9f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:06 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0x0, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:06 executing program 6: 2018/03/29 11:40:06 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:06 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:06 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x0, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:06 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:06 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x5, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:06 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x0, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x0, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:07 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2218.233408] IPVS: ftp: loaded support on port[0] = 21 [ 2218.261625] IPVS: ftp: loaded support on port[0] = 21 [ 2218.297769] IPVS: ftp: loaded support on port[0] = 21 [ 2218.335651] IPVS: ftp: loaded support on port[0] = 21 [ 2218.375989] IPVS: ftp: loaded support on port[0] = 21 [ 2218.422526] IPVS: ftp: loaded support on port[0] = 21 [ 2218.477738] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:09 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:09 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:09 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0x0, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:09 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:09 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0x0, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:09 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x0, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:09 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026680)=""/178, 0xb2}], 0x5, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:09 executing program 6: 2018/03/29 11:40:09 executing program 6: 2018/03/29 11:40:09 executing program 6: 2018/03/29 11:40:09 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:09 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x2000000000000002, 0x0) close(r0) 2018/03/29 11:40:09 executing program 6: perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000eb0fb8)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="180000000100000000000000000000009500000000000000"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0xb7, &(0x7f00006ab000)=""/183}, 0x48) 2018/03/29 11:40:09 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:09 executing program 6: mkdir(&(0x7f000053bff8)='./file0\x00', 0x0) mount(&(0x7f0000b79ff8)='./file0\x00', &(0x7f0000db0ff8)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, &(0x7f0000cde000)) perf_event_open(&(0x7f0000940000)={0x2, 0x78, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)='autofs\x00', 0x1029, &(0x7f0000000340)) 2018/03/29 11:40:09 executing program 6: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1, 0xb, 0x20001, 0x2}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f00000000c0)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r0, &(0x7f0000000040)}, 0x10) 2018/03/29 11:40:09 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2220.672103] IPVS: ftp: loaded support on port[0] = 21 [ 2220.699490] IPVS: ftp: loaded support on port[0] = 21 [ 2220.737950] IPVS: ftp: loaded support on port[0] = 21 [ 2220.783510] IPVS: ftp: loaded support on port[0] = 21 [ 2220.822800] IPVS: ftp: loaded support on port[0] = 21 [ 2220.861805] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:11 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x0, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:11 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0x0, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:11 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:11 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x0, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:11 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:11 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x0, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:11 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026680)=""/178, 0xb2}], 0x5, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:11 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:11 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x0, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:11 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0x0, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:11 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:11 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x0, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:11 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x0, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:11 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x0, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:12 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x0, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2221.836391] IPVS: ftp: loaded support on port[0] = 21 [ 2221.865424] IPVS: ftp: loaded support on port[0] = 21 [ 2223.125728] IPVS: ftp: loaded support on port[0] = 21 [ 2223.151106] IPVS: ftp: loaded support on port[0] = 21 [ 2223.189371] IPVS: ftp: loaded support on port[0] = 21 [ 2223.228743] IPVS: ftp: loaded support on port[0] = 21 [ 2223.269985] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x0, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:14 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0x0, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:14 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000001080)={0x0, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) 2018/03/29 11:40:14 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:14 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x0, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:14 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x0, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:14 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026680)=""/178, 0xb2}], 0x5, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:14 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0x0, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:14 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x0, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x0, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x0, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x0, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:14 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2224.253547] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:15 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x0, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2225.416702] IPVS: ftp: loaded support on port[0] = 21 [ 2225.444399] IPVS: ftp: loaded support on port[0] = 21 [ 2225.480557] IPVS: ftp: loaded support on port[0] = 21 [ 2225.523257] IPVS: ftp: loaded support on port[0] = 21 [ 2225.571691] IPVS: ftp: loaded support on port[0] = 21 [ 2225.615406] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:16 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x0, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:16 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0x0, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:16 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x0, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:16 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:16 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}], 0x5, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:16 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:16 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0x0, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:16 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000001080)={0x0, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) 2018/03/29 11:40:16 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:16 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x2, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:16 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x2, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:17 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x2, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:17 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000001200)=""/246, 0xf6}], 0x2, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:17 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000001200)=""/246, 0xf6}], 0x2, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2226.519282] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:17 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x0, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:17 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f0000001200)=""/246, 0xf6}], 0x2, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2227.790943] IPVS: ftp: loaded support on port[0] = 21 [ 2227.817728] IPVS: ftp: loaded support on port[0] = 21 [ 2227.854266] IPVS: ftp: loaded support on port[0] = 21 [ 2227.900702] IPVS: ftp: loaded support on port[0] = 21 [ 2227.940459] IPVS: ftp: loaded support on port[0] = 21 [ 2227.982483] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:18 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x0, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:18 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x0, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:18 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}], 0x2, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:18 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0x0, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:18 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000001080)={0x0, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r4) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) 2018/03/29 11:40:18 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}], 0x5, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:18 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0x0, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:18 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:18 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}], 0x5, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:18 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}], 0x2, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:18 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}], 0x2, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:19 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71}, 0x140) 2018/03/29 11:40:19 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71}, 0x140) 2018/03/29 11:40:19 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71}, 0x140) 2018/03/29 11:40:19 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x0) [ 2228.914352] IPVS: ftp: loaded support on port[0] = 21 [ 2228.940658] IPVS: ftp: loaded support on port[0] = 21 [ 2230.195772] IPVS: ftp: loaded support on port[0] = 21 [ 2230.221189] IPVS: ftp: loaded support on port[0] = 21 [ 2230.258043] IPVS: ftp: loaded support on port[0] = 21 [ 2230.301165] IPVS: ftp: loaded support on port[0] = 21 [ 2230.341771] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x0) 2018/03/29 11:40:21 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x0, 0x0, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:21 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:21 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x0, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:21 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x0, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:21 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000001080)={0x0, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r4) recvmsg$kcm(r3, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:21 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0x0, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:21 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x0, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:21 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x0) 2018/03/29 11:40:21 executing program 5 (fault-call:10 fault-nth:0): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2230.599442] FAULT_INJECTION: forcing a failure. [ 2230.599442] name failslab, interval 1, probability 0, space 0, times 0 [ 2230.610928] CPU: 1 PID: 26364 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2230.618198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2230.627548] Call Trace: [ 2230.630140] dump_stack+0x194/0x24d [ 2230.633852] ? arch_local_irq_restore+0x53/0x53 [ 2230.638533] should_fail+0x8c0/0xa40 [ 2230.642254] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2230.647352] ? lock_downgrade+0x980/0x980 [ 2230.651500] ? get_pid_task+0xbc/0x140 [ 2230.655380] ? proc_fail_nth_write+0x9b/0x1d0 [ 2230.659862] ? map_files_get_link+0x3a0/0x3a0 [ 2230.664359] ? find_held_lock+0x35/0x1d0 [ 2230.668447] ? check_same_owner+0x320/0x320 [ 2230.672759] ? __lock_is_held+0xb6/0x140 [ 2230.676813] ? rcu_note_context_switch+0x710/0x710 [ 2230.681746] should_failslab+0xec/0x120 [ 2230.685711] __kmalloc_track_caller+0x5f/0x760 [ 2230.690288] ? strncpy_from_user+0x430/0x430 [ 2230.694683] ? strndup_user+0x62/0xb0 [ 2230.698484] memdup_user+0x2c/0x90 [ 2230.702015] strndup_user+0x62/0xb0 [ 2230.705648] SyS_mount+0x3c/0x120 [ 2230.709091] ? copy_mnt_ns+0xb30/0xb30 [ 2230.712969] do_syscall_64+0x281/0x940 [ 2230.716842] ? __do_page_fault+0xc90/0xc90 [ 2230.721061] ? _raw_spin_unlock_irq+0x27/0x70 [ 2230.725542] ? finish_task_switch+0x1c1/0x7e0 [ 2230.730023] ? syscall_return_slowpath+0x550/0x550 [ 2230.734941] ? syscall_return_slowpath+0x2ac/0x550 [ 2230.739865] ? prepare_exit_to_usermode+0x350/0x350 [ 2230.744873] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2230.750233] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2230.755085] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2230.760263] RIP: 0033:0x4548b9 [ 2230.763436] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2230.771138] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2230.778396] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2230.785651] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2230.792905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 2018/03/29 11:40:21 executing program 5 (fault-call:10 fault-nth:1): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2230.800167] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000000 [ 2231.070812] FAULT_INJECTION: forcing a failure. [ 2231.070812] name failslab, interval 1, probability 0, space 0, times 0 [ 2231.082095] CPU: 0 PID: 26368 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2231.089353] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2231.098691] Call Trace: [ 2231.101275] dump_stack+0x194/0x24d [ 2231.104895] ? arch_local_irq_restore+0x53/0x53 [ 2231.109558] ? __save_stack_trace+0x7e/0xd0 [ 2231.113885] should_fail+0x8c0/0xa40 [ 2231.117594] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2231.122686] ? kasan_kmalloc+0xad/0xe0 [ 2231.126558] ? __kmalloc_track_caller+0x15e/0x760 [ 2231.131387] ? memdup_user+0x2c/0x90 [ 2231.135363] ? strndup_user+0x62/0xb0 [ 2231.139152] ? SyS_mount+0x3c/0x120 [ 2231.142772] ? proc_fail_nth_write+0x9b/0x1d0 [ 2231.147253] ? map_files_get_link+0x3a0/0x3a0 [ 2231.151746] ? find_held_lock+0x35/0x1d0 [ 2231.155840] ? check_same_owner+0x320/0x320 [ 2231.160154] ? rcu_note_context_switch+0x710/0x710 [ 2231.165076] ? __check_object_size+0x8b/0x530 [ 2231.169569] should_failslab+0xec/0x120 [ 2231.173534] __kmalloc_track_caller+0x5f/0x760 [ 2231.178111] ? strncpy_from_user+0x430/0x430 [ 2231.182526] ? strndup_user+0x62/0xb0 [ 2231.186313] ? _copy_from_user+0x99/0x110 [ 2231.190758] memdup_user+0x2c/0x90 [ 2231.194289] strndup_user+0x62/0xb0 [ 2231.197939] SyS_mount+0x6b/0x120 [ 2231.201379] ? copy_mnt_ns+0xb30/0xb30 [ 2231.205258] do_syscall_64+0x281/0x940 [ 2231.209129] ? __do_page_fault+0xc90/0xc90 [ 2231.213356] ? _raw_spin_unlock_irq+0x27/0x70 [ 2231.217837] ? finish_task_switch+0x1c1/0x7e0 [ 2231.222318] ? syscall_return_slowpath+0x550/0x550 [ 2231.227237] ? syscall_return_slowpath+0x2ac/0x550 [ 2231.232156] ? prepare_exit_to_usermode+0x350/0x350 [ 2231.237170] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2231.242529] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2231.247367] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2231.252544] RIP: 0033:0x4548b9 [ 2231.255719] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2231.263413] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 2018/03/29 11:40:22 executing program 5 (fault-call:10 fault-nth:2): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2231.270669] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2231.277923] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2231.285180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2231.292435] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000001 [ 2231.419678] FAULT_INJECTION: forcing a failure. [ 2231.419678] name failslab, interval 1, probability 0, space 0, times 0 [ 2231.431105] CPU: 0 PID: 26372 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2231.438369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2231.447709] Call Trace: [ 2231.450289] dump_stack+0x194/0x24d [ 2231.453915] ? arch_local_irq_restore+0x53/0x53 [ 2231.458591] should_fail+0x8c0/0xa40 [ 2231.462299] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2231.467391] ? __kmalloc_track_caller+0x15e/0x760 [ 2231.472224] ? strndup_user+0x62/0xb0 [ 2231.476029] ? SyS_mount+0x6b/0x120 [ 2231.480081] ? trace_hardirqs_off+0x10/0x10 [ 2231.484396] ? proc_fail_nth_write+0x9b/0x1d0 [ 2231.488873] ? map_files_get_link+0x3a0/0x3a0 [ 2231.493358] ? find_held_lock+0x35/0x1d0 [ 2231.497733] ? check_same_owner+0x320/0x320 [ 2231.502034] ? lock_release+0xa40/0xa40 [ 2231.505985] ? check_same_owner+0x320/0x320 [ 2231.510304] ? rcu_note_context_switch+0x710/0x710 [ 2231.515228] should_failslab+0xec/0x120 [ 2231.519180] kmem_cache_alloc_trace+0x4b/0x740 [ 2231.523744] ? kasan_check_write+0x14/0x20 [ 2231.527959] ? _copy_from_user+0x99/0x110 [ 2231.532088] copy_mount_options+0x5f/0x2e0 [ 2231.536304] SyS_mount+0x87/0x120 [ 2231.539730] ? copy_mnt_ns+0xb30/0xb30 [ 2231.543606] do_syscall_64+0x281/0x940 [ 2231.547471] ? __do_page_fault+0xc90/0xc90 [ 2231.551679] ? _raw_spin_unlock_irq+0x27/0x70 [ 2231.556251] ? finish_task_switch+0x1c1/0x7e0 [ 2231.560726] ? syscall_return_slowpath+0x550/0x550 [ 2231.565633] ? syscall_return_slowpath+0x2ac/0x550 [ 2231.570540] ? prepare_exit_to_usermode+0x350/0x350 [ 2231.575535] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2231.580888] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2231.585714] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2231.590888] RIP: 0033:0x4548b9 [ 2231.594063] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2231.601749] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2231.609092] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 2018/03/29 11:40:22 executing program 5 (fault-call:10 fault-nth:3): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2231.616338] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2231.623583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2231.631336] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000002 [ 2231.648230] IPVS: ftp: loaded support on port[0] = 21 [ 2231.721618] FAULT_INJECTION: forcing a failure. [ 2231.721618] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2231.733460] CPU: 1 PID: 26385 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2231.740732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2231.750082] Call Trace: [ 2231.752672] dump_stack+0x194/0x24d [ 2231.756310] ? arch_local_irq_restore+0x53/0x53 [ 2231.761000] should_fail+0x8c0/0xa40 [ 2231.764727] ? fault_create_debugfs_attr+0x1f0/0x1f0 2018/03/29 11:40:22 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x0, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2231.769846] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2231.774825] IPVS: ftp: loaded support on port[0] = 21 [ 2231.775035] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2231.775049] ? rcutorture_record_progress+0x10/0x10 [ 2231.775070] ? is_bpf_text_address+0xa4/0x120 [ 2231.794900] ? __kernel_text_address+0xd/0x40 [ 2231.799663] ? __save_stack_trace+0x7e/0xd0 [ 2231.804008] ? should_fail+0x23b/0xa40 [ 2231.807895] ? save_stack+0xa3/0xd0 [ 2231.811535] __alloc_pages_nodemask+0x327/0xdd0 [ 2231.816206] ? trace_hardirqs_off+0x10/0x10 [ 2231.820531] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2231.825561] ? find_held_lock+0x35/0x1d0 [ 2231.828132] IPVS: ftp: loaded support on port[0] = 21 [ 2231.829651] ? check_same_owner+0x320/0x320 [ 2231.839133] ? lock_release+0xa40/0xa40 [ 2231.843104] ? check_same_owner+0x320/0x320 [ 2231.847433] cache_grow_begin+0x72/0x640 [ 2231.851775] kmem_cache_alloc_trace+0x3f1/0x740 [ 2231.856538] ? kasan_check_write+0x14/0x20 [ 2231.860778] copy_mount_options+0x5f/0x2e0 [ 2231.865023] SyS_mount+0x87/0x120 [ 2231.868475] ? copy_mnt_ns+0xb30/0xb30 2018/03/29 11:40:22 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x0, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2231.872366] do_syscall_64+0x281/0x940 [ 2231.876249] ? __do_page_fault+0xc90/0xc90 [ 2231.880477] ? _raw_spin_unlock_irq+0x27/0x70 [ 2231.884973] ? finish_task_switch+0x1c1/0x7e0 [ 2231.889471] ? syscall_return_slowpath+0x550/0x550 [ 2231.894401] ? syscall_return_slowpath+0x2ac/0x550 [ 2231.899329] ? prepare_exit_to_usermode+0x350/0x350 [ 2231.904363] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2231.909731] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2231.914586] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 11:40:22 executing program 5 (fault-call:10 fault-nth:4): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:22 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x0, 0x0, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2231.916093] IPVS: ftp: loaded support on port[0] = 21 [ 2231.919761] RIP: 0033:0x4548b9 [ 2231.919767] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2231.919777] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2231.919783] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2231.919788] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2231.919793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2231.919798] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000003 [ 2232.022430] FAULT_INJECTION: forcing a failure. [ 2232.022430] name failslab, interval 1, probability 0, space 0, times 0 [ 2232.033728] CPU: 1 PID: 26408 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2232.041002] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2232.041527] IPVS: ftp: loaded support on port[0] = 21 [ 2232.050346] Call Trace: [ 2232.050366] dump_stack+0x194/0x24d [ 2232.050384] ? arch_local_irq_restore+0x53/0x53 [ 2232.050411] should_fail+0x8c0/0xa40 [ 2232.071031] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2232.076119] ? lock_release+0xa40/0xa40 [ 2232.080086] ? find_held_lock+0x35/0x1d0 [ 2232.084148] ? check_same_owner+0x320/0x320 [ 2232.088453] ? rcu_note_context_switch+0x710/0x710 [ 2232.093371] should_failslab+0xec/0x120 [ 2232.097326] kmem_cache_alloc+0x47/0x760 [ 2232.101369] ? find_held_lock+0x35/0x1d0 [ 2232.105412] getname_flags+0xcb/0x580 [ 2232.109197] user_path_at_empty+0x2d/0x50 [ 2232.113331] do_mount+0x15f/0x2bb0 [ 2232.116859] ? copy_mount_string+0x40/0x40 [ 2232.121073] ? rcu_pm_notify+0xc0/0xc0 [ 2232.124950] ? copy_mount_options+0x5f/0x2e0 [ 2232.129338] ? rcu_read_lock_sched_held+0x108/0x120 [ 2232.134334] ? kmem_cache_alloc_trace+0x459/0x740 [ 2232.139155] ? kasan_check_write+0x14/0x20 [ 2232.143382] ? copy_mount_options+0x1f7/0x2e0 [ 2232.147860] SyS_mount+0xab/0x120 [ 2232.151288] ? copy_mnt_ns+0xb30/0xb30 [ 2232.155154] do_syscall_64+0x281/0x940 [ 2232.159109] ? __do_page_fault+0xc90/0xc90 [ 2232.163324] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 2232.168837] ? syscall_return_slowpath+0x550/0x550 [ 2232.173747] ? syscall_return_slowpath+0x2ac/0x550 [ 2232.178661] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2232.184007] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2232.188842] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2232.194008] RIP: 0033:0x4548b9 [ 2232.197180] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2232.204864] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2232.212111] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2232.219371] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2232.226620] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2232.233865] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000004 [ 2232.290244] IPVS: ftp: loaded support on port[0] = 21 [ 2233.472116] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:24 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x0, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:24 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000001080)={0x0, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r4) recvmsg$kcm(r3, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:24 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:24 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x0, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:24 executing program 7: mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:24 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0x0, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:24 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x0, 0x0, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:24 executing program 5 (fault-call:10 fault-nth:5): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:24 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2233.609990] FAULT_INJECTION: forcing a failure. [ 2233.609990] name failslab, interval 1, probability 0, space 0, times 0 [ 2233.621403] CPU: 1 PID: 26437 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2233.628675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2233.638025] Call Trace: [ 2233.640620] dump_stack+0x194/0x24d [ 2233.644254] ? arch_local_irq_restore+0x53/0x53 [ 2233.648939] should_fail+0x8c0/0xa40 [ 2233.652656] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2233.657755] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2233.662958] ? is_bpf_text_address+0xa4/0x120 [ 2233.667459] ? print_irqtrace_events+0x270/0x270 [ 2233.672219] ? find_held_lock+0x35/0x1d0 [ 2233.676285] ? __lock_is_held+0xb6/0x140 [ 2233.680344] ? check_same_owner+0x320/0x320 [ 2233.684656] ? rcu_note_context_switch+0x710/0x710 [ 2233.689596] should_failslab+0xec/0x120 [ 2233.693566] kmem_cache_alloc+0x47/0x760 [ 2233.697633] __d_alloc+0xc1/0xbd0 [ 2233.701085] ? shrink_dcache_for_umount+0x290/0x290 [ 2233.706096] ? __lock_acquire+0x664/0x3e00 [ 2233.710325] ? print_irqtrace_events+0x270/0x270 [ 2233.715074] ? __mem_cgroup_largest_soft_limit_node+0x780/0x780 [ 2233.721154] ? debug_check_no_locks_freed+0x3c0/0x3c0 [ 2233.726361] d_alloc+0x8e/0x340 [ 2233.729634] ? __d_alloc+0xbd0/0xbd0 [ 2233.733340] ? find_held_lock+0x35/0x1d0 [ 2233.737407] d_alloc_parallel+0x152/0x1b40 [ 2233.741636] ? lookup_fast+0x392/0xfa0 [ 2233.745514] ? lock_downgrade+0x980/0x980 [ 2233.749656] ? lock_release+0xa40/0xa40 [ 2233.753633] ? __d_lookup_rcu+0xa00/0xa00 [ 2233.757770] ? __follow_mount_rcu.isra.28+0x2f9/0x7d0 [ 2233.762955] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2233.767970] ? trace_hardirqs_off+0x10/0x10 [ 2233.772280] ? trace_hardirqs_on+0xd/0x10 [ 2233.776422] ? __follow_mount_rcu.isra.28+0x429/0x7d0 [ 2233.781598] ? print_irqtrace_events+0x270/0x270 [ 2233.786339] ? lock_acquire+0x1d5/0x580 [ 2233.790288] ? lock_acquire+0x1d5/0x580 [ 2233.794241] ? lookup_slow+0x18e/0x4d0 [ 2233.798114] ? lock_release+0xa40/0xa40 [ 2233.802067] ? check_same_owner+0x320/0x320 [ 2233.806365] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2233.811794] ? rcu_note_context_switch+0x710/0x710 [ 2233.816709] ? __might_sleep+0x95/0x190 [ 2233.820668] ? down_read+0x96/0x150 [ 2233.824273] ? lookup_slow+0x18e/0x4d0 [ 2233.828138] ? __down_interruptible+0x6b0/0x6b0 [ 2233.832784] ? walk_component+0x370/0x13d0 [ 2233.837005] lookup_slow+0x1e5/0x4d0 [ 2233.840705] ? vfs_unlink+0x480/0x480 [ 2233.844500] ? lookup_fast+0x505/0xfa0 [ 2233.848384] walk_component+0x89f/0x13d0 [ 2233.852444] ? follow_dotdot_rcu+0x1150/0x1150 [ 2233.857028] ? save_stack+0xa3/0xd0 [ 2233.860634] ? save_stack+0x43/0xd0 [ 2233.864239] ? kasan_kmalloc+0xad/0xe0 [ 2233.868099] ? kasan_slab_alloc+0x12/0x20 [ 2233.872218] ? kmem_cache_alloc+0x12e/0x760 [ 2233.876513] ? getname_flags+0xcb/0x580 [ 2233.880468] path_lookupat+0x1d7/0xba0 [ 2233.884336] ? path_parentat+0x140/0x140 [ 2233.888373] ? check_stack_object+0x68/0x140 [ 2233.892763] ? __check_object_size+0x8b/0x530 [ 2233.897240] ? usercopy_abort+0xd0/0xd0 [ 2233.901211] filename_lookup+0x25f/0x500 [ 2233.905258] ? filename_parentat+0x550/0x550 [ 2233.909651] ? strncpy_from_user+0x323/0x430 [ 2233.914052] ? mpi_resize+0x200/0x200 [ 2233.917834] ? map_files_get_link+0x3a0/0x3a0 [ 2233.922318] ? getname_flags+0x256/0x580 [ 2233.926358] user_path_at_empty+0x40/0x50 [ 2233.930479] ? user_path_at_empty+0x40/0x50 [ 2233.934793] do_mount+0x15f/0x2bb0 [ 2233.938326] ? copy_mount_string+0x40/0x40 [ 2233.942540] ? rcu_pm_notify+0xc0/0xc0 [ 2233.946414] ? copy_mount_options+0x5f/0x2e0 [ 2233.950796] ? rcu_read_lock_sched_held+0x108/0x120 [ 2233.955794] ? kmem_cache_alloc_trace+0x459/0x740 [ 2233.960620] ? kasan_check_write+0x14/0x20 [ 2233.964830] ? _copy_from_user+0x99/0x110 [ 2233.968960] ? copy_mount_options+0x1f7/0x2e0 [ 2233.973438] SyS_mount+0xab/0x120 [ 2233.976868] ? copy_mnt_ns+0xb30/0xb30 [ 2233.980741] do_syscall_64+0x281/0x940 [ 2233.984611] ? __do_page_fault+0xc90/0xc90 [ 2233.988827] ? _raw_spin_unlock_irq+0x27/0x70 [ 2233.993303] ? finish_task_switch+0x1c1/0x7e0 [ 2233.997774] ? syscall_return_slowpath+0x550/0x550 [ 2234.002678] ? syscall_return_slowpath+0x2ac/0x550 [ 2234.007584] ? prepare_exit_to_usermode+0x350/0x350 [ 2234.012576] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2234.017931] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2234.022776] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2234.027951] RIP: 0033:0x4548b9 [ 2234.031115] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2234.038801] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2234.046044] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2234.053295] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 2018/03/29 11:40:24 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:24 executing program 5 (fault-call:10 fault-nth:6): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2234.060537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2234.067784] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000005 2018/03/29 11:40:24 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2234.132241] FAULT_INJECTION: forcing a failure. [ 2234.132241] name failslab, interval 1, probability 0, space 0, times 0 [ 2234.143473] CPU: 0 PID: 26451 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2234.150732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2234.160075] Call Trace: [ 2234.162651] dump_stack+0x194/0x24d [ 2234.166263] ? arch_local_irq_restore+0x53/0x53 [ 2234.170930] should_fail+0x8c0/0xa40 [ 2234.174716] ? d_alloc_parallel+0x84e/0x1b40 [ 2234.179103] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2234.184186] ? lock_release+0xa40/0xa40 [ 2234.188133] ? _raw_spin_unlock+0x22/0x30 [ 2234.192272] ? find_held_lock+0x35/0x1d0 [ 2234.196317] ? __lock_is_held+0xb6/0x140 [ 2234.200378] ? check_same_owner+0x320/0x320 [ 2234.204678] ? rcu_note_context_switch+0x710/0x710 [ 2234.209592] should_failslab+0xec/0x120 [ 2234.213543] kmem_cache_alloc+0x47/0x760 [ 2234.217587] ? proc_i_callback+0x30/0x30 [ 2234.221627] proc_alloc_inode+0x1b/0x190 [ 2234.225665] alloc_inode+0x65/0x180 [ 2234.229265] new_inode_pseudo+0x69/0x190 [ 2234.233302] ? prune_icache_sb+0x1a0/0x1a0 [ 2234.237513] ? rcu_note_context_switch+0x710/0x710 [ 2234.242427] proc_get_inode+0x20/0x620 [ 2234.246295] proc_lookup_de+0xd4/0x160 [ 2234.250160] proc_lookup+0x3c/0x50 [ 2234.253688] proc_root_lookup+0x41/0x60 [ 2234.257644] lookup_slow+0x282/0x4d0 [ 2234.261426] ? vfs_unlink+0x480/0x480 [ 2234.265210] ? lookup_fast+0x505/0xfa0 [ 2234.269098] walk_component+0x89f/0x13d0 [ 2234.273142] ? follow_dotdot_rcu+0x1150/0x1150 [ 2234.277712] ? save_stack+0xa3/0xd0 [ 2234.281314] ? save_stack+0x43/0xd0 [ 2234.284913] ? kasan_kmalloc+0xad/0xe0 [ 2234.288773] ? kasan_slab_alloc+0x12/0x20 [ 2234.292905] ? kmem_cache_alloc+0x12e/0x760 [ 2234.297212] ? getname_flags+0xcb/0x580 [ 2234.301167] path_lookupat+0x1d7/0xba0 [ 2234.305038] ? path_parentat+0x140/0x140 [ 2234.309076] ? check_stack_object+0x68/0x140 [ 2234.313464] ? __check_object_size+0x8b/0x530 [ 2234.317938] ? usercopy_abort+0xd0/0xd0 [ 2234.321898] filename_lookup+0x25f/0x500 [ 2234.325938] ? filename_parentat+0x550/0x550 [ 2234.330328] ? strncpy_from_user+0x323/0x430 [ 2234.334721] ? mpi_resize+0x200/0x200 [ 2234.338499] ? map_files_get_link+0x3a0/0x3a0 [ 2234.343002] ? getname_flags+0x256/0x580 [ 2234.347050] user_path_at_empty+0x40/0x50 [ 2234.351170] ? user_path_at_empty+0x40/0x50 [ 2234.355471] do_mount+0x15f/0x2bb0 [ 2234.358993] ? copy_mount_string+0x40/0x40 [ 2234.363209] ? rcu_pm_notify+0xc0/0xc0 [ 2234.367081] ? copy_mount_options+0x5f/0x2e0 [ 2234.371465] ? rcu_read_lock_sched_held+0x108/0x120 [ 2234.376456] ? kmem_cache_alloc_trace+0x459/0x740 [ 2234.381278] ? kasan_check_write+0x14/0x20 [ 2234.385487] ? _copy_from_user+0x99/0x110 [ 2234.389632] ? copy_mount_options+0x1f7/0x2e0 [ 2234.394114] SyS_mount+0xab/0x120 [ 2234.397543] ? copy_mnt_ns+0xb30/0xb30 [ 2234.401411] do_syscall_64+0x281/0x940 [ 2234.405275] ? __do_page_fault+0xc90/0xc90 [ 2234.409484] ? _raw_spin_unlock_irq+0x27/0x70 [ 2234.413955] ? finish_task_switch+0x1c1/0x7e0 [ 2234.418428] ? syscall_return_slowpath+0x550/0x550 [ 2234.423336] ? syscall_return_slowpath+0x2ac/0x550 [ 2234.428243] ? prepare_exit_to_usermode+0x350/0x350 [ 2234.433361] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2234.438706] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2234.443531] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2234.448698] RIP: 0033:0x4548b9 [ 2234.451860] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2234.459634] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2234.466877] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2234.474120] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 2018/03/29 11:40:25 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2234.481365] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2234.488622] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000006 2018/03/29 11:40:25 executing program 5 (fault-call:10 fault-nth:7): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2234.571933] FAULT_INJECTION: forcing a failure. [ 2234.571933] name failslab, interval 1, probability 0, space 0, times 0 [ 2234.583174] CPU: 1 PID: 26458 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2234.590426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2234.599762] Call Trace: [ 2234.602336] dump_stack+0x194/0x24d [ 2234.605944] ? arch_local_irq_restore+0x53/0x53 [ 2234.610594] ? __kernel_text_address+0xd/0x40 [ 2234.615074] should_fail+0x8c0/0xa40 [ 2234.618771] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2234.623855] ? save_stack+0xa3/0xd0 [ 2234.627461] ? save_stack+0x43/0xd0 [ 2234.631068] ? kasan_kmalloc+0xad/0xe0 [ 2234.634932] ? kasan_slab_alloc+0x12/0x20 [ 2234.639052] ? kmem_cache_alloc+0x12e/0x760 [ 2234.643347] ? alloc_vfsmnt+0xe0/0x9c0 [ 2234.647207] ? vfs_kern_mount.part.26+0x84/0x4a0 [ 2234.651937] ? do_mount+0xea4/0x2bb0 [ 2234.655632] ? find_held_lock+0x35/0x1d0 [ 2234.659695] ? check_same_owner+0x320/0x320 [ 2234.663998] ? rcu_note_context_switch+0x710/0x710 [ 2234.668917] should_failslab+0xec/0x120 [ 2234.672963] __kmalloc_track_caller+0x5f/0x760 [ 2234.677528] ? do_raw_spin_trylock+0x190/0x190 [ 2234.682172] ? kstrdup_const+0x39/0x50 [ 2234.686042] kstrdup+0x39/0x70 [ 2234.689212] kstrdup_const+0x39/0x50 [ 2234.693434] alloc_vfsmnt+0x1a5/0x9c0 [ 2234.697224] ? path_lookupat+0x238/0xba0 [ 2234.701261] ? mnt_free_id.isra.21+0x50/0x50 [ 2234.705652] ? trace_hardirqs_off+0x10/0x10 [ 2234.709955] ? putname+0xee/0x130 [ 2234.713389] ? putname+0xee/0x130 [ 2234.716819] ? rcu_read_lock_sched_held+0x108/0x120 [ 2234.721816] ? find_held_lock+0x35/0x1d0 [ 2234.725862] ? __get_fs_type+0x8a/0xc0 [ 2234.729726] ? lock_downgrade+0x980/0x980 [ 2234.733851] ? module_unload_free+0x5b0/0x5b0 [ 2234.738323] ? lock_release+0xa40/0xa40 [ 2234.742295] ? mpi_resize+0x200/0x200 [ 2234.746086] vfs_kern_mount.part.26+0x84/0x4a0 [ 2234.750650] ? may_umount+0xa0/0xa0 [ 2234.754254] ? _raw_read_unlock+0x22/0x30 [ 2234.758377] ? __get_fs_type+0x8a/0xc0 [ 2234.762247] do_mount+0xea4/0x2bb0 [ 2234.765773] ? copy_mount_string+0x40/0x40 [ 2234.769985] ? rcu_pm_notify+0xc0/0xc0 [ 2234.773862] ? copy_mount_options+0x5f/0x2e0 [ 2234.778246] ? rcu_read_lock_sched_held+0x108/0x120 [ 2234.783238] ? kmem_cache_alloc_trace+0x459/0x740 [ 2234.788065] ? kasan_check_write+0x14/0x20 [ 2234.792276] ? _copy_from_user+0x99/0x110 [ 2234.796407] ? copy_mount_options+0x1f7/0x2e0 [ 2234.800883] SyS_mount+0xab/0x120 [ 2234.804311] ? copy_mnt_ns+0xb30/0xb30 [ 2234.808177] do_syscall_64+0x281/0x940 [ 2234.812135] ? __do_page_fault+0xc90/0xc90 [ 2234.816342] ? _raw_spin_unlock_irq+0x27/0x70 [ 2234.820835] ? finish_task_switch+0x1c1/0x7e0 [ 2234.825308] ? syscall_return_slowpath+0x550/0x550 [ 2234.830215] ? syscall_return_slowpath+0x2ac/0x550 [ 2234.835123] ? prepare_exit_to_usermode+0x350/0x350 [ 2234.840116] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2234.845461] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2234.850286] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2234.855451] RIP: 0033:0x4548b9 [ 2234.858617] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2234.866302] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2234.873545] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2234.880793] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2234.888045] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2234.895295] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000007 [ 2235.888922] IPVS: ftp: loaded support on port[0] = 21 [ 2235.915081] IPVS: ftp: loaded support on port[0] = 21 [ 2235.952262] IPVS: ftp: loaded support on port[0] = 21 [ 2235.990492] IPVS: ftp: loaded support on port[0] = 21 [ 2236.031721] IPVS: ftp: loaded support on port[0] = 21 [ 2236.079894] IPVS: ftp: loaded support on port[0] = 21 [ 2236.124740] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:26 executing program 5 (fault-call:10 fault-nth:8): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:26 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x0, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:26 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e40)=""/29, 0x1d}], 0x1, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:26 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000001080)={0x0, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r4) recvmsg$kcm(r3, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:26 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:26 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0x0, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:26 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x0, 0x8000, 0x0, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:26 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x0, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2236.239151] FAULT_INJECTION: forcing a failure. [ 2236.239151] name failslab, interval 1, probability 0, space 0, times 0 [ 2236.250417] CPU: 0 PID: 26499 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2236.257688] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2236.267038] Call Trace: [ 2236.269632] dump_stack+0x194/0x24d [ 2236.273264] ? arch_local_irq_restore+0x53/0x53 [ 2236.277939] ? __kernel_text_address+0xd/0x40 [ 2236.282448] should_fail+0x8c0/0xa40 [ 2236.286165] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2236.291453] ? save_stack+0xa3/0xd0 [ 2236.295079] ? save_stack+0x43/0xd0 [ 2236.298697] ? kasan_kmalloc+0xad/0xe0 [ 2236.302575] ? kasan_slab_alloc+0x12/0x20 [ 2236.306712] ? kmem_cache_alloc+0x12e/0x760 [ 2236.311024] ? alloc_vfsmnt+0xe0/0x9c0 [ 2236.314904] ? vfs_kern_mount.part.26+0x84/0x4a0 [ 2236.319649] ? do_mount+0xea4/0x2bb0 [ 2236.323364] ? find_held_lock+0x35/0x1d0 [ 2236.327474] ? check_same_owner+0x320/0x320 [ 2236.331788] ? rcu_note_context_switch+0x710/0x710 [ 2236.336720] should_failslab+0xec/0x120 [ 2236.340688] __kmalloc_track_caller+0x5f/0x760 [ 2236.345268] ? do_raw_spin_trylock+0x190/0x190 [ 2236.349838] ? kstrdup_const+0x39/0x50 [ 2236.353724] kstrdup+0x39/0x70 [ 2236.356912] kstrdup_const+0x39/0x50 [ 2236.360619] alloc_vfsmnt+0x1a5/0x9c0 [ 2236.364415] ? path_lookupat+0x238/0xba0 [ 2236.368915] ? mnt_free_id.isra.21+0x50/0x50 [ 2236.373353] ? trace_hardirqs_off+0x10/0x10 [ 2236.377672] ? putname+0xee/0x130 [ 2236.381121] ? putname+0xee/0x130 [ 2236.384566] ? rcu_read_lock_sched_held+0x108/0x120 2018/03/29 11:40:27 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6, 0x0, 0x0, 0x5ea}, 0x0) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2236.389593] ? find_held_lock+0x35/0x1d0 [ 2236.393704] ? __get_fs_type+0x8a/0xc0 [ 2236.397591] ? lock_downgrade+0x980/0x980 [ 2236.401731] ? module_unload_free+0x5b0/0x5b0 [ 2236.406229] ? lock_release+0xa40/0xa40 [ 2236.410210] ? mpi_resize+0x200/0x200 [ 2236.414021] vfs_kern_mount.part.26+0x84/0x4a0 [ 2236.418610] ? may_umount+0xa0/0xa0 [ 2236.422214] ? _raw_read_unlock+0x22/0x30 [ 2236.426337] ? __get_fs_type+0x8a/0xc0 [ 2236.430217] do_mount+0xea4/0x2bb0 [ 2236.433741] ? copy_mount_string+0x40/0x40 [ 2236.437953] ? rcu_pm_notify+0xc0/0xc0 [ 2236.441823] ? copy_mount_options+0x5f/0x2e0 [ 2236.446204] ? rcu_read_lock_sched_held+0x108/0x120 [ 2236.451195] ? kmem_cache_alloc_trace+0x459/0x740 [ 2236.456126] ? kasan_check_write+0x14/0x20 [ 2236.460337] ? _copy_from_user+0x99/0x110 [ 2236.464466] ? copy_mount_options+0x1f7/0x2e0 [ 2236.468943] SyS_mount+0xab/0x120 [ 2236.472383] ? copy_mnt_ns+0xb30/0xb30 [ 2236.476254] do_syscall_64+0x281/0x940 [ 2236.480118] ? __do_page_fault+0xc90/0xc90 [ 2236.484328] ? finish_task_switch+0x1c1/0x7e0 [ 2236.488813] ? syscall_return_slowpath+0x550/0x550 [ 2236.493718] ? syscall_return_slowpath+0x2ac/0x550 [ 2236.498621] ? prepare_exit_to_usermode+0x350/0x350 [ 2236.503617] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2236.508961] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2236.513786] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2236.518954] RIP: 0033:0x4548b9 [ 2236.522120] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2236.529805] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 2018/03/29 11:40:27 executing program 5 (fault-call:10 fault-nth:9): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2236.537049] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2236.544291] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2236.551543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2236.558800] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000008 [ 2236.602279] FAULT_INJECTION: forcing a failure. [ 2236.602279] name failslab, interval 1, probability 0, space 0, times 0 [ 2236.613685] CPU: 1 PID: 26505 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2236.620962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2236.630306] Call Trace: [ 2236.632878] dump_stack+0x194/0x24d [ 2236.636492] ? arch_local_irq_restore+0x53/0x53 [ 2236.641156] should_fail+0x8c0/0xa40 [ 2236.644852] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2236.649935] ? find_next_zero_bit+0xe3/0x110 [ 2236.654322] ? trace_hardirqs_off+0x10/0x10 [ 2236.658628] ? __lock_is_held+0xb6/0x140 [ 2236.662671] ? find_held_lock+0x35/0x1d0 [ 2236.666714] ? __lock_is_held+0xb6/0x140 [ 2236.670766] ? check_same_owner+0x320/0x320 [ 2236.675064] ? rcu_note_context_switch+0x710/0x710 [ 2236.679971] ? rcu_note_context_switch+0x710/0x710 [ 2236.684894] should_failslab+0xec/0x120 [ 2236.688845] __kmalloc+0x63/0x760 [ 2236.692278] ? lockdep_init_map+0x9/0x10 [ 2236.696315] ? debug_mutex_init+0x2d/0x60 [ 2236.700439] ? __list_lru_init+0xcf/0x750 [ 2236.704570] __list_lru_init+0xcf/0x750 [ 2236.708530] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2236.714398] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2236.719397] ? __lockdep_init_map+0xe4/0x650 [ 2236.723786] ? lockdep_init_map+0x9/0x10 [ 2236.727826] sget_userns+0x691/0xe40 [ 2236.731516] ? set_anon_super+0x20/0x20 [ 2236.735472] ? put_filp+0x90/0x90 [ 2236.738902] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2236.743985] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2236.748983] ? trace_hardirqs_off+0x10/0x10 [ 2236.753285] ? putname+0xee/0x130 [ 2236.756721] ? cap_capable+0x1b5/0x230 [ 2236.760591] ? security_capable+0x8e/0xc0 [ 2236.764731] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2236.769897] ? ns_capable_common+0xcf/0x160 [ 2236.774202] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2236.779366] mount_ns+0x6d/0x190 [ 2236.782717] rpc_mount+0x9e/0xd0 [ 2236.786062] mount_fs+0x66/0x2d0 [ 2236.789420] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2236.793982] ? may_umount+0xa0/0xa0 [ 2236.797587] ? _raw_read_unlock+0x22/0x30 [ 2236.801721] ? __get_fs_type+0x8a/0xc0 [ 2236.805604] do_mount+0xea4/0x2bb0 [ 2236.809129] ? copy_mount_string+0x40/0x40 [ 2236.813430] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2236.818425] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2236.823162] ? retint_kernel+0x10/0x10 [ 2236.827042] ? copy_mount_options+0x18b/0x2e0 [ 2236.831519] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 2236.836342] ? copy_mount_options+0x1f7/0x2e0 [ 2236.840823] SyS_mount+0xab/0x120 [ 2236.844253] ? copy_mnt_ns+0xb30/0xb30 [ 2236.848136] do_syscall_64+0x281/0x940 [ 2236.852010] ? __do_page_fault+0xc90/0xc90 [ 2236.856229] ? _raw_spin_unlock_irq+0x27/0x70 [ 2236.860702] ? finish_task_switch+0x1c1/0x7e0 [ 2236.865176] ? syscall_return_slowpath+0x550/0x550 [ 2236.870090] ? syscall_return_slowpath+0x2ac/0x550 [ 2236.875000] ? prepare_exit_to_usermode+0x350/0x350 [ 2236.880005] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2236.885358] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2236.890186] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2236.895351] RIP: 0033:0x4548b9 2018/03/29 11:40:27 executing program 5 (fault-call:10 fault-nth:10): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2236.898516] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2236.906201] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2236.913449] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2236.920696] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2236.927943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2236.935193] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000009 [ 2237.101244] FAULT_INJECTION: forcing a failure. [ 2237.101244] name failslab, interval 1, probability 0, space 0, times 0 [ 2237.112516] CPU: 0 PID: 26510 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2237.119798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2237.129139] Call Trace: [ 2237.131852] dump_stack+0x194/0x24d [ 2237.135491] ? arch_local_irq_restore+0x53/0x53 [ 2237.140175] should_fail+0x8c0/0xa40 [ 2237.143886] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2237.148982] ? find_next_zero_bit+0xe3/0x110 [ 2237.153382] ? trace_hardirqs_off+0x10/0x10 [ 2237.157701] ? __lock_is_held+0xb6/0x140 [ 2237.161758] ? find_held_lock+0x35/0x1d0 [ 2237.165816] ? __lock_is_held+0xb6/0x140 [ 2237.169890] ? check_same_owner+0x320/0x320 [ 2237.174200] ? rcu_note_context_switch+0x710/0x710 [ 2237.179128] ? rcu_note_context_switch+0x710/0x710 [ 2237.184063] should_failslab+0xec/0x120 [ 2237.188029] __kmalloc+0x63/0x760 [ 2237.191478] ? lockdep_init_map+0x9/0x10 [ 2237.195525] ? debug_mutex_init+0x2d/0x60 [ 2237.199658] ? __list_lru_init+0xcf/0x750 [ 2237.203806] __list_lru_init+0xcf/0x750 [ 2237.207780] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2237.213785] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2237.218790] ? __lockdep_init_map+0xe4/0x650 [ 2237.223195] ? lockdep_init_map+0x9/0x10 [ 2237.227248] sget_userns+0x691/0xe40 [ 2237.230945] ? set_anon_super+0x20/0x20 [ 2237.234914] ? put_filp+0x90/0x90 [ 2237.238356] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2237.243453] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2237.248463] ? trace_hardirqs_off+0x10/0x10 [ 2237.252777] ? putname+0xee/0x130 [ 2237.256222] ? cap_capable+0x1b5/0x230 [ 2237.260108] ? security_capable+0x8e/0xc0 [ 2237.264251] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2237.269426] ? ns_capable_common+0xcf/0x160 [ 2237.273747] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2237.278922] mount_ns+0x6d/0x190 [ 2237.282285] rpc_mount+0x9e/0xd0 [ 2237.285644] mount_fs+0x66/0x2d0 [ 2237.289004] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2237.293579] ? may_umount+0xa0/0xa0 [ 2237.297196] ? _raw_read_unlock+0x22/0x30 [ 2237.301346] ? __get_fs_type+0x8a/0xc0 [ 2237.305233] do_mount+0xea4/0x2bb0 [ 2237.308778] ? copy_mount_string+0x40/0x40 [ 2237.313005] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2237.318011] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2237.322768] ? retint_kernel+0x10/0x10 [ 2237.326660] ? copy_mount_options+0x18b/0x2e0 [ 2237.331149] ? __sanitizer_cov_trace_pc+0x1/0x50 [ 2237.335897] ? copy_mount_options+0x1f7/0x2e0 [ 2237.340390] SyS_mount+0xab/0x120 [ 2237.343831] ? copy_mnt_ns+0xb30/0xb30 [ 2237.347708] do_syscall_64+0x281/0x940 [ 2237.351580] ? __do_page_fault+0xc90/0xc90 [ 2237.355799] ? _raw_spin_unlock_irq+0x27/0x70 [ 2237.360282] ? finish_task_switch+0x1c1/0x7e0 [ 2237.364769] ? syscall_return_slowpath+0x550/0x550 [ 2237.369689] ? syscall_return_slowpath+0x2ac/0x550 [ 2237.374611] ? prepare_exit_to_usermode+0x350/0x350 [ 2237.379629] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2237.384989] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2237.390119] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2237.395297] RIP: 0033:0x4548b9 [ 2237.398478] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2237.406176] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2237.413434] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2237.420693] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2237.427957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2237.435215] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000a 2018/03/29 11:40:28 executing program 5 (fault-call:10 fault-nth:11): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2237.705983] FAULT_INJECTION: forcing a failure. [ 2237.705983] name failslab, interval 1, probability 0, space 0, times 0 [ 2237.717281] CPU: 1 PID: 26526 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2237.724541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2237.733879] Call Trace: [ 2237.736460] dump_stack+0x194/0x24d [ 2237.740083] ? arch_local_irq_restore+0x53/0x53 [ 2237.744745] ? rcutorture_record_progress+0x10/0x10 [ 2237.749764] should_fail+0x8c0/0xa40 [ 2237.753479] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2237.758566] ? __kernel_text_address+0xd/0x40 [ 2237.763053] ? unwind_get_return_address+0x61/0xa0 [ 2237.767994] ? find_held_lock+0x35/0x1d0 [ 2237.772058] ? __lock_is_held+0xb6/0x140 [ 2237.776114] ? check_same_owner+0x320/0x320 [ 2237.780418] ? rcu_note_context_switch+0x710/0x710 [ 2237.785331] should_failslab+0xec/0x120 [ 2237.789282] kmem_cache_alloc_trace+0x4b/0x740 [ 2237.793836] ? __kmalloc_node+0x33/0x70 [ 2237.797793] ? __kmalloc_node+0x33/0x70 [ 2237.801764] ? rcu_read_lock_sched_held+0x108/0x120 [ 2237.806790] __memcg_init_list_lru_node+0x169/0x270 [ 2237.811812] ? list_lru_add+0x7c0/0x7c0 [ 2237.815781] ? __kmalloc_node+0x47/0x70 [ 2237.819755] __list_lru_init+0x544/0x750 [ 2237.823807] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2237.829666] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2237.834659] ? __lockdep_init_map+0xe4/0x650 [ 2237.839044] ? lockdep_init_map+0x9/0x10 [ 2237.843083] sget_userns+0x691/0xe40 [ 2237.846772] ? set_anon_super+0x20/0x20 [ 2237.850740] ? put_filp+0x90/0x90 [ 2237.854173] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2237.859256] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2237.864261] ? trace_hardirqs_off+0x10/0x10 [ 2237.868574] ? putname+0xee/0x130 [ 2237.872025] ? cap_capable+0x1b5/0x230 [ 2237.875903] ? security_capable+0x8e/0xc0 [ 2237.880038] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2237.885201] ? ns_capable_common+0xcf/0x160 [ 2237.889504] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2237.894669] mount_ns+0x6d/0x190 [ 2237.898027] rpc_mount+0x9e/0xd0 [ 2237.901382] mount_fs+0x66/0x2d0 [ 2237.904726] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2237.909282] ? may_umount+0xa0/0xa0 [ 2237.912887] ? _raw_read_unlock+0x22/0x30 [ 2237.917013] ? __get_fs_type+0x8a/0xc0 [ 2237.920886] do_mount+0xea4/0x2bb0 [ 2237.924407] ? copy_mount_string+0x40/0x40 [ 2237.928616] ? rcu_pm_notify+0xc0/0xc0 [ 2237.932485] ? copy_mount_options+0x5f/0x2e0 [ 2237.936868] ? rcu_read_lock_sched_held+0x108/0x120 [ 2237.941858] ? kmem_cache_alloc_trace+0x459/0x740 [ 2237.946678] ? kasan_check_write+0x14/0x20 [ 2237.950887] ? _copy_from_user+0x99/0x110 [ 2237.955022] ? copy_mount_options+0x1f7/0x2e0 [ 2237.959500] SyS_mount+0xab/0x120 [ 2237.962936] ? copy_mnt_ns+0xb30/0xb30 [ 2237.966814] do_syscall_64+0x281/0x940 [ 2237.970698] ? __do_page_fault+0xc90/0xc90 [ 2237.974911] ? _raw_spin_unlock_irq+0x27/0x70 [ 2237.979388] ? finish_task_switch+0x1c1/0x7e0 [ 2237.984334] ? syscall_return_slowpath+0x550/0x550 [ 2237.989247] ? syscall_return_slowpath+0x2ac/0x550 [ 2237.994161] ? prepare_exit_to_usermode+0x350/0x350 [ 2237.999159] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2238.004515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2238.009363] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2238.014538] RIP: 0033:0x4548b9 [ 2238.017708] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2238.025431] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2238.032693] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2238.039950] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2238.047211] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 2018/03/29 11:40:28 executing program 5 (fault-call:10 fault-nth:12): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2238.054471] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000b [ 2238.120915] IPVS: ftp: loaded support on port[0] = 21 [ 2238.146915] IPVS: ftp: loaded support on port[0] = 21 [ 2238.172934] FAULT_INJECTION: forcing a failure. [ 2238.172934] name failslab, interval 1, probability 0, space 0, times 0 [ 2238.184297] CPU: 0 PID: 26532 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2238.191571] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2238.200920] Call Trace: [ 2238.203513] dump_stack+0x194/0x24d [ 2238.207152] ? arch_local_irq_restore+0x53/0x53 [ 2238.211838] should_fail+0x8c0/0xa40 [ 2238.213783] IPVS: ftp: loaded support on port[0] = 21 [ 2238.215552] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2238.226013] ? find_next_zero_bit+0xe3/0x110 [ 2238.230419] ? trace_hardirqs_off+0x10/0x10 [ 2238.234745] ? __lock_is_held+0xb6/0x140 [ 2238.238808] ? find_held_lock+0x35/0x1d0 [ 2238.242873] ? __lock_is_held+0xb6/0x140 [ 2238.246953] ? check_same_owner+0x320/0x320 [ 2238.251268] ? rcu_note_context_switch+0x710/0x710 [ 2238.256195] ? rcu_note_context_switch+0x710/0x710 [ 2238.261135] should_failslab+0xec/0x120 [ 2238.265104] __kmalloc+0x63/0x760 [ 2238.268559] ? lockdep_init_map+0x9/0x10 2018/03/29 11:40:28 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001080)={0x0, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r3, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:29 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x0, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2238.272615] ? debug_mutex_init+0x2d/0x60 [ 2238.276755] ? __list_lru_init+0xcf/0x750 [ 2238.280912] __list_lru_init+0xcf/0x750 [ 2238.284898] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2238.290779] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2238.293426] IPVS: ftp: loaded support on port[0] = 21 [ 2238.295790] ? __lockdep_init_map+0xe4/0x650 [ 2238.295808] ? lockdep_init_map+0x9/0x10 [ 2238.295825] sget_userns+0x691/0xe40 [ 2238.313123] ? set_anon_super+0x20/0x20 [ 2238.317103] ? put_filp+0x90/0x90 [ 2238.320555] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2238.325660] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2238.330678] ? trace_hardirqs_off+0x10/0x10 [ 2238.335002] ? putname+0xee/0x130 [ 2238.338452] ? cap_capable+0x1b5/0x230 [ 2238.342344] ? security_capable+0x8e/0xc0 [ 2238.342552] IPVS: ftp: loaded support on port[0] = 21 [ 2238.346483] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2238.346492] ? ns_capable_common+0xcf/0x160 [ 2238.346506] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2238.366316] mount_ns+0x6d/0x190 [ 2238.369686] rpc_mount+0x9e/0xd0 [ 2238.373056] mount_fs+0x66/0x2d0 [ 2238.376426] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2238.381010] ? may_umount+0xa0/0xa0 [ 2238.384633] ? _raw_read_unlock+0x22/0x30 [ 2238.388773] ? __get_fs_type+0x8a/0xc0 [ 2238.392669] do_mount+0xea4/0x2bb0 [ 2238.396212] ? copy_mount_string+0x40/0x40 [ 2238.400453] ? rcu_pm_notify+0xc0/0xc0 [ 2238.404351] ? copy_mount_options+0x5f/0x2e0 [ 2238.408755] ? rcu_read_lock_sched_held+0x108/0x120 [ 2238.413767] ? kmem_cache_alloc_trace+0x459/0x740 [ 2238.418613] ? kasan_check_write+0x14/0x20 [ 2238.422858] ? copy_mount_options+0x1f7/0x2e0 [ 2238.427359] SyS_mount+0xab/0x120 [ 2238.430816] ? copy_mnt_ns+0xb30/0xb30 [ 2238.431513] IPVS: ftp: loaded support on port[0] = 21 [ 2238.434697] do_syscall_64+0x281/0x940 [ 2238.434707] ? __do_page_fault+0xc90/0xc90 [ 2238.434716] ? _raw_spin_unlock_irq+0x27/0x70 [ 2238.434725] ? finish_task_switch+0x1c1/0x7e0 [ 2238.434737] ? syscall_return_slowpath+0x550/0x550 [ 2238.461868] ? syscall_return_slowpath+0x2ac/0x550 [ 2238.466800] ? prepare_exit_to_usermode+0x350/0x350 2018/03/29 11:40:29 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x0, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:29 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6, 0x0, 0x0, 0x5ea}, 0x0) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2238.471814] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2238.477184] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2238.482176] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2238.487355] RIP: 0033:0x4548b9 [ 2238.490536] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2238.498238] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2238.505500] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2238.508942] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:29 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x0, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:29 executing program 5 (fault-call:10 fault-nth:13): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:29 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}], 0x1, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2238.512755] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2238.512761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2238.512767] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000c 2018/03/29 11:40:29 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001080)={0x0, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r3, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:29 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6, 0x0, 0x0, 0x5ea}, 0x0) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2238.631140] FAULT_INJECTION: forcing a failure. [ 2238.631140] name failslab, interval 1, probability 0, space 0, times 0 [ 2238.642445] CPU: 0 PID: 26561 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2238.649716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2238.659065] Call Trace: [ 2238.661656] dump_stack+0x194/0x24d [ 2238.665292] ? arch_local_irq_restore+0x53/0x53 [ 2238.669959] ? __save_stack_trace+0x7e/0xd0 [ 2238.674293] should_fail+0x8c0/0xa40 [ 2238.678012] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2238.683108] ? kasan_kmalloc+0xad/0xe0 [ 2238.686989] ? kmem_cache_alloc_trace+0x136/0x740 [ 2238.691827] ? __memcg_init_list_lru_node+0x169/0x270 [ 2238.697011] ? __list_lru_init+0x544/0x750 [ 2238.701241] ? sget_userns+0x691/0xe40 [ 2238.705119] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2238.709865] ? do_mount+0xea4/0x2bb0 [ 2238.713570] ? SyS_mount+0xab/0x120 [ 2238.717177] ? do_syscall_64+0x281/0x940 [ 2238.721224] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2238.726593] ? find_held_lock+0x35/0x1d0 [ 2238.730646] ? __lock_is_held+0xb6/0x140 [ 2238.734693] ? check_same_owner+0x320/0x320 [ 2238.738992] ? rcu_note_context_switch+0x710/0x710 [ 2238.743916] should_failslab+0xec/0x120 [ 2238.747866] kmem_cache_alloc_trace+0x4b/0x740 [ 2238.752423] ? __kmalloc_node+0x33/0x70 [ 2238.756379] ? __kmalloc_node+0x33/0x70 [ 2238.760329] ? rcu_read_lock_sched_held+0x108/0x120 [ 2238.765326] __memcg_init_list_lru_node+0x169/0x270 [ 2238.770322] ? list_lru_add+0x7c0/0x7c0 [ 2238.774273] ? __kmalloc_node+0x47/0x70 [ 2238.778244] __list_lru_init+0x544/0x750 [ 2238.782285] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2238.788151] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2238.793144] ? __lockdep_init_map+0xe4/0x650 [ 2238.797530] ? lockdep_init_map+0x9/0x10 [ 2238.801569] sget_userns+0x691/0xe40 [ 2238.805256] ? set_anon_super+0x20/0x20 [ 2238.809209] ? put_filp+0x90/0x90 [ 2238.812638] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2238.817731] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2238.822728] ? trace_hardirqs_off+0x10/0x10 [ 2238.827033] ? putname+0xee/0x130 [ 2238.830468] ? cap_capable+0x1b5/0x230 [ 2238.834337] ? security_capable+0x8e/0xc0 [ 2238.838475] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2238.843641] ? ns_capable_common+0xcf/0x160 [ 2238.847942] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2238.853109] mount_ns+0x6d/0x190 [ 2238.856454] rpc_mount+0x9e/0xd0 [ 2238.859807] mount_fs+0x66/0x2d0 [ 2238.863154] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2238.867721] ? may_umount+0xa0/0xa0 [ 2238.871323] ? _raw_read_unlock+0x22/0x30 [ 2238.875446] ? __get_fs_type+0x8a/0xc0 [ 2238.879312] do_mount+0xea4/0x2bb0 [ 2238.882833] ? copy_mount_string+0x40/0x40 [ 2238.887050] ? rcu_pm_notify+0xc0/0xc0 [ 2238.890923] ? copy_mount_options+0x5f/0x2e0 [ 2238.895314] ? rcu_read_lock_sched_held+0x108/0x120 [ 2238.900306] ? kmem_cache_alloc_trace+0x459/0x740 [ 2238.905127] ? kasan_check_write+0x14/0x20 [ 2238.909338] ? _copy_from_user+0x99/0x110 [ 2238.913469] ? copy_mount_options+0x1f7/0x2e0 [ 2238.917945] SyS_mount+0xab/0x120 [ 2238.921375] ? copy_mnt_ns+0xb30/0xb30 [ 2238.925255] do_syscall_64+0x281/0x940 [ 2238.929116] ? __do_page_fault+0xc90/0xc90 [ 2238.933847] ? _raw_spin_unlock_irq+0x27/0x70 [ 2238.938315] ? finish_task_switch+0x1c1/0x7e0 [ 2238.942790] ? syscall_return_slowpath+0x550/0x550 [ 2238.947702] ? syscall_return_slowpath+0x2ac/0x550 [ 2238.952616] ? prepare_exit_to_usermode+0x350/0x350 [ 2238.957612] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2238.962956] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2238.967779] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2238.973070] RIP: 0033:0x4548b9 [ 2238.976232] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2238.983911] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2238.991172] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2238.998416] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2239.005660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2239.012902] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000d [ 2240.285620] IPVS: ftp: loaded support on port[0] = 21 [ 2240.311123] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:31 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x0, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:31 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x0, 0x8000, 0x0, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:31 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x0, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:31 executing program 5 (fault-call:10 fault-nth:14): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:31 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:31 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000001080)={0x0, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r3, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:31 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x0, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:31 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}], 0x1, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2240.419546] FAULT_INJECTION: forcing a failure. [ 2240.419546] name failslab, interval 1, probability 0, space 0, times 0 [ 2240.430853] CPU: 1 PID: 26587 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2240.438125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2240.447479] Call Trace: [ 2240.450071] dump_stack+0x194/0x24d [ 2240.453709] ? arch_local_irq_restore+0x53/0x53 [ 2240.458391] ? __save_stack_trace+0x7e/0xd0 [ 2240.462722] should_fail+0x8c0/0xa40 [ 2240.466443] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2240.471547] ? kasan_kmalloc+0xad/0xe0 [ 2240.475425] ? kmem_cache_alloc_trace+0x136/0x740 [ 2240.480267] ? __memcg_init_list_lru_node+0x169/0x270 [ 2240.485450] ? __list_lru_init+0x544/0x750 [ 2240.489707] ? sget_userns+0x691/0xe40 [ 2240.493596] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2240.498342] ? do_mount+0xea4/0x2bb0 [ 2240.502048] ? SyS_mount+0xab/0x120 [ 2240.505665] ? do_syscall_64+0x281/0x940 [ 2240.509717] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2240.515087] ? find_held_lock+0x35/0x1d0 [ 2240.519154] ? __lock_is_held+0xb6/0x140 [ 2240.523227] ? check_same_owner+0x320/0x320 [ 2240.527550] ? rcu_note_context_switch+0x710/0x710 [ 2240.532486] should_failslab+0xec/0x120 [ 2240.536461] kmem_cache_alloc_trace+0x4b/0x740 [ 2240.541048] ? __kmalloc_node+0x33/0x70 [ 2240.545014] ? __kmalloc_node+0x33/0x70 [ 2240.549890] ? rcu_read_lock_sched_held+0x108/0x120 [ 2240.554913] __memcg_init_list_lru_node+0x169/0x270 [ 2240.559942] ? list_lru_add+0x7c0/0x7c0 [ 2240.563909] ? __kmalloc_node+0x47/0x70 [ 2240.567887] __list_lru_init+0x544/0x750 [ 2240.571947] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2240.577900] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2240.582896] ? __lockdep_init_map+0xe4/0x650 [ 2240.587284] ? lockdep_init_map+0x9/0x10 [ 2240.591325] sget_userns+0x691/0xe40 [ 2240.595017] ? set_anon_super+0x20/0x20 [ 2240.598976] ? put_filp+0x90/0x90 [ 2240.602406] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2240.607491] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2240.612488] ? trace_hardirqs_off+0x10/0x10 [ 2240.616791] ? putname+0xee/0x130 [ 2240.620225] ? cap_capable+0x1b5/0x230 [ 2240.624182] ? security_capable+0x8e/0xc0 [ 2240.628310] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2240.633474] ? ns_capable_common+0xcf/0x160 [ 2240.637777] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2240.642945] mount_ns+0x6d/0x190 [ 2240.646296] rpc_mount+0x9e/0xd0 [ 2240.649640] mount_fs+0x66/0x2d0 [ 2240.652989] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2240.657551] ? may_umount+0xa0/0xa0 [ 2240.661154] ? _raw_read_unlock+0x22/0x30 [ 2240.665276] ? __get_fs_type+0x8a/0xc0 [ 2240.669148] do_mount+0xea4/0x2bb0 [ 2240.672671] ? copy_mount_string+0x40/0x40 [ 2240.676885] ? rcu_pm_notify+0xc0/0xc0 [ 2240.680762] ? copy_mount_options+0x5f/0x2e0 [ 2240.685147] ? rcu_read_lock_sched_held+0x108/0x120 [ 2240.690142] ? kmem_cache_alloc_trace+0x459/0x740 [ 2240.694962] ? kasan_check_write+0x14/0x20 [ 2240.699172] ? _copy_from_user+0x99/0x110 [ 2240.703303] ? copy_mount_options+0x1f7/0x2e0 [ 2240.707781] SyS_mount+0xab/0x120 [ 2240.711213] ? copy_mnt_ns+0xb30/0xb30 [ 2240.715082] do_syscall_64+0x281/0x940 [ 2240.718945] ? __do_page_fault+0xc90/0xc90 [ 2240.723153] ? _raw_spin_unlock_irq+0x27/0x70 [ 2240.727623] ? finish_task_switch+0x1c1/0x7e0 [ 2240.732094] ? syscall_return_slowpath+0x550/0x550 [ 2240.737001] ? syscall_return_slowpath+0x2ac/0x550 [ 2240.741913] ? prepare_exit_to_usermode+0x350/0x350 [ 2240.746905] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2240.752250] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2240.757075] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2240.762239] RIP: 0033:0x4548b9 2018/03/29 11:40:31 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2240.765404] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2240.773088] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2240.780333] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2240.787577] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2240.794823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2240.802071] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000e 2018/03/29 11:40:31 executing program 5 (fault-call:10 fault-nth:15): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2240.951263] FAULT_INJECTION: forcing a failure. [ 2240.951263] name failslab, interval 1, probability 0, space 0, times 0 [ 2240.962541] CPU: 1 PID: 26599 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2240.969792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2240.979125] Call Trace: [ 2240.981696] dump_stack+0x194/0x24d [ 2240.985308] ? arch_local_irq_restore+0x53/0x53 [ 2240.989952] ? __save_stack_trace+0x7e/0xd0 [ 2240.994264] should_fail+0x8c0/0xa40 [ 2240.997958] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2241.003043] ? kasan_kmalloc+0xad/0xe0 [ 2241.006914] ? kmem_cache_alloc_trace+0x136/0x740 [ 2241.011744] ? __memcg_init_list_lru_node+0x169/0x270 [ 2241.016909] ? __list_lru_init+0x544/0x750 [ 2241.021119] ? sget_userns+0x691/0xe40 [ 2241.025000] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2241.029738] ? do_mount+0xea4/0x2bb0 [ 2241.033426] ? SyS_mount+0xab/0x120 [ 2241.037030] ? do_syscall_64+0x281/0x940 [ 2241.041068] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2241.046414] ? find_held_lock+0x35/0x1d0 [ 2241.050457] ? __lock_is_held+0xb6/0x140 [ 2241.054513] ? check_same_owner+0x320/0x320 [ 2241.058814] ? rcu_note_context_switch+0x710/0x710 [ 2241.063730] should_failslab+0xec/0x120 [ 2241.067681] kmem_cache_alloc_trace+0x4b/0x740 [ 2241.072239] ? __kmalloc_node+0x33/0x70 [ 2241.076189] ? __kmalloc_node+0x33/0x70 [ 2241.080143] ? rcu_read_lock_sched_held+0x108/0x120 [ 2241.085143] __memcg_init_list_lru_node+0x169/0x270 [ 2241.090139] ? list_lru_add+0x7c0/0x7c0 [ 2241.094089] ? __kmalloc_node+0x47/0x70 [ 2241.098048] __list_lru_init+0x544/0x750 [ 2241.102093] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2241.107956] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2241.112954] ? __lockdep_init_map+0xe4/0x650 [ 2241.117345] ? lockdep_init_map+0x9/0x10 [ 2241.121386] sget_userns+0x691/0xe40 [ 2241.125074] ? set_anon_super+0x20/0x20 [ 2241.129032] ? put_filp+0x90/0x90 [ 2241.132465] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2241.137557] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2241.142563] ? trace_hardirqs_off+0x10/0x10 [ 2241.146862] ? putname+0xee/0x130 [ 2241.150298] ? cap_capable+0x1b5/0x230 [ 2241.154174] ? security_capable+0x8e/0xc0 [ 2241.158300] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2241.163469] ? ns_capable_common+0xcf/0x160 [ 2241.167769] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2241.172935] mount_ns+0x6d/0x190 [ 2241.176370] rpc_mount+0x9e/0xd0 [ 2241.179718] mount_fs+0x66/0x2d0 [ 2241.183069] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2241.187630] ? may_umount+0xa0/0xa0 [ 2241.191234] ? _raw_read_unlock+0x22/0x30 [ 2241.195358] ? __get_fs_type+0x8a/0xc0 [ 2241.199257] do_mount+0xea4/0x2bb0 [ 2241.202781] ? copy_mount_string+0x40/0x40 [ 2241.206995] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2241.211993] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2241.216744] ? retint_kernel+0x10/0x10 [ 2241.220617] ? copy_mount_options+0x18b/0x2e0 [ 2241.225093] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 2241.229914] ? copy_mount_options+0x1f7/0x2e0 [ 2241.234391] SyS_mount+0xab/0x120 [ 2241.237820] ? copy_mnt_ns+0xb30/0xb30 [ 2241.241688] do_syscall_64+0x281/0x940 [ 2241.245550] ? __do_page_fault+0xc90/0xc90 [ 2241.249760] ? _raw_spin_unlock_irq+0x27/0x70 [ 2241.254234] ? finish_task_switch+0x1c1/0x7e0 [ 2241.258708] ? syscall_return_slowpath+0x550/0x550 [ 2241.263614] ? syscall_return_slowpath+0x2ac/0x550 [ 2241.268523] ? prepare_exit_to_usermode+0x350/0x350 [ 2241.273516] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2241.278860] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2241.283686] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2241.288851] RIP: 0033:0x4548b9 [ 2241.292020] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2241.299704] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2241.307052] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2241.314296] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2241.321544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2241.328789] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000000f [ 2242.503588] IPVS: ftp: loaded support on port[0] = 21 [ 2242.530114] IPVS: ftp: loaded support on port[0] = 21 [ 2242.568706] IPVS: ftp: loaded support on port[0] = 21 [ 2242.609228] IPVS: ftp: loaded support on port[0] = 21 [ 2242.647803] IPVS: ftp: loaded support on port[0] = 21 [ 2242.701634] IPVS: ftp: loaded support on port[0] = 21 [ 2242.738080] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:33 executing program 5 (fault-call:10 fault-nth:16): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:33 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x0, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:33 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:33 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x0, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:33 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x0, 0x8000, 0x0, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:33 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}], 0x1, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:33 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:33 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0x0, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2242.831662] FAULT_INJECTION: forcing a failure. [ 2242.831662] name failslab, interval 1, probability 0, space 0, times 0 [ 2242.842928] CPU: 0 PID: 26637 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2242.850201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2242.859554] Call Trace: [ 2242.862146] dump_stack+0x194/0x24d [ 2242.865779] ? arch_local_irq_restore+0x53/0x53 [ 2242.870450] ? __save_stack_trace+0x7e/0xd0 [ 2242.874786] should_fail+0x8c0/0xa40 [ 2242.878505] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2242.883599] ? kasan_kmalloc+0xad/0xe0 [ 2242.887478] ? kmem_cache_alloc_trace+0x136/0x740 [ 2242.892316] ? __memcg_init_list_lru_node+0x169/0x270 [ 2242.897502] ? __list_lru_init+0x544/0x750 [ 2242.901728] ? sget_userns+0x691/0xe40 [ 2242.905615] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2242.910360] ? do_mount+0xea4/0x2bb0 [ 2242.914064] ? SyS_mount+0xab/0x120 [ 2242.917685] ? do_syscall_64+0x281/0x940 [ 2242.921741] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2242.927111] ? find_held_lock+0x35/0x1d0 [ 2242.931178] ? __lock_is_held+0xb6/0x140 [ 2242.935402] ? check_same_owner+0x320/0x320 [ 2242.939723] ? rcu_note_context_switch+0x710/0x710 [ 2242.944673] should_failslab+0xec/0x120 [ 2242.948641] kmem_cache_alloc_trace+0x4b/0x740 [ 2242.953335] ? __kmalloc_node+0x33/0x70 [ 2242.957298] ? __kmalloc_node+0x33/0x70 [ 2242.961349] ? rcu_read_lock_sched_held+0x108/0x120 [ 2242.966369] __memcg_init_list_lru_node+0x169/0x270 [ 2242.971388] ? list_lru_add+0x7c0/0x7c0 [ 2242.975359] ? __kmalloc_node+0x47/0x70 [ 2242.979341] __list_lru_init+0x544/0x750 [ 2242.983404] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2242.989287] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2242.994301] ? __lockdep_init_map+0xe4/0x650 [ 2242.998708] ? lockdep_init_map+0x9/0x10 [ 2243.002768] sget_userns+0x691/0xe40 [ 2243.006474] ? set_anon_super+0x20/0x20 [ 2243.010435] ? put_filp+0x90/0x90 [ 2243.013873] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2243.018954] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2243.025301] ? trace_hardirqs_off+0x10/0x10 [ 2243.029608] ? putname+0xee/0x130 [ 2243.033049] ? cap_capable+0x1b5/0x230 [ 2243.036936] ? security_capable+0x8e/0xc0 [ 2243.041076] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2243.046246] ? ns_capable_common+0xcf/0x160 [ 2243.050558] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2243.055731] mount_ns+0x6d/0x190 [ 2243.059082] rpc_mount+0x9e/0xd0 [ 2243.062427] mount_fs+0x66/0x2d0 [ 2243.065790] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2243.070349] ? may_umount+0xa0/0xa0 [ 2243.073964] ? _raw_read_unlock+0x22/0x30 [ 2243.078086] ? __get_fs_type+0x8a/0xc0 [ 2243.081959] do_mount+0xea4/0x2bb0 [ 2243.085486] ? copy_mount_string+0x40/0x40 [ 2243.089696] ? rcu_pm_notify+0xc0/0xc0 [ 2243.093567] ? copy_mount_options+0x5f/0x2e0 [ 2243.097972] ? rcu_read_lock_sched_held+0x108/0x120 [ 2243.102965] ? kmem_cache_alloc_trace+0x459/0x740 [ 2243.107795] ? kasan_check_write+0x14/0x20 [ 2243.112005] ? _copy_from_user+0x99/0x110 [ 2243.116141] ? copy_mount_options+0x1f7/0x2e0 [ 2243.120628] SyS_mount+0xab/0x120 [ 2243.124210] ? copy_mnt_ns+0xb30/0xb30 [ 2243.128085] do_syscall_64+0x281/0x940 [ 2243.131945] ? __do_page_fault+0xc90/0xc90 [ 2243.136161] ? _raw_spin_unlock_irq+0x27/0x70 [ 2243.140631] ? finish_task_switch+0x1c1/0x7e0 [ 2243.145111] ? syscall_return_slowpath+0x550/0x550 [ 2243.150033] ? syscall_return_slowpath+0x2ac/0x550 [ 2243.154946] ? prepare_exit_to_usermode+0x350/0x350 [ 2243.159939] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2243.165286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2243.170110] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2243.175283] RIP: 0033:0x4548b9 2018/03/29 11:40:33 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:33 executing program 5 (fault-call:10 fault-nth:17): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2243.178458] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2243.186141] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2243.193391] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2243.200741] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2243.208154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2243.215400] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000010 [ 2243.284899] FAULT_INJECTION: forcing a failure. [ 2243.284899] name failslab, interval 1, probability 0, space 0, times 0 [ 2243.296366] CPU: 0 PID: 26643 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2243.303623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2243.312961] Call Trace: [ 2243.315538] dump_stack+0x194/0x24d [ 2243.319147] ? arch_local_irq_restore+0x53/0x53 [ 2243.324313] ? __save_stack_trace+0x7e/0xd0 [ 2243.328624] should_fail+0x8c0/0xa40 [ 2243.332319] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2243.337399] ? kasan_kmalloc+0xad/0xe0 [ 2243.341262] ? kmem_cache_alloc_trace+0x136/0x740 [ 2243.346079] ? __memcg_init_list_lru_node+0x169/0x270 [ 2243.351253] ? __list_lru_init+0x544/0x750 [ 2243.355461] ? sget_userns+0x691/0xe40 [ 2243.359331] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2243.364065] ? do_mount+0xea4/0x2bb0 [ 2243.367770] ? SyS_mount+0xab/0x120 [ 2243.371373] ? do_syscall_64+0x281/0x940 [ 2243.375411] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2243.380785] ? find_held_lock+0x35/0x1d0 [ 2243.384831] ? __lock_is_held+0xb6/0x140 [ 2243.388883] ? check_same_owner+0x320/0x320 [ 2243.393185] ? rcu_note_context_switch+0x710/0x710 [ 2243.398098] should_failslab+0xec/0x120 [ 2243.402049] kmem_cache_alloc_trace+0x4b/0x740 [ 2243.406617] ? __kmalloc_node+0x33/0x70 [ 2243.410564] ? __kmalloc_node+0x33/0x70 [ 2243.414514] ? rcu_read_lock_sched_held+0x108/0x120 [ 2243.419513] __memcg_init_list_lru_node+0x169/0x270 [ 2243.424524] ? list_lru_add+0x7c0/0x7c0 [ 2243.428475] ? __kmalloc_node+0x47/0x70 [ 2243.432434] __list_lru_init+0x544/0x750 [ 2243.436480] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2243.442344] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2243.447338] ? __lockdep_init_map+0xe4/0x650 [ 2243.451725] ? lockdep_init_map+0x9/0x10 [ 2243.455772] sget_userns+0x691/0xe40 [ 2243.459461] ? set_anon_super+0x20/0x20 [ 2243.463417] ? put_filp+0x90/0x90 [ 2243.467283] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2243.472368] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2243.477366] ? trace_hardirqs_off+0x10/0x10 [ 2243.481667] ? putname+0xee/0x130 [ 2243.485102] ? cap_capable+0x1b5/0x230 [ 2243.488974] ? security_capable+0x8e/0xc0 [ 2243.493102] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2243.498266] ? ns_capable_common+0xcf/0x160 [ 2243.502568] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2243.507734] mount_ns+0x6d/0x190 [ 2243.511081] rpc_mount+0x9e/0xd0 [ 2243.514431] mount_fs+0x66/0x2d0 [ 2243.517783] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2243.522344] ? may_umount+0xa0/0xa0 [ 2243.525948] ? _raw_read_unlock+0x22/0x30 [ 2243.530074] ? __get_fs_type+0x8a/0xc0 [ 2243.533947] do_mount+0xea4/0x2bb0 [ 2243.537471] ? copy_mount_string+0x40/0x40 [ 2243.541685] ? rcu_pm_notify+0xc0/0xc0 [ 2243.545558] ? copy_mount_options+0x5f/0x2e0 [ 2243.550065] ? rcu_read_lock_sched_held+0x108/0x120 [ 2243.555057] ? kmem_cache_alloc_trace+0x459/0x740 [ 2243.559890] ? copy_mount_options+0x1f7/0x2e0 [ 2243.564368] SyS_mount+0xab/0x120 [ 2243.567806] ? copy_mnt_ns+0xb30/0xb30 [ 2243.571675] do_syscall_64+0x281/0x940 [ 2243.575538] ? __do_page_fault+0xc90/0xc90 [ 2243.579754] ? _raw_spin_unlock_irq+0x27/0x70 [ 2243.584225] ? finish_task_switch+0x1c1/0x7e0 [ 2243.588695] ? syscall_return_slowpath+0x550/0x550 [ 2243.593601] ? syscall_return_slowpath+0x2ac/0x550 [ 2243.598506] ? prepare_exit_to_usermode+0x350/0x350 [ 2243.603500] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2243.608844] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2243.613671] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2243.618835] RIP: 0033:0x4548b9 [ 2243.622006] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 11:40:34 executing program 5 (fault-call:10 fault-nth:18): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2243.629707] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2243.636957] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2243.644291] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2243.651537] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2243.658783] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000011 [ 2243.700823] FAULT_INJECTION: forcing a failure. [ 2243.700823] name failslab, interval 1, probability 0, space 0, times 0 [ 2243.712872] CPU: 1 PID: 26648 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2243.720140] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2243.729486] Call Trace: [ 2243.732060] dump_stack+0x194/0x24d [ 2243.735683] ? arch_local_irq_restore+0x53/0x53 [ 2243.740332] ? __save_stack_trace+0x7e/0xd0 [ 2243.744644] should_fail+0x8c0/0xa40 [ 2243.748341] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2243.753421] ? kasan_kmalloc+0xad/0xe0 [ 2243.757283] ? kmem_cache_alloc_trace+0x136/0x740 [ 2243.762102] ? __memcg_init_list_lru_node+0x169/0x270 [ 2243.767268] ? __list_lru_init+0x544/0x750 [ 2243.771476] ? sget_userns+0x691/0xe40 [ 2243.775343] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2243.780072] ? do_mount+0xea4/0x2bb0 [ 2243.783761] ? SyS_mount+0xab/0x120 [ 2243.787363] ? do_syscall_64+0x281/0x940 [ 2243.791402] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2243.796748] ? find_held_lock+0x35/0x1d0 [ 2243.800793] ? __lock_is_held+0xb6/0x140 [ 2243.804847] ? check_same_owner+0x320/0x320 [ 2243.809149] ? rcu_note_context_switch+0x710/0x710 [ 2243.814063] should_failslab+0xec/0x120 [ 2243.818019] kmem_cache_alloc_trace+0x4b/0x740 [ 2243.822577] ? __kmalloc_node+0x33/0x70 [ 2243.826525] ? __kmalloc_node+0x33/0x70 [ 2243.830474] ? rcu_read_lock_sched_held+0x108/0x120 [ 2243.835472] __memcg_init_list_lru_node+0x169/0x270 [ 2243.840469] ? list_lru_add+0x7c0/0x7c0 [ 2243.844419] ? __kmalloc_node+0x47/0x70 [ 2243.848381] __list_lru_init+0x544/0x750 [ 2243.852425] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2243.858288] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2243.863285] ? __lockdep_init_map+0xe4/0x650 [ 2243.867676] ? lockdep_init_map+0x9/0x10 [ 2243.871716] sget_userns+0x691/0xe40 [ 2243.875405] ? set_anon_super+0x20/0x20 [ 2243.879362] ? put_filp+0x90/0x90 [ 2243.882793] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2243.887878] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2243.892885] ? trace_hardirqs_off+0x10/0x10 [ 2243.897186] ? putname+0xee/0x130 [ 2243.900632] ? cap_capable+0x1b5/0x230 [ 2243.904502] ? security_capable+0x8e/0xc0 [ 2243.908630] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2243.913798] ? ns_capable_common+0xcf/0x160 [ 2243.918099] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2243.923265] mount_ns+0x6d/0x190 [ 2243.926614] rpc_mount+0x9e/0xd0 [ 2243.929959] mount_fs+0x66/0x2d0 [ 2243.933307] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2243.937868] ? may_umount+0xa0/0xa0 [ 2243.941471] ? _raw_read_unlock+0x22/0x30 [ 2243.945595] ? __get_fs_type+0x8a/0xc0 [ 2243.949469] do_mount+0xea4/0x2bb0 [ 2243.952995] ? copy_mount_string+0x40/0x40 [ 2243.957211] ? rcu_pm_notify+0xc0/0xc0 [ 2243.961269] ? copy_mount_options+0x5f/0x2e0 [ 2243.965665] ? rcu_read_lock_sched_held+0x108/0x120 [ 2243.970663] ? kmem_cache_alloc_trace+0x459/0x740 [ 2243.975484] ? kasan_check_write+0x14/0x20 [ 2243.979695] ? _copy_from_user+0x99/0x110 [ 2243.983828] ? copy_mount_options+0x1f7/0x2e0 [ 2243.988314] SyS_mount+0xab/0x120 [ 2243.991748] ? copy_mnt_ns+0xb30/0xb30 [ 2243.995614] do_syscall_64+0x281/0x940 [ 2243.999476] ? __do_page_fault+0xc90/0xc90 [ 2244.003687] ? _raw_spin_unlock_irq+0x27/0x70 [ 2244.008159] ? finish_task_switch+0x1c1/0x7e0 [ 2244.012643] ? syscall_return_slowpath+0x550/0x550 [ 2244.017550] ? syscall_return_slowpath+0x2ac/0x550 [ 2244.022472] ? prepare_exit_to_usermode+0x350/0x350 [ 2244.027477] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2244.032824] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2244.037651] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2244.042823] RIP: 0033:0x4548b9 [ 2244.045994] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2244.053684] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2244.060930] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2244.068184] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2244.075431] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2244.082676] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000012 2018/03/29 11:40:34 executing program 5 (fault-call:10 fault-nth:19): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2244.174459] FAULT_INJECTION: forcing a failure. [ 2244.174459] name failslab, interval 1, probability 0, space 0, times 0 [ 2244.185811] CPU: 1 PID: 26663 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2244.193083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2244.202426] Call Trace: [ 2244.205006] dump_stack+0x194/0x24d [ 2244.208626] ? arch_local_irq_restore+0x53/0x53 [ 2244.213283] ? __save_stack_trace+0x7e/0xd0 [ 2244.217613] should_fail+0x8c0/0xa40 [ 2244.221322] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2244.226414] ? kasan_kmalloc+0xad/0xe0 [ 2244.230284] ? kmem_cache_alloc_trace+0x136/0x740 [ 2244.235113] ? __memcg_init_list_lru_node+0x169/0x270 [ 2244.240287] ? __list_lru_init+0x544/0x750 [ 2244.244504] ? sget_userns+0x691/0xe40 [ 2244.248384] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2244.253128] ? do_mount+0xea4/0x2bb0 [ 2244.256826] ? SyS_mount+0xab/0x120 [ 2244.260440] ? do_syscall_64+0x281/0x940 [ 2244.264485] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2244.269846] ? find_held_lock+0x35/0x1d0 [ 2244.273903] ? __lock_is_held+0xb6/0x140 [ 2244.277974] ? check_same_owner+0x320/0x320 [ 2244.282288] ? rcu_note_context_switch+0x710/0x710 [ 2244.287225] should_failslab+0xec/0x120 [ 2244.291198] kmem_cache_alloc_trace+0x4b/0x740 [ 2244.295767] ? __kmalloc_node+0x33/0x70 [ 2244.299726] ? __kmalloc_node+0x33/0x70 [ 2244.303690] ? rcu_read_lock_sched_held+0x108/0x120 [ 2244.308705] __memcg_init_list_lru_node+0x169/0x270 [ 2244.313716] ? list_lru_add+0x7c0/0x7c0 [ 2244.317680] ? __kmalloc_node+0x47/0x70 [ 2244.321655] __list_lru_init+0x544/0x750 [ 2244.325715] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2244.331591] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2244.336596] ? __lockdep_init_map+0xe4/0x650 [ 2244.340997] ? lockdep_init_map+0x9/0x10 [ 2244.345052] sget_userns+0x691/0xe40 [ 2244.348753] ? set_anon_super+0x20/0x20 [ 2244.352724] ? put_filp+0x90/0x90 [ 2244.356173] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2244.361269] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2244.366281] ? trace_hardirqs_off+0x10/0x10 [ 2244.370598] ? putname+0xee/0x130 [ 2244.374051] ? cap_capable+0x1b5/0x230 [ 2244.377941] ? security_capable+0x8e/0xc0 [ 2244.382085] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2244.387260] ? ns_capable_common+0xcf/0x160 [ 2244.391577] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2244.396756] mount_ns+0x6d/0x190 [ 2244.400121] rpc_mount+0x9e/0xd0 [ 2244.403484] mount_fs+0x66/0x2d0 [ 2244.406849] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2244.411425] ? may_umount+0xa0/0xa0 [ 2244.415044] ? _raw_read_unlock+0x22/0x30 [ 2244.419180] ? __get_fs_type+0x8a/0xc0 [ 2244.423071] do_mount+0xea4/0x2bb0 [ 2244.426615] ? copy_mount_string+0x40/0x40 [ 2244.430837] ? rcu_pm_notify+0xc0/0xc0 [ 2244.434730] ? copy_mount_options+0x5f/0x2e0 [ 2244.439129] ? rcu_read_lock_sched_held+0x108/0x120 [ 2244.444137] ? kmem_cache_alloc_trace+0x459/0x740 [ 2244.448976] ? kasan_check_write+0x14/0x20 [ 2244.453196] ? _copy_from_user+0x99/0x110 [ 2244.457344] ? copy_mount_options+0x1f7/0x2e0 [ 2244.461839] SyS_mount+0xab/0x120 [ 2244.465279] ? copy_mnt_ns+0xb30/0xb30 [ 2244.469164] do_syscall_64+0x281/0x940 [ 2244.473042] ? __do_page_fault+0xc90/0xc90 [ 2244.477261] ? _raw_spin_unlock_irq+0x27/0x70 [ 2244.481747] ? finish_task_switch+0x1c1/0x7e0 [ 2244.486232] ? syscall_return_slowpath+0x550/0x550 [ 2244.491156] ? syscall_return_slowpath+0x2ac/0x550 [ 2244.496074] ? prepare_exit_to_usermode+0x350/0x350 [ 2244.501083] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2244.506442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2244.511283] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2244.516460] RIP: 0033:0x4548b9 2018/03/29 11:40:35 executing program 5 (fault-call:10 fault-nth:20): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2244.519636] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2244.527334] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2244.534591] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2244.541847] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2244.549716] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2244.556975] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000013 [ 2244.861263] FAULT_INJECTION: forcing a failure. [ 2244.861263] name failslab, interval 1, probability 0, space 0, times 0 [ 2244.872623] CPU: 0 PID: 26670 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2244.879870] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2244.889196] Call Trace: [ 2244.891762] dump_stack+0x194/0x24d [ 2244.895367] ? arch_local_irq_restore+0x53/0x53 [ 2244.900015] ? __save_stack_trace+0x7e/0xd0 [ 2244.904327] should_fail+0x8c0/0xa40 [ 2244.908026] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2244.913112] ? kasan_kmalloc+0xad/0xe0 [ 2244.916989] ? kmem_cache_alloc_trace+0x136/0x740 [ 2244.921819] ? __memcg_init_list_lru_node+0x169/0x270 [ 2244.926983] ? __list_lru_init+0x544/0x750 [ 2244.931201] ? sget_userns+0x691/0xe40 [ 2244.935063] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2244.939791] ? do_mount+0xea4/0x2bb0 [ 2244.943483] ? SyS_mount+0xab/0x120 [ 2244.947091] ? do_syscall_64+0x281/0x940 [ 2244.951138] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2244.956493] ? find_held_lock+0x35/0x1d0 [ 2244.960534] ? __lock_is_held+0xb6/0x140 [ 2244.964582] ? check_same_owner+0x320/0x320 [ 2244.968885] ? rcu_note_context_switch+0x710/0x710 [ 2244.973811] should_failslab+0xec/0x120 [ 2244.977767] kmem_cache_alloc_trace+0x4b/0x740 [ 2244.982324] ? __kmalloc_node+0x33/0x70 [ 2244.986272] ? __kmalloc_node+0x33/0x70 [ 2244.990221] ? rcu_read_lock_sched_held+0x108/0x120 [ 2244.995217] __memcg_init_list_lru_node+0x169/0x270 [ 2245.000333] ? list_lru_add+0x7c0/0x7c0 [ 2245.004283] ? __kmalloc_node+0x47/0x70 [ 2245.008239] __list_lru_init+0x544/0x750 [ 2245.012287] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2245.018148] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2245.023142] ? __lockdep_init_map+0xe4/0x650 [ 2245.029945] ? lockdep_init_map+0x9/0x10 [ 2245.033988] sget_userns+0x691/0xe40 [ 2245.038067] ? set_anon_super+0x20/0x20 [ 2245.042171] ? put_filp+0x90/0x90 [ 2245.045605] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2245.050685] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2245.055680] ? trace_hardirqs_off+0x10/0x10 [ 2245.060079] ? putname+0xee/0x130 [ 2245.063510] ? cap_capable+0x1b5/0x230 [ 2245.067375] ? security_capable+0x8e/0xc0 [ 2245.071502] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2245.076678] ? ns_capable_common+0xcf/0x160 [ 2245.080976] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2245.086142] mount_ns+0x6d/0x190 [ 2245.089488] rpc_mount+0x9e/0xd0 [ 2245.092830] mount_fs+0x66/0x2d0 [ 2245.096180] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2245.100739] ? may_umount+0xa0/0xa0 [ 2245.104342] ? _raw_read_unlock+0x22/0x30 [ 2245.108466] ? __get_fs_type+0x8a/0xc0 [ 2245.112336] do_mount+0xea4/0x2bb0 [ 2245.115864] ? copy_mount_string+0x40/0x40 [ 2245.120072] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2245.125067] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2245.129802] ? retint_kernel+0x10/0x10 [ 2245.133672] ? copy_mount_options+0x18b/0x2e0 [ 2245.138148] ? __sanitizer_cov_trace_pc+0xd/0x50 [ 2245.142892] ? copy_mount_options+0x1f7/0x2e0 [ 2245.147376] SyS_mount+0xab/0x120 [ 2245.150803] ? copy_mnt_ns+0xb30/0xb30 [ 2245.154867] do_syscall_64+0x281/0x940 [ 2245.158737] ? __do_page_fault+0xc90/0xc90 [ 2245.162947] ? _raw_spin_unlock_irq+0x27/0x70 [ 2245.167422] ? finish_task_switch+0x1c1/0x7e0 [ 2245.171895] ? syscall_return_slowpath+0x550/0x550 [ 2245.176799] ? syscall_return_slowpath+0x2ac/0x550 [ 2245.181704] ? prepare_exit_to_usermode+0x350/0x350 [ 2245.186696] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2245.192044] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2245.196871] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2245.202040] RIP: 0033:0x4548b9 [ 2245.205204] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 11:40:36 executing program 5 (fault-call:10 fault-nth:21): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2245.212896] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2245.220140] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2245.227384] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2245.234695] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2245.242081] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000014 [ 2245.369849] FAULT_INJECTION: forcing a failure. [ 2245.369849] name failslab, interval 1, probability 0, space 0, times 0 [ 2245.381282] CPU: 0 PID: 26674 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2245.388570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2245.397907] Call Trace: [ 2245.400488] dump_stack+0x194/0x24d [ 2245.404652] ? arch_local_irq_restore+0x53/0x53 [ 2245.409311] ? __save_stack_trace+0x7e/0xd0 [ 2245.413640] should_fail+0x8c0/0xa40 [ 2245.417609] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2245.422728] ? kasan_kmalloc+0xad/0xe0 [ 2245.426637] ? kmem_cache_alloc_trace+0x136/0x740 [ 2245.431457] ? __memcg_init_list_lru_node+0x169/0x270 [ 2245.436619] ? __list_lru_init+0x544/0x750 [ 2245.440829] ? sget_userns+0x691/0xe40 [ 2245.444710] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2245.449448] ? do_mount+0xea4/0x2bb0 [ 2245.453139] ? SyS_mount+0xab/0x120 [ 2245.456741] ? do_syscall_64+0x281/0x940 [ 2245.460777] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2245.466126] ? find_held_lock+0x35/0x1d0 [ 2245.470170] ? __lock_is_held+0xb6/0x140 [ 2245.474223] ? check_same_owner+0x320/0x320 [ 2245.478524] ? rcu_note_context_switch+0x710/0x710 [ 2245.483444] should_failslab+0xec/0x120 [ 2245.487397] kmem_cache_alloc_trace+0x4b/0x740 [ 2245.491981] ? __kmalloc_node+0x33/0x70 [ 2245.495930] ? __kmalloc_node+0x33/0x70 [ 2245.499880] ? rcu_read_lock_sched_held+0x108/0x120 [ 2245.504880] __memcg_init_list_lru_node+0x169/0x270 [ 2245.509876] ? list_lru_add+0x7c0/0x7c0 [ 2245.513825] ? __kmalloc_node+0x47/0x70 [ 2245.517785] __list_lru_init+0x544/0x750 [ 2245.521829] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2245.527693] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2245.532688] ? __lockdep_init_map+0xe4/0x650 [ 2245.537078] ? lockdep_init_map+0x9/0x10 [ 2245.541117] sget_userns+0x691/0xe40 [ 2245.544806] ? set_anon_super+0x20/0x20 [ 2245.548763] ? put_filp+0x90/0x90 [ 2245.552196] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2245.557279] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2245.562275] ? trace_hardirqs_off+0x10/0x10 [ 2245.566577] ? putname+0xee/0x130 [ 2245.570013] ? cap_capable+0x1b5/0x230 [ 2245.573989] ? security_capable+0x8e/0xc0 [ 2245.578119] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2245.583284] ? ns_capable_common+0xcf/0x160 [ 2245.587586] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2245.592748] mount_ns+0x6d/0x190 [ 2245.596096] rpc_mount+0x9e/0xd0 [ 2245.599441] mount_fs+0x66/0x2d0 [ 2245.602789] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2245.607348] ? may_umount+0xa0/0xa0 [ 2245.610957] ? _raw_read_unlock+0x22/0x30 [ 2245.615083] ? __get_fs_type+0x8a/0xc0 [ 2245.618954] do_mount+0xea4/0x2bb0 [ 2245.622480] ? copy_mount_string+0x40/0x40 [ 2245.626692] ? rcu_pm_notify+0xc0/0xc0 [ 2245.630567] ? copy_mount_options+0x5f/0x2e0 [ 2245.634952] ? rcu_read_lock_sched_held+0x108/0x120 [ 2245.639946] ? kmem_cache_alloc_trace+0x459/0x740 [ 2245.644767] ? kasan_check_write+0x14/0x20 [ 2245.648989] ? copy_mount_options+0x1f7/0x2e0 [ 2245.653468] SyS_mount+0xab/0x120 [ 2245.656897] ? copy_mnt_ns+0xb30/0xb30 [ 2245.660763] do_syscall_64+0x281/0x940 [ 2245.664624] ? __do_page_fault+0xc90/0xc90 [ 2245.668835] ? _raw_spin_unlock_irq+0x27/0x70 [ 2245.673304] ? finish_task_switch+0x1c1/0x7e0 [ 2245.677774] ? syscall_return_slowpath+0x550/0x550 [ 2245.682934] ? syscall_return_slowpath+0x2ac/0x550 [ 2245.687841] ? prepare_exit_to_usermode+0x350/0x350 [ 2245.692834] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2245.698181] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2245.703011] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2245.708181] RIP: 0033:0x4548b9 [ 2245.711344] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 11:40:36 executing program 5 (fault-call:10 fault-nth:22): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2245.719804] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2245.727053] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2245.734304] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2245.741549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2245.748793] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000015 [ 2245.759879] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:36 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2245.793081] IPVS: ftp: loaded support on port[0] = 21 [ 2245.826096] FAULT_INJECTION: forcing a failure. [ 2245.826096] name failslab, interval 1, probability 0, space 0, times 0 [ 2245.837428] CPU: 1 PID: 26681 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2245.845045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2245.846904] IPVS: ftp: loaded support on port[0] = 21 [ 2245.855254] Call Trace: [ 2245.855275] dump_stack+0x194/0x24d [ 2245.855293] ? arch_local_irq_restore+0x53/0x53 [ 2245.855302] ? finish_task_switch+0x1c1/0x7e0 [ 2245.855308] ? finish_task_switch+0x182/0x7e0 [ 2245.855333] should_fail+0x8c0/0xa40 [ 2245.855348] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2245.889183] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2245.893953] ? __sched_text_start+0x8/0x8 [ 2245.896887] IPVS: ftp: loaded support on port[0] = 21 [ 2245.898095] ? find_held_lock+0x35/0x1d0 [ 2245.898118] ? __lock_is_held+0xb6/0x140 [ 2245.898147] ? check_same_owner+0x320/0x320 [ 2245.915709] should_failslab+0xec/0x120 [ 2245.919685] kmem_cache_alloc_trace+0x4b/0x740 [ 2245.924263] ? __kmalloc_node+0x33/0x70 [ 2245.928232] ? __kmalloc_node+0x33/0x70 [ 2245.932207] ? rcu_read_lock_sched_held+0x108/0x120 [ 2245.937227] __memcg_init_list_lru_node+0x169/0x270 [ 2245.942248] ? list_lru_add+0x7c0/0x7c0 [ 2245.945153] IPVS: ftp: loaded support on port[0] = 21 [ 2245.946213] ? __kmalloc_node+0x47/0x70 [ 2245.946241] __list_lru_init+0x544/0x750 [ 2245.946260] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2245.965322] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2245.970336] ? __lockdep_init_map+0xe4/0x650 2018/03/29 11:40:36 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x0, 0x8000, 0x6, 0x0, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2245.974747] ? lockdep_init_map+0x9/0x10 [ 2245.978811] sget_userns+0x691/0xe40 [ 2245.982519] ? set_anon_super+0x20/0x20 [ 2245.986496] ? put_filp+0x90/0x90 [ 2245.989947] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2245.995053] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2246.000073] ? trace_hardirqs_off+0x10/0x10 [ 2246.004394] ? putname+0xee/0x130 [ 2246.007842] ? cap_capable+0x1b5/0x230 [ 2246.011738] ? security_capable+0x8e/0xc0 [ 2246.015883] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2246.021066] ? ns_capable_common+0xcf/0x160 [ 2246.023750] IPVS: ftp: loaded support on port[0] = 21 [ 2246.025382] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2246.025392] mount_ns+0x6d/0x190 [ 2246.040287] rpc_mount+0x9e/0xd0 [ 2246.043651] mount_fs+0x66/0x2d0 [ 2246.047029] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2246.052483] ? may_umount+0xa0/0xa0 [ 2246.056132] ? _raw_read_unlock+0x22/0x30 [ 2246.060276] ? __get_fs_type+0x8a/0xc0 [ 2246.064174] do_mount+0xea4/0x2bb0 [ 2246.067722] ? copy_mount_string+0x40/0x40 [ 2246.071959] ? rcu_pm_notify+0xc0/0xc0 [ 2246.075883] ? copy_mount_options+0x5f/0x2e0 [ 2246.080289] ? rcu_read_lock_sched_held+0x108/0x120 [ 2246.085302] ? kmem_cache_alloc_trace+0x459/0x740 [ 2246.090146] ? kasan_check_write+0x14/0x20 [ 2246.094388] ? copy_mount_options+0x1f7/0x2e0 [ 2246.098890] SyS_mount+0xab/0x120 [ 2246.102334] ? copy_mnt_ns+0xb30/0xb30 [ 2246.106219] do_syscall_64+0x281/0x940 [ 2246.110097] ? __do_page_fault+0xc90/0xc90 [ 2246.114326] ? _raw_spin_unlock_irq+0x27/0x70 [ 2246.118820] ? finish_task_switch+0x1c1/0x7e0 [ 2246.123314] ? syscall_return_slowpath+0x550/0x550 [ 2246.128242] ? syscall_return_slowpath+0x2ac/0x550 [ 2246.133168] ? prepare_exit_to_usermode+0x350/0x350 [ 2246.138179] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2246.143547] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2246.148399] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2246.150571] IPVS: ftp: loaded support on port[0] = 21 [ 2246.153578] RIP: 0033:0x4548b9 [ 2246.153583] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2246.153593] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2246.153598] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2246.153604] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2246.153610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2246.153616] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000016 2018/03/29 11:40:37 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:37 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x0, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:37 executing program 5 (fault-call:10 fault-nth:23): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:37 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x0, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:37 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:37 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0x0, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:37 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x0, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:37 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x0, 0x8000, 0x6, 0x0, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2246.348386] FAULT_INJECTION: forcing a failure. [ 2246.348386] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.359703] CPU: 0 PID: 26713 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2246.366970] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2246.376311] Call Trace: [ 2246.378899] dump_stack+0x194/0x24d [ 2246.382531] ? arch_local_irq_restore+0x53/0x53 [ 2246.387195] ? __save_stack_trace+0x7e/0xd0 [ 2246.391524] should_fail+0x8c0/0xa40 [ 2246.395236] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2246.400331] ? kasan_kmalloc+0xad/0xe0 [ 2246.404205] ? kmem_cache_alloc_trace+0x136/0x740 [ 2246.409037] ? __memcg_init_list_lru_node+0x169/0x270 [ 2246.414217] ? __list_lru_init+0x544/0x750 [ 2246.418439] ? sget_userns+0x691/0xe40 [ 2246.422359] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2246.427110] ? do_mount+0xea4/0x2bb0 [ 2246.430812] ? SyS_mount+0xab/0x120 [ 2246.434429] ? do_syscall_64+0x281/0x940 [ 2246.438491] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2246.443858] ? find_held_lock+0x35/0x1d0 [ 2246.447923] ? __lock_is_held+0xb6/0x140 [ 2246.452001] ? check_same_owner+0x320/0x320 [ 2246.456318] ? rcu_note_context_switch+0x710/0x710 [ 2246.461256] should_failslab+0xec/0x120 [ 2246.465220] kmem_cache_alloc_trace+0x4b/0x740 [ 2246.469791] ? __kmalloc_node+0x33/0x70 [ 2246.473753] ? __kmalloc_node+0x33/0x70 [ 2246.477717] ? rcu_read_lock_sched_held+0x108/0x120 [ 2246.482729] __memcg_init_list_lru_node+0x169/0x270 [ 2246.487741] ? list_lru_add+0x7c0/0x7c0 [ 2246.491706] ? __kmalloc_node+0x47/0x70 [ 2246.495683] __list_lru_init+0x544/0x750 [ 2246.499744] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2246.505624] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2246.510633] ? __lockdep_init_map+0xe4/0x650 [ 2246.515223] ? lockdep_init_map+0x9/0x10 [ 2246.519275] sget_userns+0x691/0xe40 [ 2246.522982] ? set_anon_super+0x20/0x20 [ 2246.526935] ? put_filp+0x90/0x90 [ 2246.530374] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2246.535471] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2246.540478] ? trace_hardirqs_off+0x10/0x10 [ 2246.544777] ? putname+0xee/0x130 [ 2246.548209] ? cap_capable+0x1b5/0x230 [ 2246.552077] ? security_capable+0x8e/0xc0 [ 2246.556202] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2246.561363] ? ns_capable_common+0xcf/0x160 [ 2246.565664] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2246.570826] mount_ns+0x6d/0x190 [ 2246.574173] rpc_mount+0x9e/0xd0 [ 2246.577517] mount_fs+0x66/0x2d0 [ 2246.580864] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2246.585423] ? may_umount+0xa0/0xa0 [ 2246.589034] ? _raw_read_unlock+0x22/0x30 [ 2246.593158] ? __get_fs_type+0x8a/0xc0 [ 2246.597123] do_mount+0xea4/0x2bb0 [ 2246.600647] ? copy_mount_string+0x40/0x40 [ 2246.604855] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2246.609847] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2246.614581] ? retint_kernel+0x10/0x10 [ 2246.618461] ? copy_mount_options+0x149/0x2e0 [ 2246.622931] ? copy_mount_options+0x14c/0x2e0 [ 2246.627402] ? copy_mount_options+0x1f7/0x2e0 [ 2246.631877] SyS_mount+0xab/0x120 [ 2246.635305] ? copy_mnt_ns+0xb30/0xb30 [ 2246.639169] do_syscall_64+0x281/0x940 [ 2246.643035] ? __do_page_fault+0xc90/0xc90 [ 2246.647252] ? _raw_spin_unlock_irq+0x27/0x70 [ 2246.651728] ? finish_task_switch+0x1c1/0x7e0 [ 2246.656204] ? syscall_return_slowpath+0x550/0x550 [ 2246.661109] ? syscall_return_slowpath+0x2ac/0x550 [ 2246.666020] ? prepare_exit_to_usermode+0x350/0x350 [ 2246.671022] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2246.676368] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2246.681191] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2246.686356] RIP: 0033:0x4548b9 [ 2246.689529] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 11:40:37 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x0, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2246.697367] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2246.704624] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2246.711866] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2246.719111] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2246.726354] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000017 2018/03/29 11:40:37 executing program 5 (fault-call:10 fault-nth:24): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2246.808131] FAULT_INJECTION: forcing a failure. [ 2246.808131] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.819406] CPU: 1 PID: 26723 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2246.826660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2246.835992] Call Trace: [ 2246.838569] dump_stack+0x194/0x24d [ 2246.842179] ? arch_local_irq_restore+0x53/0x53 [ 2246.846827] ? kernel_text_address+0x102/0x140 [ 2246.851402] should_fail+0x8c0/0xa40 [ 2246.855097] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2246.860187] ? save_stack+0x43/0xd0 [ 2246.863786] ? kasan_kmalloc+0xad/0xe0 [ 2246.867646] ? __kmalloc+0x162/0x760 [ 2246.871333] ? __list_lru_init+0xcf/0x750 [ 2246.875462] ? find_held_lock+0x35/0x1d0 [ 2246.879504] ? __lock_is_held+0xb6/0x140 [ 2246.883557] ? check_same_owner+0x320/0x320 [ 2246.887858] ? rcu_note_context_switch+0x710/0x710 [ 2246.892771] should_failslab+0xec/0x120 [ 2246.896722] kmem_cache_alloc_node_trace+0x5a/0x760 [ 2246.901712] ? mark_held_locks+0xaf/0x100 [ 2246.905838] ? __raw_spin_lock_init+0x1c/0x100 [ 2246.910405] __kmalloc_node+0x33/0x70 [ 2246.914187] kvmalloc_node+0x99/0xd0 [ 2246.917879] __list_lru_init+0x5d5/0x750 [ 2246.921932] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2246.927795] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2246.932796] ? lockdep_init_map+0x9/0x10 [ 2246.936836] sget_userns+0x6b1/0xe40 [ 2246.940526] ? set_anon_super+0x20/0x20 [ 2246.944481] ? put_filp+0x90/0x90 [ 2246.947917] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2246.952998] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2246.958014] ? trace_hardirqs_off+0x10/0x10 [ 2246.962318] ? putname+0xee/0x130 [ 2246.965753] ? cap_capable+0x1b5/0x230 [ 2246.969623] ? security_capable+0x8e/0xc0 [ 2246.973750] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2246.978932] ? ns_capable_common+0xcf/0x160 [ 2246.983232] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2246.988400] mount_ns+0x6d/0x190 [ 2246.991747] rpc_mount+0x9e/0xd0 [ 2246.995096] mount_fs+0x66/0x2d0 [ 2246.998443] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2247.003002] ? may_umount+0xa0/0xa0 [ 2247.006612] ? _raw_read_unlock+0x22/0x30 [ 2247.010739] ? __get_fs_type+0x8a/0xc0 [ 2247.014612] do_mount+0xea4/0x2bb0 [ 2247.018139] ? copy_mount_string+0x40/0x40 [ 2247.022351] ? rcu_pm_notify+0xc0/0xc0 [ 2247.026227] ? copy_mount_options+0x5f/0x2e0 [ 2247.030621] ? rcu_read_lock_sched_held+0x108/0x120 [ 2247.035616] ? kmem_cache_alloc_trace+0x459/0x740 [ 2247.040438] ? kasan_check_write+0x14/0x20 [ 2247.044665] ? copy_mount_options+0x1f7/0x2e0 [ 2247.049149] SyS_mount+0xab/0x120 [ 2247.052583] ? copy_mnt_ns+0xb30/0xb30 [ 2247.056450] do_syscall_64+0x281/0x940 [ 2247.060315] ? __do_page_fault+0xc90/0xc90 [ 2247.064539] ? _raw_spin_unlock_irq+0x27/0x70 [ 2247.069016] ? finish_task_switch+0x1c1/0x7e0 [ 2247.073498] ? syscall_return_slowpath+0x550/0x550 [ 2247.078409] ? syscall_return_slowpath+0x2ac/0x550 [ 2247.083317] ? prepare_exit_to_usermode+0x350/0x350 [ 2247.088310] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2247.093654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2247.098484] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2247.103649] RIP: 0033:0x4548b9 2018/03/29 11:40:37 executing program 5 (fault-call:10 fault-nth:25): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2247.106812] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2247.114496] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2247.121742] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2247.128987] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2247.136232] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2247.143476] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000018 [ 2247.199493] FAULT_INJECTION: forcing a failure. [ 2247.199493] name failslab, interval 1, probability 0, space 0, times 0 [ 2247.210732] CPU: 1 PID: 26728 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2247.217981] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2247.227315] Call Trace: [ 2247.229896] dump_stack+0x194/0x24d [ 2247.233516] ? arch_local_irq_restore+0x53/0x53 [ 2247.238167] ? rcutorture_record_progress+0x10/0x10 [ 2247.243170] should_fail+0x8c0/0xa40 [ 2247.246864] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2247.251944] ? __kernel_text_address+0xd/0x40 [ 2247.256421] ? unwind_get_return_address+0x61/0xa0 [ 2247.261345] ? find_held_lock+0x35/0x1d0 [ 2247.265394] ? __lock_is_held+0xb6/0x140 [ 2247.269448] ? check_same_owner+0x320/0x320 [ 2247.273751] ? rcu_note_context_switch+0x710/0x710 [ 2247.278667] should_failslab+0xec/0x120 [ 2247.282622] kmem_cache_alloc_trace+0x4b/0x740 [ 2247.287179] ? __kmalloc_node+0x33/0x70 [ 2247.291128] ? __kmalloc_node+0x33/0x70 [ 2247.295080] ? rcu_read_lock_sched_held+0x108/0x120 [ 2247.300079] __memcg_init_list_lru_node+0x169/0x270 [ 2247.305077] ? list_lru_add+0x7c0/0x7c0 [ 2247.309034] ? __kmalloc_node+0x47/0x70 [ 2247.312998] __list_lru_init+0x544/0x750 [ 2247.317049] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2247.322916] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2247.327920] ? lockdep_init_map+0x9/0x10 [ 2247.331966] sget_userns+0x6b1/0xe40 [ 2247.335655] ? set_anon_super+0x20/0x20 [ 2247.339613] ? put_filp+0x90/0x90 [ 2247.343045] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2247.348128] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2247.353129] ? trace_hardirqs_off+0x10/0x10 [ 2247.357434] ? putname+0xee/0x130 [ 2247.360877] ? cap_capable+0x1b5/0x230 [ 2247.364749] ? security_capable+0x8e/0xc0 [ 2247.368884] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2247.374054] ? ns_capable_common+0xcf/0x160 [ 2247.378360] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2247.383526] mount_ns+0x6d/0x190 [ 2247.386878] rpc_mount+0x9e/0xd0 [ 2247.390225] mount_fs+0x66/0x2d0 [ 2247.393578] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2247.398139] ? may_umount+0xa0/0xa0 [ 2247.401743] ? _raw_read_unlock+0x22/0x30 [ 2247.405935] ? __get_fs_type+0x8a/0xc0 [ 2247.409808] do_mount+0xea4/0x2bb0 [ 2247.413334] ? copy_mount_string+0x40/0x40 [ 2247.417550] ? rcu_pm_notify+0xc0/0xc0 [ 2247.421433] ? copy_mount_options+0x5f/0x2e0 [ 2247.425815] ? rcu_read_lock_sched_held+0x108/0x120 [ 2247.430806] ? kmem_cache_alloc_trace+0x459/0x740 [ 2247.435629] ? kasan_check_write+0x14/0x20 [ 2247.439861] ? copy_mount_options+0x1f7/0x2e0 [ 2247.444338] SyS_mount+0xab/0x120 [ 2247.447767] ? copy_mnt_ns+0xb30/0xb30 [ 2247.451634] do_syscall_64+0x281/0x940 [ 2247.455498] ? __do_page_fault+0xc90/0xc90 [ 2247.459707] ? _raw_spin_unlock_irq+0x27/0x70 [ 2247.464178] ? finish_task_switch+0x1c1/0x7e0 [ 2247.468654] ? syscall_return_slowpath+0x550/0x550 [ 2247.473560] ? syscall_return_slowpath+0x2ac/0x550 [ 2247.478467] ? prepare_exit_to_usermode+0x350/0x350 [ 2247.483463] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2247.488810] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2247.493637] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2247.498804] RIP: 0033:0x4548b9 [ 2247.501968] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2247.509662] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2247.516910] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2247.524158] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2247.531406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2247.538654] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000019 2018/03/29 11:40:38 executing program 5 (fault-call:10 fault-nth:26): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2247.621423] FAULT_INJECTION: forcing a failure. [ 2247.621423] name failslab, interval 1, probability 0, space 0, times 0 [ 2247.632692] CPU: 0 PID: 26741 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2247.639960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2247.649297] Call Trace: [ 2247.651870] dump_stack+0x194/0x24d [ 2247.655478] ? arch_local_irq_restore+0x53/0x53 [ 2247.660122] ? __save_stack_trace+0x7e/0xd0 [ 2247.664433] should_fail+0x8c0/0xa40 [ 2247.668130] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2247.673209] ? kasan_kmalloc+0xad/0xe0 [ 2247.677071] ? kmem_cache_alloc_trace+0x136/0x740 [ 2247.681900] ? __memcg_init_list_lru_node+0x169/0x270 [ 2247.687061] ? __list_lru_init+0x544/0x750 [ 2247.691270] ? sget_userns+0x6b1/0xe40 [ 2247.695134] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2247.699864] ? do_mount+0xea4/0x2bb0 [ 2247.703551] ? SyS_mount+0xab/0x120 [ 2247.707310] ? do_syscall_64+0x281/0x940 [ 2247.711359] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2247.717608] ? find_held_lock+0x35/0x1d0 [ 2247.721657] ? __lock_is_held+0xb6/0x140 [ 2247.725708] ? check_same_owner+0x320/0x320 [ 2247.730010] ? rcu_note_context_switch+0x710/0x710 [ 2247.734927] should_failslab+0xec/0x120 [ 2247.738879] kmem_cache_alloc_trace+0x4b/0x740 [ 2247.743445] ? __kmalloc_node+0x33/0x70 [ 2247.747393] ? __kmalloc_node+0x33/0x70 [ 2247.751353] ? rcu_read_lock_sched_held+0x108/0x120 [ 2247.756363] __memcg_init_list_lru_node+0x169/0x270 [ 2247.761362] ? list_lru_add+0x7c0/0x7c0 [ 2247.765525] ? __kmalloc_node+0x47/0x70 [ 2247.769513] __list_lru_init+0x544/0x750 [ 2247.773558] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2247.779422] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2247.784425] ? lockdep_init_map+0x9/0x10 [ 2247.788465] sget_userns+0x6b1/0xe40 [ 2247.792151] ? set_anon_super+0x20/0x20 [ 2247.796105] ? put_filp+0x90/0x90 [ 2247.799537] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2247.804621] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2247.809616] ? trace_hardirqs_off+0x10/0x10 [ 2247.813916] ? putname+0xee/0x130 [ 2247.817348] ? cap_capable+0x1b5/0x230 [ 2247.821220] ? security_capable+0x8e/0xc0 [ 2247.825350] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2247.830514] ? ns_capable_common+0xcf/0x160 [ 2247.834826] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2247.839992] mount_ns+0x6d/0x190 [ 2247.843344] rpc_mount+0x9e/0xd0 [ 2247.846687] mount_fs+0x66/0x2d0 [ 2247.850038] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2247.854597] ? may_umount+0xa0/0xa0 [ 2247.858201] ? _raw_read_unlock+0x22/0x30 [ 2247.862351] ? __get_fs_type+0x8a/0xc0 [ 2247.866223] do_mount+0xea4/0x2bb0 [ 2247.869748] ? copy_mount_string+0x40/0x40 [ 2247.873964] ? rcu_pm_notify+0xc0/0xc0 [ 2247.877838] ? copy_mount_options+0x5f/0x2e0 [ 2247.882220] ? rcu_read_lock_sched_held+0x108/0x120 [ 2247.887213] ? kmem_cache_alloc_trace+0x459/0x740 [ 2247.892036] ? kasan_check_write+0x14/0x20 [ 2247.896256] ? copy_mount_options+0x1f7/0x2e0 [ 2247.900734] SyS_mount+0xab/0x120 [ 2247.904163] ? copy_mnt_ns+0xb30/0xb30 [ 2247.908033] do_syscall_64+0x281/0x940 [ 2247.911896] ? __do_page_fault+0xc90/0xc90 [ 2247.916105] ? _raw_spin_unlock_irq+0x27/0x70 [ 2247.920586] ? finish_task_switch+0x1c1/0x7e0 [ 2247.925058] ? syscall_return_slowpath+0x550/0x550 [ 2247.929964] ? syscall_return_slowpath+0x2ac/0x550 [ 2247.934871] ? prepare_exit_to_usermode+0x350/0x350 [ 2247.939863] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2247.945207] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2247.950033] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2247.955197] RIP: 0033:0x4548b9 [ 2247.958363] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 11:40:38 executing program 5 (fault-call:10 fault-nth:27): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2247.966044] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2247.973288] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2247.980537] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2247.987781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2247.995028] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001a [ 2248.044453] FAULT_INJECTION: forcing a failure. [ 2248.044453] name failslab, interval 1, probability 0, space 0, times 0 [ 2248.055705] CPU: 1 PID: 26746 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2248.062968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2248.072312] Call Trace: [ 2248.074882] dump_stack+0x194/0x24d [ 2248.078489] ? arch_local_irq_restore+0x53/0x53 [ 2248.083137] ? __save_stack_trace+0x7e/0xd0 [ 2248.087449] should_fail+0x8c0/0xa40 [ 2248.091144] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2248.096316] ? kasan_kmalloc+0xad/0xe0 [ 2248.100177] ? kmem_cache_alloc_trace+0x136/0x740 [ 2248.104995] ? __memcg_init_list_lru_node+0x169/0x270 [ 2248.110163] ? __list_lru_init+0x544/0x750 [ 2248.114371] ? sget_userns+0x6b1/0xe40 [ 2248.118238] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2248.122967] ? do_mount+0xea4/0x2bb0 [ 2248.126653] ? SyS_mount+0xab/0x120 [ 2248.130255] ? do_syscall_64+0x281/0x940 [ 2248.134293] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2248.139642] ? find_held_lock+0x35/0x1d0 [ 2248.143687] ? __lock_is_held+0xb6/0x140 [ 2248.147742] ? check_same_owner+0x320/0x320 [ 2248.152042] ? rcu_note_context_switch+0x710/0x710 [ 2248.156956] should_failslab+0xec/0x120 [ 2248.160906] kmem_cache_alloc_trace+0x4b/0x740 [ 2248.165465] ? __kmalloc_node+0x33/0x70 [ 2248.169412] ? __kmalloc_node+0x33/0x70 [ 2248.173363] ? rcu_read_lock_sched_held+0x108/0x120 [ 2248.178362] __memcg_init_list_lru_node+0x169/0x270 [ 2248.183360] ? list_lru_add+0x7c0/0x7c0 [ 2248.187311] ? __kmalloc_node+0x47/0x70 [ 2248.191269] __list_lru_init+0x544/0x750 [ 2248.195315] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2248.201177] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2248.206177] ? lockdep_init_map+0x9/0x10 [ 2248.210215] sget_userns+0x6b1/0xe40 [ 2248.213903] ? set_anon_super+0x20/0x20 [ 2248.217857] ? put_filp+0x90/0x90 [ 2248.221289] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2248.226375] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2248.231372] ? trace_hardirqs_off+0x10/0x10 [ 2248.235674] ? putname+0xee/0x130 [ 2248.239112] ? cap_capable+0x1b5/0x230 [ 2248.242982] ? security_capable+0x8e/0xc0 [ 2248.247108] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2248.252271] ? ns_capable_common+0xcf/0x160 [ 2248.256572] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2248.261735] mount_ns+0x6d/0x190 [ 2248.265085] rpc_mount+0x9e/0xd0 [ 2248.268433] mount_fs+0x66/0x2d0 [ 2248.271783] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2248.276343] ? may_umount+0xa0/0xa0 [ 2248.279946] ? _raw_read_unlock+0x22/0x30 [ 2248.284070] ? __get_fs_type+0x8a/0xc0 [ 2248.287939] do_mount+0xea4/0x2bb0 [ 2248.291465] ? copy_mount_string+0x40/0x40 [ 2248.295677] ? rcu_pm_notify+0xc0/0xc0 [ 2248.299551] ? copy_mount_options+0x5f/0x2e0 [ 2248.303932] ? rcu_read_lock_sched_held+0x108/0x120 [ 2248.308921] ? kmem_cache_alloc_trace+0x459/0x740 [ 2248.313742] ? kasan_check_write+0x14/0x20 [ 2248.317961] ? copy_mount_options+0x1f7/0x2e0 [ 2248.322437] SyS_mount+0xab/0x120 [ 2248.325868] ? copy_mnt_ns+0xb30/0xb30 [ 2248.329735] do_syscall_64+0x281/0x940 [ 2248.333596] ? __do_page_fault+0xc90/0xc90 [ 2248.337806] ? _raw_spin_unlock_irq+0x27/0x70 [ 2248.342276] ? finish_task_switch+0x1c1/0x7e0 [ 2248.346747] ? syscall_return_slowpath+0x550/0x550 [ 2248.351656] ? syscall_return_slowpath+0x2ac/0x550 [ 2248.356563] ? prepare_exit_to_usermode+0x350/0x350 [ 2248.361567] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2248.366910] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2248.371736] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2248.376899] RIP: 0033:0x4548b9 [ 2248.380150] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2248.387834] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 2018/03/29 11:40:39 executing program 5 (fault-call:10 fault-nth:28): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2248.395080] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2248.402326] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2248.409570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2248.416813] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001b [ 2248.674300] FAULT_INJECTION: forcing a failure. [ 2248.674300] name failslab, interval 1, probability 0, space 0, times 0 [ 2248.685576] CPU: 0 PID: 26751 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2248.692835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2248.702171] Call Trace: [ 2248.704751] dump_stack+0x194/0x24d [ 2248.708370] ? arch_local_irq_restore+0x53/0x53 [ 2248.713027] ? __save_stack_trace+0x7e/0xd0 [ 2248.717353] should_fail+0x8c0/0xa40 [ 2248.721316] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2248.726407] ? kasan_kmalloc+0xad/0xe0 [ 2248.730279] ? kmem_cache_alloc_trace+0x136/0x740 [ 2248.735107] ? __memcg_init_list_lru_node+0x169/0x270 [ 2248.740282] ? __list_lru_init+0x544/0x750 [ 2248.744499] ? sget_userns+0x6b1/0xe40 [ 2248.748378] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2248.753118] ? do_mount+0xea4/0x2bb0 [ 2248.756814] ? SyS_mount+0xab/0x120 [ 2248.760426] ? do_syscall_64+0x281/0x940 [ 2248.764472] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2248.769831] ? find_held_lock+0x35/0x1d0 [ 2248.773891] ? __lock_is_held+0xb6/0x140 [ 2248.777961] ? check_same_owner+0x320/0x320 [ 2248.782276] ? rcu_note_context_switch+0x710/0x710 [ 2248.787210] should_failslab+0xec/0x120 [ 2248.791178] kmem_cache_alloc_trace+0x4b/0x740 [ 2248.795745] ? __kmalloc_node+0x33/0x70 [ 2248.799701] ? __kmalloc_node+0x33/0x70 [ 2248.803663] ? rcu_read_lock_sched_held+0x108/0x120 [ 2248.808675] __memcg_init_list_lru_node+0x169/0x270 [ 2248.813684] ? list_lru_add+0x7c0/0x7c0 [ 2248.817645] ? __kmalloc_node+0x47/0x70 [ 2248.821631] __list_lru_init+0x544/0x750 [ 2248.825690] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2248.831564] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2248.836583] ? lockdep_init_map+0x9/0x10 [ 2248.840636] sget_userns+0x6b1/0xe40 [ 2248.844336] ? set_anon_super+0x20/0x20 [ 2248.848307] ? put_filp+0x90/0x90 [ 2248.851753] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2248.856849] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2248.861861] ? trace_hardirqs_off+0x10/0x10 [ 2248.866176] ? putname+0xee/0x130 [ 2248.869623] ? cap_capable+0x1b5/0x230 [ 2248.873507] ? security_capable+0x8e/0xc0 [ 2248.877646] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2248.882822] ? ns_capable_common+0xcf/0x160 [ 2248.887136] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2248.892312] mount_ns+0x6d/0x190 [ 2248.895673] rpc_mount+0x9e/0xd0 [ 2248.899033] mount_fs+0x66/0x2d0 [ 2248.902396] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2248.906969] ? may_umount+0xa0/0xa0 [ 2248.910579] ? _raw_read_unlock+0x22/0x30 [ 2248.914715] ? __get_fs_type+0x8a/0xc0 [ 2248.918603] do_mount+0xea4/0x2bb0 [ 2248.922152] ? copy_mount_string+0x40/0x40 [ 2248.926375] ? rcu_pm_notify+0xc0/0xc0 [ 2248.930279] ? copy_mount_options+0x5f/0x2e0 [ 2248.934672] ? rcu_read_lock_sched_held+0x108/0x120 [ 2248.939762] ? kmem_cache_alloc_trace+0x459/0x740 [ 2248.944599] ? kasan_check_write+0x14/0x20 [ 2248.948844] ? copy_mount_options+0x1f7/0x2e0 [ 2248.953340] SyS_mount+0xab/0x120 [ 2248.956791] ? copy_mnt_ns+0xb30/0xb30 [ 2248.960670] do_syscall_64+0x281/0x940 [ 2248.964541] ? __do_page_fault+0xc90/0xc90 [ 2248.968760] ? _raw_spin_unlock_irq+0x27/0x70 [ 2248.973246] ? finish_task_switch+0x1c1/0x7e0 [ 2248.977730] ? syscall_return_slowpath+0x550/0x550 [ 2248.982655] ? syscall_return_slowpath+0x2ac/0x550 [ 2248.987572] ? prepare_exit_to_usermode+0x350/0x350 [ 2248.992580] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2248.997937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2249.002776] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2249.007950] RIP: 0033:0x4548b9 [ 2249.011124] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 11:40:39 executing program 5 (fault-call:10 fault-nth:29): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2249.018917] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2249.026174] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2249.034901] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2249.042160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2249.049417] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001c [ 2249.157917] FAULT_INJECTION: forcing a failure. [ 2249.157917] name failslab, interval 1, probability 0, space 0, times 0 [ 2249.169284] CPU: 1 PID: 26755 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2249.176539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2249.185867] Call Trace: [ 2249.188432] dump_stack+0x194/0x24d [ 2249.192047] ? arch_local_irq_restore+0x53/0x53 [ 2249.196703] ? __save_stack_trace+0x7e/0xd0 [ 2249.201014] should_fail+0x8c0/0xa40 [ 2249.204712] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2249.209790] ? kasan_kmalloc+0xad/0xe0 [ 2249.213647] ? kmem_cache_alloc_trace+0x136/0x740 [ 2249.218462] ? __memcg_init_list_lru_node+0x169/0x270 [ 2249.223623] ? __list_lru_init+0x544/0x750 [ 2249.227829] ? sget_userns+0x6b1/0xe40 [ 2249.231699] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2249.236429] ? do_mount+0xea4/0x2bb0 [ 2249.240115] ? SyS_mount+0xab/0x120 [ 2249.243713] ? do_syscall_64+0x281/0x940 [ 2249.248015] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2249.253368] ? find_held_lock+0x35/0x1d0 [ 2249.257414] ? __lock_is_held+0xb6/0x140 [ 2249.261483] ? check_same_owner+0x320/0x320 [ 2249.265798] ? rcu_note_context_switch+0x710/0x710 [ 2249.270716] should_failslab+0xec/0x120 [ 2249.274667] kmem_cache_alloc_trace+0x4b/0x740 [ 2249.279243] __memcg_init_list_lru_node+0x169/0x270 [ 2249.284237] ? list_lru_add+0x7c0/0x7c0 [ 2249.288186] ? __kmalloc_node+0x47/0x70 [ 2249.292154] __list_lru_init+0x544/0x750 [ 2249.296197] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2249.302064] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2249.307110] ? lockdep_init_map+0x9/0x10 [ 2249.311150] sget_userns+0x6b1/0xe40 [ 2249.314839] ? set_anon_super+0x20/0x20 [ 2249.318790] ? put_filp+0x90/0x90 [ 2249.322219] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2249.327307] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2249.332308] ? trace_hardirqs_off+0x10/0x10 [ 2249.336603] ? putname+0xee/0x130 [ 2249.340047] ? cap_capable+0x1b5/0x230 [ 2249.343919] ? security_capable+0x8e/0xc0 [ 2249.348051] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2249.353217] ? ns_capable_common+0xcf/0x160 [ 2249.357516] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2249.362678] mount_ns+0x6d/0x190 [ 2249.366036] rpc_mount+0x9e/0xd0 [ 2249.369381] mount_fs+0x66/0x2d0 [ 2249.372727] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2249.377286] ? may_umount+0xa0/0xa0 [ 2249.380983] ? _raw_read_unlock+0x22/0x30 [ 2249.385109] ? __get_fs_type+0x8a/0xc0 [ 2249.388977] do_mount+0xea4/0x2bb0 [ 2249.392499] ? copy_mount_string+0x40/0x40 [ 2249.396709] ? rcu_pm_notify+0xc0/0xc0 [ 2249.400586] ? copy_mount_options+0x5f/0x2e0 [ 2249.404968] ? rcu_read_lock_sched_held+0x108/0x120 [ 2249.409961] ? kmem_cache_alloc_trace+0x459/0x740 [ 2249.414778] ? kasan_check_write+0x14/0x20 [ 2249.418993] ? copy_mount_options+0x1f7/0x2e0 [ 2249.423470] SyS_mount+0xab/0x120 [ 2249.426897] ? copy_mnt_ns+0xb30/0xb30 [ 2249.430761] do_syscall_64+0x281/0x940 [ 2249.434621] ? __do_page_fault+0xc90/0xc90 [ 2249.438913] ? _raw_spin_unlock_irq+0x27/0x70 [ 2249.443382] ? finish_task_switch+0x1c1/0x7e0 [ 2249.447858] ? syscall_return_slowpath+0x550/0x550 [ 2249.452764] ? syscall_return_slowpath+0x2ac/0x550 [ 2249.457672] ? prepare_exit_to_usermode+0x350/0x350 [ 2249.462667] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2249.468011] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2249.472841] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2249.478007] RIP: 0033:0x4548b9 [ 2249.481176] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2249.488860] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2249.496107] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2249.503351] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2249.510594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2249.517837] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001d [ 2249.909638] IPVS: ftp: loaded support on port[0] = 21 [ 2249.937759] IPVS: ftp: loaded support on port[0] = 21 [ 2249.975367] IPVS: ftp: loaded support on port[0] = 21 [ 2250.014764] IPVS: ftp: loaded support on port[0] = 21 [ 2250.058161] IPVS: ftp: loaded support on port[0] = 21 [ 2250.104263] IPVS: ftp: loaded support on port[0] = 21 [ 2250.149384] IPVS: ftp: loaded support on port[0] = 21 2018/03/29 11:40:40 executing program 5 (fault-call:10 fault-nth:30): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:40 executing program 7: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x80, &(0x7f0000002000)=[{&(0x7f000000a000)=""/181, 0xb5}], 0x1, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0x0, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:40 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x0, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:40 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0x0, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:40 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x0, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:40 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x6, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x0, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:40 executing program 6: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) recvmsg(0xffffffffffffffff, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r0, 0x0, 0x78, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b4512676", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000001180)=r0, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r1, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) 2018/03/29 11:40:40 executing program 0: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x2, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0xe9, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a62", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180), 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x0, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x0, 0x8000, 0x6, 0x0, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, r5) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r2}, 0x48) recvmsg$kcm(r4, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2250.271301] FAULT_INJECTION: forcing a failure. [ 2250.271301] name failslab, interval 1, probability 0, space 0, times 0 [ 2250.282587] CPU: 0 PID: 26789 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2250.289858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2250.299329] Call Trace: [ 2250.301918] dump_stack+0x194/0x24d [ 2250.305554] ? arch_local_irq_restore+0x53/0x53 [ 2250.310219] ? __save_stack_trace+0x7e/0xd0 [ 2250.314547] should_fail+0x8c0/0xa40 [ 2250.318257] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2250.323350] ? kasan_kmalloc+0xad/0xe0 [ 2250.327225] ? kmem_cache_alloc_trace+0x136/0x740 [ 2250.332055] ? __memcg_init_list_lru_node+0x169/0x270 [ 2250.337236] ? __list_lru_init+0x544/0x750 [ 2250.341446] ? sget_userns+0x6b1/0xe40 [ 2250.345320] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2250.350048] ? do_mount+0xea4/0x2bb0 [ 2250.353747] ? SyS_mount+0xab/0x120 [ 2250.357349] ? do_syscall_64+0x281/0x940 [ 2250.361384] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2250.366729] ? find_held_lock+0x35/0x1d0 [ 2250.370771] ? __lock_is_held+0xb6/0x140 [ 2250.374821] ? check_same_owner+0x320/0x320 [ 2250.379122] ? rcu_note_context_switch+0x710/0x710 [ 2250.384041] should_failslab+0xec/0x120 [ 2250.387993] kmem_cache_alloc_trace+0x4b/0x740 [ 2250.392552] ? __kmalloc_node+0x33/0x70 [ 2250.396498] ? __kmalloc_node+0x33/0x70 [ 2250.400448] ? rcu_read_lock_sched_held+0x108/0x120 [ 2250.405447] __memcg_init_list_lru_node+0x169/0x270 [ 2250.410445] ? list_lru_add+0x7c0/0x7c0 [ 2250.414399] ? __kmalloc_node+0x47/0x70 [ 2250.418358] __list_lru_init+0x544/0x750 [ 2250.422404] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2250.428267] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2250.433270] ? lockdep_init_map+0x9/0x10 [ 2250.437319] sget_userns+0x6b1/0xe40 [ 2250.441009] ? set_anon_super+0x20/0x20 [ 2250.444965] ? put_filp+0x90/0x90 [ 2250.448396] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2250.453480] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2250.458477] ? trace_hardirqs_off+0x10/0x10 [ 2250.462777] ? putname+0xee/0x130 [ 2250.466212] ? cap_capable+0x1b5/0x230 [ 2250.470091] ? security_capable+0x8e/0xc0 [ 2250.474220] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2250.479385] ? ns_capable_common+0xcf/0x160 [ 2250.483684] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2250.488846] mount_ns+0x6d/0x190 [ 2250.492192] rpc_mount+0x9e/0xd0 [ 2250.495536] mount_fs+0x66/0x2d0 [ 2250.498882] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2250.503440] ? may_umount+0xa0/0xa0 [ 2250.507042] ? _raw_read_unlock+0x22/0x30 [ 2250.511170] ? __get_fs_type+0x8a/0xc0 [ 2250.515055] do_mount+0xea4/0x2bb0 [ 2250.518596] ? copy_mount_string+0x40/0x40 [ 2250.522808] ? rcu_pm_notify+0xc0/0xc0 [ 2250.526682] ? copy_mount_options+0x5f/0x2e0 [ 2250.531067] ? rcu_read_lock_sched_held+0x108/0x120 [ 2250.536065] ? kmem_cache_alloc_trace+0x459/0x740 [ 2250.540884] ? kasan_check_write+0x14/0x20 [ 2250.545116] ? copy_mount_options+0x1f7/0x2e0 [ 2250.549598] SyS_mount+0xab/0x120 [ 2250.553030] ? copy_mnt_ns+0xb30/0xb30 [ 2250.556894] do_syscall_64+0x281/0x940 [ 2250.560756] ? __do_page_fault+0xc90/0xc90 [ 2250.564964] ? _raw_spin_unlock_irq+0x27/0x70 [ 2250.569435] ? finish_task_switch+0x1c1/0x7e0 [ 2250.573905] ? syscall_return_slowpath+0x550/0x550 [ 2250.578812] ? syscall_return_slowpath+0x2ac/0x550 [ 2250.584298] ? prepare_exit_to_usermode+0x350/0x350 [ 2250.589293] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2250.594641] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2250.599467] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2250.604648] RIP: 0033:0x4548b9 [ 2250.607813] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2250.615496] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 2018/03/29 11:40:41 executing program 3: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x8, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x2000, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b53596090ebcc07d8584f358be88fafe") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x0, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2250.622740] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2250.629985] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2250.637374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2250.644616] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001e 2018/03/29 11:40:41 executing program 5 (fault-call:10 fault-nth:31): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2250.757464] FAULT_INJECTION: forcing a failure. [ 2250.757464] name failslab, interval 1, probability 0, space 0, times 0 [ 2250.768743] CPU: 1 PID: 26796 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2250.776004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2250.785345] Call Trace: [ 2250.787916] dump_stack+0x194/0x24d [ 2250.791556] ? arch_local_irq_restore+0x53/0x53 [ 2250.796220] ? __save_stack_trace+0x7e/0xd0 [ 2250.800528] should_fail+0x8c0/0xa40 [ 2250.804230] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2250.809310] ? kasan_kmalloc+0xad/0xe0 [ 2250.813170] ? kmem_cache_alloc_trace+0x136/0x740 [ 2250.817987] ? __memcg_init_list_lru_node+0x169/0x270 [ 2250.823151] ? __list_lru_init+0x544/0x750 [ 2250.827359] ? sget_userns+0x6b1/0xe40 [ 2250.831224] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2250.835952] ? do_mount+0xea4/0x2bb0 [ 2250.839638] ? SyS_mount+0xab/0x120 [ 2250.843243] ? do_syscall_64+0x281/0x940 [ 2250.847277] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2250.852625] ? find_held_lock+0x35/0x1d0 [ 2250.856668] ? __lock_is_held+0xb6/0x140 [ 2250.860722] ? check_same_owner+0x320/0x320 [ 2250.865031] ? rcu_note_context_switch+0x710/0x710 [ 2250.869946] should_failslab+0xec/0x120 [ 2250.873897] kmem_cache_alloc_trace+0x4b/0x740 [ 2250.878453] ? __kmalloc_node+0x33/0x70 [ 2250.882402] ? __kmalloc_node+0x33/0x70 [ 2250.886352] ? rcu_read_lock_sched_held+0x108/0x120 [ 2250.891360] __memcg_init_list_lru_node+0x169/0x270 [ 2250.896356] ? list_lru_add+0x7c0/0x7c0 [ 2250.900305] ? __kmalloc_node+0x47/0x70 [ 2250.904266] __list_lru_init+0x544/0x750 [ 2250.908309] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2250.914176] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2250.919178] ? lockdep_init_map+0x9/0x10 [ 2250.923217] sget_userns+0x6b1/0xe40 [ 2250.926904] ? set_anon_super+0x20/0x20 [ 2250.930859] ? put_filp+0x90/0x90 [ 2250.934293] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2250.939376] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2250.944373] ? trace_hardirqs_off+0x10/0x10 [ 2250.948674] ? putname+0xee/0x130 [ 2250.952111] ? cap_capable+0x1b5/0x230 [ 2250.955981] ? security_capable+0x8e/0xc0 [ 2250.960109] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2250.965297] ? ns_capable_common+0xcf/0x160 [ 2250.969601] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2250.974765] mount_ns+0x6d/0x190 [ 2250.978113] rpc_mount+0x9e/0xd0 [ 2250.981457] mount_fs+0x66/0x2d0 [ 2250.984807] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2250.989367] ? may_umount+0xa0/0xa0 [ 2250.992971] ? _raw_read_unlock+0x22/0x30 [ 2250.997110] ? __get_fs_type+0x8a/0xc0 [ 2251.000983] do_mount+0xea4/0x2bb0 [ 2251.004508] ? copy_mount_string+0x40/0x40 [ 2251.008720] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2251.013715] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2251.018455] ? retint_kernel+0x10/0x10 [ 2251.022329] ? copy_mount_options+0x149/0x2e0 [ 2251.026805] ? __sanitizer_cov_trace_pc+0x3b/0x50 [ 2251.031635] ? copy_mount_options+0x1f7/0x2e0 [ 2251.036118] SyS_mount+0xab/0x120 [ 2251.039548] ? copy_mnt_ns+0xb30/0xb30 [ 2251.043413] do_syscall_64+0x281/0x940 [ 2251.047282] ? __do_page_fault+0xc90/0xc90 [ 2251.051497] ? _raw_spin_unlock_irq+0x27/0x70 [ 2251.055972] ? finish_task_switch+0x1c1/0x7e0 [ 2251.060446] ? syscall_return_slowpath+0x550/0x550 [ 2251.065352] ? syscall_return_slowpath+0x2ac/0x550 [ 2251.070261] ? prepare_exit_to_usermode+0x350/0x350 [ 2251.075255] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2251.080600] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2251.085424] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2251.090590] RIP: 0033:0x4548b9 [ 2251.093764] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2251.101446] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 2018/03/29 11:40:41 executing program 5 (fault-call:10 fault-nth:32): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2251.108691] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2251.115935] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2251.123182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2251.130425] R13: 00000000000003fa R14: 00000000006f8010 R15: 000000000000001f [ 2251.185329] FAULT_INJECTION: forcing a failure. [ 2251.185329] name failslab, interval 1, probability 0, space 0, times 0 [ 2251.196551] CPU: 0 PID: 26801 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2251.203802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2251.213137] Call Trace: [ 2251.215707] dump_stack+0x194/0x24d [ 2251.219314] ? arch_local_irq_restore+0x53/0x53 [ 2251.223961] ? __save_stack_trace+0x7e/0xd0 [ 2251.228382] should_fail+0x8c0/0xa40 [ 2251.232077] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2251.237158] ? kasan_kmalloc+0xad/0xe0 [ 2251.241025] ? kmem_cache_alloc_trace+0x136/0x740 [ 2251.245841] ? __memcg_init_list_lru_node+0x169/0x270 [ 2251.251011] ? __list_lru_init+0x544/0x750 [ 2251.255223] ? sget_userns+0x6b1/0xe40 [ 2251.259088] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2251.263818] ? do_mount+0xea4/0x2bb0 [ 2251.267507] ? SyS_mount+0xab/0x120 [ 2251.271110] ? do_syscall_64+0x281/0x940 [ 2251.275148] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2251.280493] ? find_held_lock+0x35/0x1d0 [ 2251.284537] ? __lock_is_held+0xb6/0x140 [ 2251.288591] ? check_same_owner+0x320/0x320 [ 2251.292895] ? rcu_note_context_switch+0x710/0x710 [ 2251.297808] should_failslab+0xec/0x120 [ 2251.301760] kmem_cache_alloc_trace+0x4b/0x740 [ 2251.306315] ? __kmalloc_node+0x33/0x70 [ 2251.310265] ? __kmalloc_node+0x33/0x70 [ 2251.314377] ? rcu_read_lock_sched_held+0x108/0x120 [ 2251.319374] __memcg_init_list_lru_node+0x169/0x270 [ 2251.324370] ? list_lru_add+0x7c0/0x7c0 [ 2251.328320] ? __kmalloc_node+0x47/0x70 [ 2251.332277] __list_lru_init+0x544/0x750 [ 2251.336321] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2251.342186] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2251.347185] ? lockdep_init_map+0x9/0x10 [ 2251.351223] sget_userns+0x6b1/0xe40 [ 2251.354911] ? set_anon_super+0x20/0x20 [ 2251.358867] ? put_filp+0x90/0x90 [ 2251.362296] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2251.367381] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2251.372374] ? trace_hardirqs_off+0x10/0x10 [ 2251.376674] ? putname+0xee/0x130 [ 2251.380107] ? cap_capable+0x1b5/0x230 [ 2251.383980] ? security_capable+0x8e/0xc0 [ 2251.388105] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2251.393370] ? ns_capable_common+0xcf/0x160 [ 2251.397671] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2251.402837] mount_ns+0x6d/0x190 [ 2251.406183] rpc_mount+0x9e/0xd0 [ 2251.409529] mount_fs+0x66/0x2d0 [ 2251.412877] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2251.417436] ? may_umount+0xa0/0xa0 [ 2251.421039] ? _raw_read_unlock+0x22/0x30 [ 2251.425161] ? __get_fs_type+0x8a/0xc0 [ 2251.429038] do_mount+0xea4/0x2bb0 [ 2251.432560] ? copy_mount_string+0x40/0x40 [ 2251.436774] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2251.441770] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2251.446511] ? retint_kernel+0x10/0x10 [ 2251.450381] ? copy_mount_options+0x18b/0x2e0 [ 2251.454854] ? copy_mount_options+0x196/0x2e0 [ 2251.459326] ? copy_mount_options+0x1f7/0x2e0 [ 2251.463803] SyS_mount+0xab/0x120 [ 2251.467230] ? copy_mnt_ns+0xb30/0xb30 [ 2251.471094] do_syscall_64+0x281/0x940 [ 2251.474955] ? __do_page_fault+0xc90/0xc90 [ 2251.479169] ? _raw_spin_unlock_irq+0x27/0x70 [ 2251.483649] ? finish_task_switch+0x1c1/0x7e0 [ 2251.488122] ? syscall_return_slowpath+0x550/0x550 [ 2251.493041] ? syscall_return_slowpath+0x2ac/0x550 [ 2251.497959] ? prepare_exit_to_usermode+0x350/0x350 [ 2251.502959] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2251.508305] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2251.513130] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2251.518296] RIP: 0033:0x4548b9 [ 2251.521463] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2251.529148] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 2018/03/29 11:40:42 executing program 5 (fault-call:10 fault-nth:33): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2251.536391] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2251.543635] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2251.550880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2251.558124] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000020 [ 2251.608711] FAULT_INJECTION: forcing a failure. [ 2251.608711] name failslab, interval 1, probability 0, space 0, times 0 [ 2251.620014] CPU: 1 PID: 26806 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2251.627271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2251.636603] Call Trace: [ 2251.639173] dump_stack+0x194/0x24d [ 2251.642781] ? arch_local_irq_restore+0x53/0x53 [ 2251.647428] ? __save_stack_trace+0x7e/0xd0 [ 2251.651735] should_fail+0x8c0/0xa40 [ 2251.655430] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2251.660513] ? kasan_kmalloc+0xad/0xe0 [ 2251.664373] ? kmem_cache_alloc_trace+0x136/0x740 [ 2251.669191] ? __memcg_init_list_lru_node+0x169/0x270 [ 2251.674354] ? __list_lru_init+0x544/0x750 [ 2251.678561] ? sget_userns+0x6b1/0xe40 [ 2251.682426] ? vfs_kern_mount.part.26+0xc6/0x4a0 [ 2251.687155] ? do_mount+0xea4/0x2bb0 [ 2251.690842] ? SyS_mount+0xab/0x120 [ 2251.694443] ? do_syscall_64+0x281/0x940 [ 2251.698482] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2251.703830] ? find_held_lock+0x35/0x1d0 [ 2251.707872] ? __lock_is_held+0xb6/0x140 [ 2251.711923] ? check_same_owner+0x320/0x320 [ 2251.716236] ? rcu_note_context_switch+0x710/0x710 [ 2251.721154] should_failslab+0xec/0x120 [ 2251.725107] kmem_cache_alloc_trace+0x4b/0x740 [ 2251.729664] ? __kmalloc_node+0x33/0x70 [ 2251.733619] ? __kmalloc_node+0x33/0x70 [ 2251.737568] ? rcu_read_lock_sched_held+0x108/0x120 [ 2251.742568] __memcg_init_list_lru_node+0x169/0x270 [ 2251.747565] ? list_lru_add+0x7c0/0x7c0 [ 2251.751515] ? __kmalloc_node+0x47/0x70 [ 2251.755474] __list_lru_init+0x544/0x750 [ 2251.759519] ? memcg_destroy_list_lru_node.isra.7+0x110/0x110 [ 2251.765402] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2251.770403] ? lockdep_init_map+0x9/0x10 [ 2251.774453] sget_userns+0x6b1/0xe40 [ 2251.778142] ? set_anon_super+0x20/0x20 [ 2251.782097] ? put_filp+0x90/0x90 [ 2251.785527] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2251.790610] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2251.795607] ? trace_hardirqs_off+0x10/0x10 [ 2251.799909] ? putname+0xee/0x130 [ 2251.803343] ? cap_capable+0x1b5/0x230 [ 2251.807214] ? security_capable+0x8e/0xc0 [ 2251.811339] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2251.816506] ? ns_capable_common+0xcf/0x160 [ 2251.820808] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2251.825972] mount_ns+0x6d/0x190 [ 2251.829322] rpc_mount+0x9e/0xd0 [ 2251.832668] mount_fs+0x66/0x2d0 [ 2251.836021] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2251.840582] ? may_umount+0xa0/0xa0 [ 2251.844183] ? _raw_read_unlock+0x22/0x30 [ 2251.848305] ? __get_fs_type+0x8a/0xc0 [ 2251.852175] do_mount+0xea4/0x2bb0 [ 2251.855701] ? copy_mount_string+0x40/0x40 [ 2251.859917] ? rcu_pm_notify+0xc0/0xc0 [ 2251.863794] ? copy_mount_options+0x5f/0x2e0 [ 2251.868180] ? rcu_read_lock_sched_held+0x108/0x120 [ 2251.873172] ? kmem_cache_alloc_trace+0x459/0x740 [ 2251.878001] ? kasan_check_write+0x14/0x20 [ 2251.882216] ? _copy_from_user+0x99/0x110 [ 2251.886343] ? copy_mount_options+0x1f7/0x2e0 [ 2251.890824] SyS_mount+0xab/0x120 [ 2251.894254] ? copy_mnt_ns+0xb30/0xb30 [ 2251.898123] do_syscall_64+0x281/0x940 [ 2251.901984] ? __do_page_fault+0xc90/0xc90 [ 2251.906191] ? _raw_spin_unlock_irq+0x27/0x70 [ 2251.910660] ? finish_task_switch+0x1c1/0x7e0 [ 2251.915131] ? syscall_return_slowpath+0x550/0x550 [ 2251.920037] ? syscall_return_slowpath+0x2ac/0x550 [ 2251.924946] ? prepare_exit_to_usermode+0x350/0x350 [ 2251.929943] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2251.935287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2251.940113] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2251.945274] RIP: 0033:0x4548b9 [ 2251.948439] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 2018/03/29 11:40:42 executing program 5 (fault-call:10 fault-nth:34): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2251.956123] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2251.963367] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2251.970613] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2251.977855] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2251.985097] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000021 [ 2252.056543] FAULT_INJECTION: forcing a failure. [ 2252.056543] name failslab, interval 1, probability 0, space 0, times 0 [ 2252.067870] CPU: 1 PID: 26818 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2252.075141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2252.084492] Call Trace: [ 2252.087087] dump_stack+0x194/0x24d [ 2252.090723] ? arch_local_irq_restore+0x53/0x53 [ 2252.095383] ? find_held_lock+0x35/0x1d0 [ 2252.099448] should_fail+0x8c0/0xa40 [ 2252.103148] ? __list_lru_init+0x352/0x750 [ 2252.107362] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 2252.112439] ? trace_hardirqs_off+0x10/0x10 [ 2252.116737] ? find_next_zero_bit+0xe3/0x110 [ 2252.121123] ? trace_hardirqs_off+0x10/0x10 [ 2252.125428] ? find_held_lock+0x35/0x1d0 [ 2252.129471] ? __lock_is_held+0xb6/0x140 [ 2252.133523] ? check_same_owner+0x320/0x320 [ 2252.137818] ? lock_downgrade+0x980/0x980 [ 2252.141942] ? rcu_note_context_switch+0x710/0x710 [ 2252.146844] ? find_held_lock+0x35/0x1d0 [ 2252.150891] should_failslab+0xec/0x120 [ 2252.154839] __kmalloc+0x63/0x760 [ 2252.158265] ? lock_downgrade+0x980/0x980 [ 2252.162391] ? register_shrinker+0x10e/0x2d0 [ 2252.166774] ? trace_event_raw_event_module_request+0x320/0x320 [ 2252.172810] register_shrinker+0x10e/0x2d0 [ 2252.177030] ? __bpf_trace_mm_vmscan_wakeup_kswapd+0x40/0x40 [ 2252.182804] ? memcpy+0x45/0x50 [ 2252.186065] sget_userns+0xbbf/0xe40 [ 2252.189750] ? set_anon_super+0x20/0x20 [ 2252.193705] ? put_filp+0x90/0x90 [ 2252.197135] ? destroy_unused_super.part.6+0xd0/0xd0 [ 2252.202215] ? __alloc_pages_slowpath+0x2d10/0x2d10 [ 2252.207207] ? trace_hardirqs_off+0x10/0x10 [ 2252.211504] ? putname+0xee/0x130 [ 2252.214939] ? cap_capable+0x1b5/0x230 [ 2252.218808] ? security_capable+0x8e/0xc0 [ 2252.222934] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2252.228098] ? ns_capable_common+0xcf/0x160 [ 2252.232405] ? rpc_remove_pipe_dir_object+0x6d0/0x6d0 [ 2252.237574] mount_ns+0x6d/0x190 [ 2252.240920] rpc_mount+0x9e/0xd0 [ 2252.244262] mount_fs+0x66/0x2d0 [ 2252.247607] vfs_kern_mount.part.26+0xc6/0x4a0 [ 2252.252165] ? may_umount+0xa0/0xa0 [ 2252.255765] ? _raw_read_unlock+0x22/0x30 [ 2252.259884] ? __get_fs_type+0x8a/0xc0 [ 2252.263750] do_mount+0xea4/0x2bb0 [ 2252.267274] ? copy_mount_string+0x40/0x40 [ 2252.271482] ? rcu_pm_notify+0xc0/0xc0 [ 2252.275352] ? copy_mount_options+0x5f/0x2e0 [ 2252.279738] ? rcu_read_lock_sched_held+0x108/0x120 [ 2252.284738] ? kmem_cache_alloc_trace+0x459/0x740 [ 2252.289565] ? kasan_check_write+0x14/0x20 [ 2252.293774] ? _copy_from_user+0x99/0x110 [ 2252.297902] ? copy_mount_options+0x1f7/0x2e0 [ 2252.302377] SyS_mount+0xab/0x120 [ 2252.305806] ? copy_mnt_ns+0xb30/0xb30 [ 2252.309670] do_syscall_64+0x281/0x940 [ 2252.313529] ? __do_page_fault+0xc90/0xc90 [ 2252.317732] ? _raw_spin_unlock_irq+0x27/0x70 [ 2252.322201] ? finish_task_switch+0x1c1/0x7e0 [ 2252.326689] ? syscall_return_slowpath+0x550/0x550 [ 2252.331599] ? syscall_return_slowpath+0x2ac/0x550 [ 2252.336505] ? prepare_exit_to_usermode+0x350/0x350 [ 2252.341495] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2252.346837] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2252.351658] entry_SYSCALL_64_after_hwframe+0x42/0xb7 2018/03/29 11:40:43 executing program 5 (fault-call:10 fault-nth:35): mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, &(0x7f0000000240)) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, &(0x7f0000000f40)={&(0x7f0000000b40)=@in6={0x0, 0x0, 0x0, @remote}, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d40)=""/185, 0xb9}, {&(0x7f0000000e00)=""/61, 0x3d}, {&(0x7f0000000e40)=""/29, 0x1d}], 0x3, &(0x7f0000000ec0)=""/75, 0x4b}, 0x2003) recvmsg(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000ff0)=@ipx, 0x10, &(0x7f0000002000)=[{&(0x7f000000af18)=""/232, 0xe8}, {&(0x7f000000a000)=""/181, 0xaf}], 0x2, &(0x7f0000000180)=""/105, 0x69}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x18, &(0x7f0000000c80)=ANY=[@ANYBLOB="180000005fd62bed0000000000000000050000000000000000000000000000009500000000000000261bb97659a8afd87e411de8848dc12418aed89df95119a43e82f7f9d8534d954ef0b729c91d76d5ed19ddf1c17f2862956d69c415efc9f30c8bfc9c567c3fec0b87e05b123dba6249f0417db3ecc778f66e756ec421f8dbf44d06cfce6d628ccdbb1a3fc5d949f9c9bc3aa0159c310102a7337f04128302e8c757d1a8d488b6d75ff53c76f0b2c993d5b9f8dfbe5905377088d0f4a5466a"], &(0x7f0000003ff6)='syzkaller\x00', 0x3, 0xc3, &(0x7f0000386000)=""/195}, 0x48) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x0, 0xf0, 0x5a, &(0x7f0000000240)="87821560d0b71e36177a3408f6632f5194cea8b9af2bf8555759ff0a9ca05dd28569f1acfd0fd655f7e83c533fdb26c2f51a2c072590d8e6704beddc6f864cb9f6b3e967fd6ff7af68914fbb70a07001807310b17a8d129f105b8c17d260b885344611d0299a343d64f0307251a8221f4bd10315b45126763459e1f1d626067774c7c1b3c6a120215380f74791cd7524fac944c317c3e38ea4c49e16bb58653665cc74d3bf6477795e2a3a28bf1c80beb52ccb2ba3f4b7aa4848bbf48ecf78e2b96a9c35acff47367809872d957b29548f7775ef8c485543aa85354fb8de6ee196d1696ebdfca02a627422a05e659f50", &(0x7f0000000340)=""/90, 0x2, 0x2}, 0x28) recvmsg(r1, &(0x7f0000000940)={&(0x7f00000003c0)=@pppol2tpin6={0x0, 0x0, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000440)=""/182, 0xb6}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f0000002040)=""/4096, 0x1000}, {&(0x7f0000000140)=""/49, 0x31}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/2, 0x2}, {&(0x7f00000006c0)=""/65, 0x41}, {&(0x7f0000000740)=""/74, 0x4a}, {&(0x7f00000007c0)=""/29, 0x1d}], 0x9, &(0x7f00000008c0)=""/68, 0x44, 0x8}, 0x10000) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000001180)=r2, 0xfffffec5) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/bus\x00', &(0x7f00000002c0)="7270635f706970656673008c7c647f0399287d03b74f09f3ebb5030000009df9a59c06000000000000f90ef07834c1c4", 0x0, &(0x7f0000000200)) mount(&(0x7f0000000980)='./file0\x00', &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)='tracefs\x00', 0xa0000, 0x0) mount(&(0x7f0000000c40)='./file0/bus\x00', &(0x7f0000000b00)='./file0\x00', &(0x7f0000000ac0)='bpf\x00', 0x0, &(0x7f0000000bc0)="48fdfddd92d976c1ffffffff3fb1c360516602ff729cc9e2b90d0a6d922558a1d0d8474b3641e37cc0e9283210c73c1314ce53237bf512f836dfb3a0625cf0d9adb350eeb10f6e4d0f2d9bb24473c751b5359609") recvmsg(r3, &(0x7f00000267c0)={&(0x7f00000251c0)=@can={0x0, 0x0}, 0x80, &(0x7f0000026740)=[{&(0x7f0000025240)=""/4096, 0x1000}, {&(0x7f0000026240)=""/219, 0xdb}, {&(0x7f0000026340)=""/150, 0x96}, {&(0x7f0000026400)=""/111, 0x6f}, {&(0x7f0000026480)=""/202, 0xca}, {&(0x7f0000026580)=""/246, 0xf6}, {&(0x7f0000026680)=""/178, 0xb2}], 0x7, 0x0, 0x0, 0x5ea}, 0x10002) socketpair(0xa, 0x805, 0x5, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = perf_event_open(&(0x7f0000001080)={0x6, 0x70, 0x0, 0x100000001, 0x5, 0x4, 0x0, 0x2c6b, 0x200, 0x1, 0xcb6e, 0x1, 0x5, 0xb8, 0xffffffffffffff80, 0x6, 0x7ff, 0xfffffffffffffc01, 0x8, 0x5, 0x6, 0x8000, 0x6, 0x3c13, 0x6, 0x40, 0x4, 0x6, 0x2, 0x4, 0x6, 0x5, 0x2, 0x7, 0xc7, 0x9, 0xb000, 0x0, 0x0, 0x81, 0x0, @perf_bp={&(0x7f0000000a80)}, 0x220, 0x200, 0x5, 0x5, 0x1, 0x400, 0x5}, 0x0, 0x4, 0xffffffffffffff9c, 0x8) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r7) bpf$PROG_LOAD(0x5, &(0x7f0000026800)={0x4, 0x6, &(0x7f0000000a40)=@raw=[@generic={0x7, 0x401, 0x5, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xff}, @alu={0x4, 0x10000, 0xf, 0x0, 0x0, 0x0, 0xfffffffffffffff4}], &(0x7f0000000f80)='syzkaller\x00', 0x7, 0x1000, &(0x7f0000004000)=""/4096, 0x41f00, 0x1, [], r4}, 0x48) recvmsg$kcm(r6, &(0x7f00000013c0)={&(0x7f0000001100)=@ll, 0x80, &(0x7f0000001300)=[{&(0x7f0000005000)=""/4096, 0x1000}, {&(0x7f00000011c0)=""/3, 0x3}, {&(0x7f0000001200)=""/246, 0xf6}], 0x3, &(0x7f0000001340)=""/113, 0x71, 0x200}, 0x140) [ 2252.356819] RIP: 0033:0x4548b9 [ 2252.359981] RSP: 002b:00007fcf06e8dc68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2252.367664] RAX: ffffffffffffffda RBX: 00007fcf06e8e6d4 RCX: 00000000004548b9 [ 2252.374906] RDX: 00000000200002c0 RSI: 0000000020000140 RDI: 0000000020000300 [ 2252.382150] RBP: 000000000072bea0 R08: 0000000020000200 R09: 0000000000000000 [ 2252.389397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000013 [ 2252.396639] R13: 00000000000003fa R14: 00000000006f8010 R15: 0000000000000022 [ 2252.426702] ------------[ cut here ]------------ [ 2252.431500] refcount_t: increment on 0; use-after-free. [ 2252.436974] WARNING: CPU: 1 PID: 20944 at lib/refcount.c:153 refcount_inc+0x47/0x50 [ 2252.444764] Kernel panic - not syncing: panic_on_warn set ... [ 2252.444764] [ 2252.452099] CPU: 1 PID: 20944 Comm: syz-executor5 Not tainted 4.16.0-rc6+ #40 [ 2252.459350] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2252.468679] Call Trace: [ 2252.471244] dump_stack+0x194/0x24d [ 2252.474848] ? arch_local_irq_restore+0x53/0x53 [ 2252.479497] ? vsnprintf+0x1ed/0x1900 [ 2252.483275] panic+0x1e4/0x41c [ 2252.486441] ? refcount_error_report+0x214/0x214 [ 2252.491186] ? show_regs_print_info+0x18/0x18 [ 2252.495679] ? __warn+0x1c1/0x200 [ 2252.499109] ? refcount_inc+0x47/0x50 [ 2252.502887] __warn+0x1dc/0x200 [ 2252.506147] ? refcount_inc+0x47/0x50 [ 2252.509923] report_bug+0x1f4/0x2b0 [ 2252.513540] fixup_bug.part.11+0x37/0x80 [ 2252.517621] do_error_trap+0x2d7/0x3e0 [ 2252.521484] ? vprintk_default+0x28/0x30 [ 2252.525518] ? math_error+0x400/0x400 [ 2252.529292] ? printk+0xaa/0xca [ 2252.532544] ? show_regs_print_info+0x18/0x18 [ 2252.537030] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2252.541855] do_invalid_op+0x1b/0x20 [ 2252.545542] invalid_op+0x1b/0x40 [ 2252.548972] RIP: 0010:refcount_inc+0x47/0x50 [ 2252.553351] RSP: 0018:ffff8801b515f860 EFLAGS: 00010286 [ 2252.558709] RAX: dffffc0000000008 RBX: ffff8801d41e2184 RCX: ffffffff815ba4be [ 2252.565952] RDX: 0000000000000000 RSI: 1ffff10036a2bebc RDI: 1ffff10036a2be91 [ 2252.573194] RBP: ffff8801b515f868 R08: 0000000000000000 R09: 0000000000000000 [ 2252.580444] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801b515faf8 [ 2252.587696] R13: ffff8801ace2ca93 R14: ffff8801d41e2180 R15: ffff8801ace2cb01 [ 2252.594966] ? vprintk_func+0x5e/0xc0 [ 2252.598755] sk_alloc+0x3f9/0x1440 [ 2252.602273] ? sock_def_error_report+0x5e0/0x5e0 [ 2252.606999] ? __raw_spin_lock_init+0x2d/0x100 [ 2252.611563] ? trace_hardirqs_off+0x10/0x10 [ 2252.615855] ? do_raw_write_unlock+0x290/0x290 [ 2252.620424] ? trace_hardirqs_off+0x10/0x10 [ 2252.624729] ? __raw_spin_lock_init+0x1c/0x100 [ 2252.629292] ? trace_hardirqs_on_caller+0x421/0x5c0 [ 2252.634289] ? find_held_lock+0x35/0x1d0 [ 2252.638371] ? inet_create+0x3fc/0xf50 [ 2252.642233] ? lock_downgrade+0x980/0x980 [ 2252.646363] ? lock_release+0xa40/0xa40 [ 2252.650321] ? lock_downgrade+0x980/0x980 [ 2252.654471] inet_create+0x47c/0xf50 [ 2252.658173] ? ipip_gro_receive+0xf0/0xf0 [ 2252.662302] ? __lock_is_held+0xb6/0x140 [ 2252.666359] __sock_create+0x4d4/0x850 [ 2252.670233] ? kernel_sock_ip_overhead+0x4c0/0x4c0 [ 2252.675145] ? user_path_create+0x40/0x40 [ 2252.679275] SyS_socket+0xeb/0x1d0 [ 2252.682789] ? fillonedir+0x250/0x250 [ 2252.686562] ? move_addr_to_kernel+0x60/0x60 [ 2252.690952] ? getname_flags+0x256/0x580 [ 2252.694986] ? do_syscall_64+0xb7/0x940 [ 2252.698938] ? move_addr_to_kernel+0x60/0x60 [ 2252.703319] do_syscall_64+0x281/0x940 [ 2252.707176] ? __do_page_fault+0xc90/0xc90 [ 2252.711384] ? trace_event_raw_event_sys_exit+0x260/0x260 [ 2252.716898] ? syscall_return_slowpath+0x550/0x550 [ 2252.721801] ? syscall_return_slowpath+0x2ac/0x550 [ 2252.726723] ? entry_SYSCALL_64_after_hwframe+0x52/0xb7 [ 2252.732073] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2252.736898] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 2252.742060] RIP: 0033:0x4573e7 [ 2252.745223] RSP: 002b:00007ffd8dcc0628 EFLAGS: 00000202 ORIG_RAX: 0000000000000029 [ 2252.752905] RAX: ffffffffffffffda RBX: 00000000000001d1 RCX: 00000000004573e7 [ 2252.760149] RDX: 0000000000000006 RSI: 0000000000000001 RDI: 0000000000000002 [ 2252.767397] RBP: 00007ffd8dcc0cd0 R08: 0000000000000000 R09: 0000000000000001 [ 2252.774644] R10: 0000000000000006 R11: 0000000000000202 R12: 000000000000046a [ 2252.781892] R13: 000000000000046a R14: 0000000000000013 R15: 0000000000225d0b [ 2252.789727] Dumping ftrace buffer: [ 2252.793312] (ftrace buffer empty) [ 2252.796996] Kernel Offset: disabled [ 2252.800598] Rebooting in 86400 seconds..