f R14: 00000000006fc188 R15: 0000000000000002 [ 103.428333] DRBG: could not allocate digest TFM handle: hmac(sha512) 2018/05/08 17:39:00 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="00000e00"], &(0x7f00000001c0)=0x8) 2018/05/08 17:39:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:39:00 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x105) setxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=@random={'system.', 'bdev\x00'}, &(0x7f0000000140)='sysfs\x00', 0x6, 0x3) r0 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x2, 0x400) symlinkat(&(0x7f0000000180)='./file0\x00', r0, &(0x7f0000000240)='./file0\x00') getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e22, @local={0xac, 0x14, 0x14, 0xaa}}}}, &(0x7f0000000340)=0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000480)=ANY=[@ANYRES32=r1, @ANYBLOB="450000007a1ebe2c6a5d1f2476485bd70dfcb9cfaa40ae69c2fe2d5070535dd3166954863640e1f5fdc6cc6f17191e878232ccd73ce2cdc01a0895b134794d2c2f8379cd932683637db27d450e6f3d447421c1a216e5ae1f52fa0a10f58dd4da6b8f05b4ebdedebd9545992c0a4ca98fac7ba217fe7f8ae8d7786ddcb1011f920d503e93dbee9966693919399ae4c965718a90b513752fc39e2f92e44e8767c296db13686d74110a8c577bdc7ac186d073b9496521437fd67184fe7a404e8db90fbf10a8c5dfc5e1768f32ba0147dae4cf96e3f11f0fbab991e92cda0a14e3ffca27be257304cf861d280d4d5a"], &(0x7f0000000400)=0x4d) renameat2(r0, &(0x7f0000000080)='./file0/bus\x00', r0, &(0x7f00000003c0)='./file0/bus\x00', 0x2) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000440)={'veth1_to_bond\x00', {0x2, 0x4e22, @rand_addr}}) mount(&(0x7f0000000380)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, &(0x7f00000001c0)) 2018/05/08 17:39:00 executing program 7 (fault-call:2 fault-nth:5): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:39:00 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB], &(0x7f00000001c0)=0x2) 2018/05/08 17:39:00 executing program 6 (fault-call:2 fault-nth:3): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="f6", 0x1) 2018/05/08 17:39:00 executing program 5: perf_event_open(&(0x7f0000014f88)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x1000, &(0x7f00000000c0)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x40000, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000340)="24ec3f873e65b4c174e3ec8977f225310dd725f9cfc38e8b87ee89a3c88f7e410390848f31181461e090b9d1ffd83725c24311438679d12145921fb99b622753b8bec3cdd18a7d467362abcd00dbf265f74899cc9e96e3592cb30e545745050d883a053371526dbb70b096ed2398870f8fe5c588634d34b4a34387629312229f5ca9393c9e4b4971") 2018/05/08 17:39:00 executing program 2: pause() msgget$private(0x0, 0x1) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x200000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000080)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', r2}) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000100)={&(0x7f0000ffb000/0x3000)=nil, 0x3000}) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040)=0x4, 0x4) sendmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000080), 0xe0, &(0x7f0000000140)=ANY=[], 0xfffffffffffffe0f}, 0x0) write$binfmt_script(r0, &(0x7f0000000240)={'#! ', './file0', [{0x20, '/dev/ppp\x00'}, {0x20, 'ip6_vti0\x00'}, {0x20, ':\x00'}], 0xa, "00f2e12e6653204028e751a40e8ca235f7169c9469f9c8623a024b247a049021f2929d3e46d1ef45fb703f1df5e5ce1074171ec56d43a302d0bb7ae7b6f77d059496054e6e39c96cb8d0d8f67ad09167ed1d9f35"}, 0x76) [ 103.571710] FAULT_INJECTION: forcing a failure. [ 103.571710] name failslab, interval 1, probability 0, space 0, times 0 [ 103.583118] CPU: 1 PID: 7572 Comm: syz-executor7 Not tainted 4.16.0+ #87 [ 103.589980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.599359] Call Trace: [ 103.601989] dump_stack+0x185/0x1d0 [ 103.605663] should_fail+0x87b/0xab0 [ 103.609430] should_failslab+0x279/0x2a0 [ 103.613539] __kmalloc+0xc2/0x350 [ 103.617044] ? drbg_kcapi_seed+0xedd/0x2270 2018/05/08 17:39:00 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00'], &(0x7f00000001c0)=0x2) [ 103.621409] ? drbg_kcapi_seed+0xd8c/0x2270 [ 103.625766] drbg_kcapi_seed+0xedd/0x2270 [ 103.630006] ? trace_kmalloc+0xa3/0x2b0 [ 103.634023] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 103.639479] ? drbg_kcapi_random+0xc20/0xc20 [ 103.643966] crypto_rng_reset+0x262/0x310 [ 103.648210] rng_setkey+0x8b/0xa0 [ 103.651721] alg_setsockopt+0x6c5/0x740 [ 103.655776] ? rng_release+0x50/0x50 [ 103.659558] ? alg_accept+0xd0/0xd0 [ 103.663266] SYSC_setsockopt+0x4b8/0x570 [ 103.667428] SyS_setsockopt+0x76/0xa0 [ 103.671321] do_syscall_64+0x309/0x430 [ 103.675263] ? SYSC_recv+0xe0/0xe0 [ 103.678850] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 103.684070] RIP: 0033:0x455979 [ 103.687278] RSP: 002b:00007fcd31884c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 103.695022] RAX: ffffffffffffffda RBX: 00007fcd318856d4 RCX: 0000000000455979 [ 103.702316] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 103.709606] RBP: 000000000072bea0 R08: 0000000000000001 R09: 0000000000000000 2018/05/08 17:39:00 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000590fa8)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha512\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000), 0x0) 2018/05/08 17:39:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0/bus\x00', &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='sysfs\x00', 0x0, &(0x7f00000001c0)) [ 103.716899] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000014 [ 103.724193] R13: 000000000000055f R14: 00000000006fc188 R15: 0000000000000005 [ 103.753582] FAULT_INJECTION: forcing a failure. [ 103.753582] name failslab, interval 1, probability 0, space 0, times 0 [ 103.764936] CPU: 1 PID: 7577 Comm: syz-executor6 Not tainted 4.16.0+ #87 [ 103.771809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.781189] Call Trace: [ 103.783827] dump_stack+0x185/0x1d0 [ 103.787505] should_fail+0x87b/0xab0 [ 103.791279] should_failslab+0x279/0x2a0 [ 103.795392] __kmalloc+0xc2/0x350 [ 103.798892] ? drbg_init_hash_kernel+0x29c/0x4e0 [ 103.803697] drbg_init_hash_kernel+0x29c/0x4e0 [ 103.808332] drbg_kcapi_seed+0xa5a/0x2270 [ 103.812582] ? trace_kmalloc+0xa3/0x2b0 [ 103.816602] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 103.822058] ? drbg_kcapi_random+0xc20/0xc20 [ 103.826544] crypto_rng_reset+0x262/0x310 [ 103.830796] rng_setkey+0x8b/0xa0 [ 103.834304] alg_setsockopt+0x6c5/0x740 [ 103.838358] ? rng_release+0x50/0x50 [ 103.842141] ? alg_accept+0xd0/0xd0 [ 103.845842] SYSC_setsockopt+0x4b8/0x570 [ 103.850005] SyS_setsockopt+0x76/0xa0 [ 103.853898] do_syscall_64+0x309/0x430 [ 103.857842] ? SYSC_recv+0xe0/0xe0 [ 103.861427] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 103.866640] RIP: 0033:0x455979 [ 103.869852] RSP: 002b:00007f6c4fd26c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 103.877597] RAX: ffffffffffffffda RBX: 00007f6c4fd276d4 RCX: 0000000000455979 [ 103.884891] RDX: 0000000000000001 RSI: 0000000000000117 RDI: 0000000000000013 [ 103.892184] RBP: 000000000072bea0 R08: 0000000000000001 R09: 0000000000000000 [ 103.899479] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000014 [ 103.906770] R13: 000000000000055f R14: 00000000006fc188 R15: 0000000000000003 [ 103.986493] list_del corruption. prev->next should be 00000000e91d1b00, but was (null) [ 103.995671] ------------[ cut here ]------------ [ 104.000450] kernel BUG at lib/list_debug.c:53! [ 104.005072] invalid opcode: 0000 [#1] SMP PTI [ 104.009573] Dumping ftrace buffer: [ 104.013105] (ftrace buffer empty) [ 104.016804] Modules linked in: [ 104.020009] CPU: 1 PID: 2255 Comm: udevd Not tainted 4.16.0+ #87 [ 104.026156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.035529] RIP: 0010:__list_del_entry_valid+0x37c/0x440 [ 104.040976] RSP: 0018:ffff8801cbc2fa00 EFLAGS: 00010082 [ 104.046352] RAX: 0000000000000054 RBX: 0000000000000000 RCX: 0000000000000000 [ 104.053617] RDX: 0000000000000000 RSI: aaaaaaaaaaaab000 RDI: ffffea0000000000 [ 104.060880] RBP: ffff8801cbc2fa58 R08: 0000000001080020 R09: 0000000000000002 [ 104.068143] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 104.075418] R13: ffff88014c7b1ea0 R14: 0000000000000000 R15: 0000000000000000 [ 104.082788] FS: 00007f0575a867a0(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 104.091012] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 104.096899] CR2: 0000000000606ed8 CR3: 00000001cbeb0000 CR4: 00000000001406e0 [ 104.104165] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 104.111427] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 104.118688] Call Trace: [ 104.121328] kernfs_put_open_node+0x11c/0x460 [ 104.125857] ? __fsnotify_parent+0x75/0x560 [ 104.130208] kernfs_fop_release+0x29c/0x3c0 [ 104.134552] __fput+0x49e/0xa10 [ 104.137860] ____fput+0x37/0x40 [ 104.141163] ? fput+0x2e0/0x2e0 [ 104.144457] task_work_run+0x243/0x2c0 [ 104.148386] prepare_exit_to_usermode+0x33c/0x3a0 [ 104.153275] syscall_return_slowpath+0xe9/0x700 [ 104.157964] ? __close_fd+0x47b/0x4d0 [ 104.161793] ? SYSC_close+0x71/0x130 [ 104.165509] do_syscall_64+0x36d/0x430 [ 104.169398] ? filp_close+0x2e0/0x2e0 [ 104.173215] entry_SYSCALL_64_after_hwframe+0x3d/0xa2 [ 104.178426] RIP: 0033:0x7f057518e2b0 [ 104.182140] RSP: 002b:00007ffdd967e8c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 104.189860] RAX: 0000000000000000 RBX: 0000000001d890d0 RCX: 00007f057518e2b0 [ 104.197125] RDX: 0000000000000006 RSI: 000000000041f4f9 RDI: 000000000000000b [ 104.204386] RBP: 0000000001d770f0 R08: 000000000041f4f1 R09: 00007f05751e47d0 [ 104.211648] R10: 7269762f73656369 R11: 0000000000000246 R12: 000000000000000b [ 104.218920] R13: 0000000000000000 R14: 0000000001d890d0 R15: 0000000001d70250 [ 104.226185] Code: 00 48 c7 81 80 0c 00 00 00 00 00 00 c7 81 20 03 00 00 00 00 00 00 48 c7 c7 b5 f7 82 8a 31 c0 48 8b 75 c0 4c 89 e2 e8 a4 a7 51 fd <0f> 0b 66 90 eb fe 44 89 f7 e8 76 83 cb fd e9 88 fd ff ff 48 85 [ 104.245726] RIP: __list_del_entry_valid+0x37c/0x440 RSP: ffff8801cbc2fa00 [ 104.252656] ---[ end trace 9249e9c2ca77ddaf ]--- [ 104.257403] Kernel panic - not syncing: Fatal exception [ 104.263192] Dumping ftrace buffer: [ 104.266738] (ftrace buffer empty) [ 104.270433] Kernel Offset: disabled [ 104.274054] Rebooting in 86400 seconds..